2025/09/12 02:43:03 Increased receive buffer size to 14336 kiB 2025/09/12 02:43:03 Increased send buffer size to 14336 kiB 2025/09/12 02:43:03 Setting DF for IPv4 and IPv6. 2025/09/12 02:43:03 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 02:43:03 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 02:43:03 server Listening for udp connections on [::]:443 2025/09/12 02:43:04 server Client offered version 0x57414954, sending Version Negotiation 2025/09/12 02:43:06 server <- Received Initial packet. 2025/09/12 02:43:06 Created qlog file: /logs/qlog/9f45e7a505c50f85.sqlog 2025/09/12 02:43:06 server Changing connection ID to 619d711a. 2025/09/12 02:43:06 Adding connection IDs 9f45e7a505c50f85 and 619d711a for a new connection. 2025/09/12 02:43:06 server <- Reading packet 112276 (1252 bytes) for connection 9f45e7a505c50f85, Initial 2025/09/12 02:43:06 server Long Header{Type: Initial, DestConnectionID: 9f45e7a505c50f85, SrcConnectionID: c6b4afb66ba978e5, Token: (empty), PacketNumber: 112276, PacketNumberLen: 4, Length: 1226, Version: v1} 2025/09/12 02:43:06 server <- &wire.PingFrame{} 2025/09/12 02:43:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 285, Offset + Data length: 285} 2025/09/12 02:43:06 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:06 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:06 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:06 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c6b4afb66ba978e5, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:06 Adding connection ID ed6d7e80. 2025/09/12 02:43:06 Adding connection ID 472a91b1. 2025/09/12 02:43:06 Adding connection ID ade0460f. 2025/09/12 02:43:06 Adding connection ID ea47cce3. 2025/09/12 02:43:06 Adding connection ID baab6393. 2025/09/12 02:43:06 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9f45e7a505c50f85 2025/09/12 02:43:06 server Long Header{Type: Initial, DestConnectionID: c6b4afb66ba978e5, SrcConnectionID: 619d711a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 352, Version: v1} 2025/09/12 02:43:06 server -> &wire.AckFrame{LargestAcked: 112276, LowestAcked: 112276, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/09/12 02:43:06 server Long Header{Type: Handshake, DestConnectionID: c6b4afb66ba978e5, SrcConnectionID: 619d711a, PacketNumber: 0, PacketNumberLen: 2, Length: 738, Version: v1} 2025/09/12 02:43:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/12 02:43:06 server Short Header{DestConnectionID: c6b4afb66ba978e5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 472a91b1, StatelessResetToken: 0x7bd97a5ab5c3b72f8d1fd70a02083a06} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ade0460f, StatelessResetToken: 0x382f6ba1aa785bdfab0b36adc520ca4c} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ea47cce3, StatelessResetToken: 0x617ed8db53abbb272d362c1c517a5cb5} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ed6d7e80, StatelessResetToken: 0xb2d365c8f5e4f4d15c95132ad00ff89f} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: baab6393, StatelessResetToken: 0x40805f86ee0dae9e7cb31d8ed0498e15} 2025/09/12 02:43:06 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:06 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:06 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:06 server -> Sending packet 1 (1280 bytes) for connection 9f45e7a505c50f85, Initial 2025/09/12 02:43:06 server Long Header{Type: Initial, DestConnectionID: c6b4afb66ba978e5, SrcConnectionID: 619d711a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/09/12 02:43:06 server -> Sending packet 2 (1280 bytes) for connection 9f45e7a505c50f85, Initial 2025/09/12 02:43:06 server Long Header{Type: Initial, DestConnectionID: c6b4afb66ba978e5, SrcConnectionID: 619d711a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/09/12 02:43:06 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:06 server -> Sending packet 1 (759 bytes) for connection 9f45e7a505c50f85, Handshake 2025/09/12 02:43:06 server Long Header{Type: Handshake, DestConnectionID: c6b4afb66ba978e5, SrcConnectionID: 619d711a, PacketNumber: 1, PacketNumberLen: 2, Length: 738, Version: v1} 2025/09/12 02:43:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/12 02:43:06 server Canceling loss detection timer. 2025/09/12 02:43:06 server Amplification window limited. Received 1362 bytes, already sent out 4599 bytes 2025/09/12 02:43:06 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:06 server <- Reading packet 3 (55 bytes) for connection 619d711a, Handshake 2025/09/12 02:43:06 server Long Header{Type: Handshake, DestConnectionID: 619d711a, SrcConnectionID: c6b4afb66ba978e5, PacketNumber: 3, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:06 server Dropping Initial keys. 2025/09/12 02:43:06 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 64µs} 2025/09/12 02:43:06 server newly acked packets (1): [1] 2025/09/12 02:43:06 server updated RTT: 31.368433ms (σ: 15.684216ms) 2025/09/12 02:43:06 server Queueing packet (183 bytes) for later decryption 2025/09/12 02:43:06 server <- Reading packet 4 (183 bytes) for connection 619d711a, Handshake 2025/09/12 02:43:06 server Long Header{Type: Handshake, DestConnectionID: 619d711a, SrcConnectionID: c6b4afb66ba978e5, PacketNumber: 4, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:06 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:06 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 387.368ms} 2025/09/12 02:43:06 server Dropping Handshake keys. 2025/09/12 02:43:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:06 server -> Sending packet 2 (415 bytes) for connection 9f45e7a505c50f85, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:06 server Short Header{DestConnectionID: c6b4afb66ba978e5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 472a91b1, StatelessResetToken: 0x7bd97a5ab5c3b72f8d1fd70a02083a06} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ea47cce3, StatelessResetToken: 0x617ed8db53abbb272d362c1c517a5cb5} 2025/09/12 02:43:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:06 server -> &wire.NewTokenFrame{Token: 0xdf14dfd9e0b1643823d12c13119447fdae632bc9f0ffba7371245769bab22c235c6b3ac338182a6f94980e6b63c0ed0321658d8cf7b4f91e9332a9d46366e46a26b8f699e6bd9dd65ae445fd44953a3b33a1fa3ed9b7c0e49850} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ed6d7e80, StatelessResetToken: 0xb2d365c8f5e4f4d15c95132ad00ff89f} 2025/09/12 02:43:06 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ade0460f, StatelessResetToken: 0x382f6ba1aa785bdfab0b36adc520ca4c} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: baab6393, StatelessResetToken: 0x40805f86ee0dae9e7cb31d8ed0498e15} 2025/09/12 02:43:06 server -> Sending packet 3 (415 bytes) for connection 9f45e7a505c50f85, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:06 server Short Header{DestConnectionID: c6b4afb66ba978e5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ed6d7e80, StatelessResetToken: 0xb2d365c8f5e4f4d15c95132ad00ff89f} 2025/09/12 02:43:06 server -> &wire.NewTokenFrame{Token: 0xdf14dfd9e0b1643823d12c13119447fdae632bc9f0ffba7371245769bab22c235c6b3ac338182a6f94980e6b63c0ed0321658d8cf7b4f91e9332a9d46366e46a26b8f699e6bd9dd65ae445fd44953a3b33a1fa3ed9b7c0e49850} 2025/09/12 02:43:06 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ade0460f, StatelessResetToken: 0x382f6ba1aa785bdfab0b36adc520ca4c} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: baab6393, StatelessResetToken: 0x40805f86ee0dae9e7cb31d8ed0498e15} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 472a91b1, StatelessResetToken: 0x7bd97a5ab5c3b72f8d1fd70a02083a06} 2025/09/12 02:43:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ea47cce3, StatelessResetToken: 0x617ed8db53abbb272d362c1c517a5cb5} 2025/09/12 02:43:06 server <- Reading packet 1 (55 bytes) for connection 619d711a, 1-RTT 2025/09/12 02:43:06 server Short Header{DestConnectionID: 619d711a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:06 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:06 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:06 server <- Reading packet 2 (55 bytes) for connection 619d711a, 1-RTT 2025/09/12 02:43:06 server Short Header{DestConnectionID: 619d711a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:06 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:06 server <- Reading packet 4 (55 bytes) for connection 619d711a, 1-RTT 2025/09/12 02:43:06 server Short Header{DestConnectionID: 619d711a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:06 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:06 server <- Reading packet 5 (183 bytes) for connection 619d711a, 1-RTT 2025/09/12 02:43:06 server Short Header{DestConnectionID: 619d711a, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:06 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ae3f8de09758e56d, StatelessResetToken: 0x8bb7660d6ef617bea7c7235d385464bd} 2025/09/12 02:43:06 Received request: GET /bhcgpgghox 2025/09/12 02:43:06 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 988b570494bcb2c8, StatelessResetToken: 0xde3c139c7fed7d603c71bb29a3212062} 2025/09/12 02:43:06 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a5ba5c18b9fb7531, StatelessResetToken: 0xef15f2ea0eda879abb7f2c4bb935386c} 2025/09/12 02:43:06 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 582.128ms} 2025/09/12 02:43:06 server -> Sending packet 4 (42 bytes) for connection 9f45e7a505c50f85, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:06 server Short Header{DestConnectionID: ae3f8de09758e56d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:06 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 206.242429ms, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:06 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:06 server -> Sending packet 5 (1053 bytes) for connection 9f45e7a505c50f85, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:06 server Short Header{DestConnectionID: ae3f8de09758e56d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:07 server <- Reading packet 6 (55 bytes) for connection 619d711a, 1-RTT 2025/09/12 02:43:07 server Short Header{DestConnectionID: 619d711a, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:07 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 104µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:07 server <- Reading packet 7 (183 bytes) for connection 619d711a, 1-RTT 2025/09/12 02:43:07 server Short Header{DestConnectionID: 619d711a, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:07 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 40µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:07 server newly acked packets (2): [3 4] 2025/09/12 02:43:07 server updated RTT: 31.356ms (σ: 11.785ms) 2025/09/12 02:43:07 server ECN capability confirmed. 2025/09/12 02:43:07 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b9ad08c8faff9fd7, StatelessResetToken: 0x97b178e287bda9ca46aa10dea4973fcb} 2025/09/12 02:43:07 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:07 server Ignoring all packets below 6. 2025/09/12 02:43:07 server <- Reading packet 8 (33 bytes) for connection 619d711a, 1-RTT 2025/09/12 02:43:07 server Short Header{DestConnectionID: 619d711a, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:07 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 120µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:43:07 server newly acked packets (1): [5] 2025/09/12 02:43:07 server updated RTT: 31.394ms (σ: 8.915ms) 2025/09/12 02:43:07 server Canceling loss detection timer. 2025/09/12 02:43:07 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:07 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:07 Replacing connection for connection IDs [619d711a ed6d7e80 472a91b1 ade0460f ea47cce3 baab6393 9f45e7a505c50f85] with a closed connection. 2025/09/12 02:43:07 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:07 server Connection 9f45e7a505c50f85 closed. 2025/09/12 02:43:07 Removing connection IDs [619d711a ed6d7e80 472a91b1 ade0460f ea47cce3 baab6393 9f45e7a505c50f85] for a closed connection after it has been retired. 2025/09/12 02:43:07 server <- Received Initial packet. 2025/09/12 02:43:07 Created qlog file: /logs/qlog/4fd68350ab89d3b5.sqlog 2025/09/12 02:43:07 server Changing connection ID to c733c471. 2025/09/12 02:43:07 Adding connection IDs 4fd68350ab89d3b5 and c733c471 for a new connection. 2025/09/12 02:43:07 server <- Reading packet 67861 (1252 bytes) for connection 4fd68350ab89d3b5, Initial 2025/09/12 02:43:07 server Long Header{Type: Initial, DestConnectionID: 4fd68350ab89d3b5, SrcConnectionID: e0f3646fb2ca1363, Token: 0xdf14dfd9e0b1643823d12c13119447fdae632bc9f0ffba7371245769bab22c235c6b3ac338182a6f94980e6b63c0ed0321658d8cf7b4f91e9332a9d46366e46a26b8f699e6bd9dd65ae445fd44953a3b33a1fa3ed9b7c0e49850, PacketNumber: 67861, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:07 server <- &wire.PingFrame{} 2025/09/12 02:43:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:07 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:07 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:07 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:07 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e0f3646fb2ca1363, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:07 Adding connection ID df4181ad. 2025/09/12 02:43:07 Adding connection ID 74c60998. 2025/09/12 02:43:07 Adding connection ID cb9feb2e. 2025/09/12 02:43:07 Adding connection ID cc8868be. 2025/09/12 02:43:07 Adding connection ID b109df81. 2025/09/12 02:43:07 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4fd68350ab89d3b5 2025/09/12 02:43:07 server Long Header{Type: Initial, DestConnectionID: e0f3646fb2ca1363, SrcConnectionID: c733c471, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 911, Version: v1} 2025/09/12 02:43:07 server -> &wire.AckFrame{LargestAcked: 67861, LowestAcked: 67861, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:07 server Long Header{Type: Handshake, DestConnectionID: e0f3646fb2ca1363, SrcConnectionID: c733c471, PacketNumber: 0, PacketNumberLen: 2, Length: 179, Version: v1} 2025/09/12 02:43:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/09/12 02:43:07 server Short Header{DestConnectionID: e0f3646fb2ca1363, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b109df81, StatelessResetToken: 0x3633213d63dfd7952485e387c4d0346d} 2025/09/12 02:43:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: cc8868be, StatelessResetToken: 0xbd6a461880a7e109972d51160aab83d9} 2025/09/12 02:43:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb9feb2e, StatelessResetToken: 0x4c18509f028913fe31524d55699c525e} 2025/09/12 02:43:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df4181ad, StatelessResetToken: 0x51750f8e0763802f453ed5ea25de88f8} 2025/09/12 02:43:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 74c60998, StatelessResetToken: 0x3d684fa10c40a4db5a60491fb51f9caf} 2025/09/12 02:43:07 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:07 server <- Reading packet 0 (85 bytes) for connection c733c471, Handshake 2025/09/12 02:43:07 server Long Header{Type: Handshake, DestConnectionID: c733c471, SrcConnectionID: e0f3646fb2ca1363, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:07 server Dropping Initial keys. 2025/09/12 02:43:07 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368µs} 2025/09/12 02:43:07 server newly acked packets (1): [0] 2025/09/12 02:43:07 server updated RTT: 32.322537ms (σ: 16.161268ms) 2025/09/12 02:43:07 server Canceling loss detection timer. 2025/09/12 02:43:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:07 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:07 server Dropping Handshake keys. 2025/09/12 02:43:07 server <- Reading packet 0 (183 bytes) for connection c733c471, 1-RTT 2025/09/12 02:43:07 server Short Header{DestConnectionID: c733c471, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:07 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fe4c90a5311d6670, StatelessResetToken: 0x6003aa72fa9f38c0da02e27e86f7e765} 2025/09/12 02:43:07 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 162c0eef4c0b05c0, StatelessResetToken: 0x27bef4adde9f5fc129e52117e0b0ab8f} 2025/09/12 02:43:07 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 10f6fa062028dad0, StatelessResetToken: 0x0c7b1a9000f41d2b65bfe7977101e8c4} 2025/09/12 02:43:07 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:07 server -> Sending packet 1 (305 bytes) for connection 4fd68350ab89d3b5, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:07 server Short Header{DestConnectionID: fe4c90a5311d6670, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:07 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 322.798µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:07 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:07 server -> &wire.NewTokenFrame{Token: 0xf1213fe6e73dd9d8fe711d4c3d22b3507094a5d87c3d2f92b467be2d329359bc371c7e8d71eaa4e596a40f977aece2c734f7f52186e6b404b3086e49f86e6b4935708ebfbd5cc40bdc9d7856245299caf7d12e70b4260ad10aae} 2025/09/12 02:43:07 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:07 server <- Reading packet 1 (55 bytes) for connection c733c471, 1-RTT 2025/09/12 02:43:07 server Short Header{DestConnectionID: c733c471, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:07 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:07 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:07 Received request: GET /rjqjnjrfvc 2025/09/12 02:43:07 server -> Sending packet 2 (1061 bytes) for connection 4fd68350ab89d3b5, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:07 server Short Header{DestConnectionID: fe4c90a5311d6670, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:07 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 410.223µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:07 server <- Reading packet 3 (55 bytes) for connection c733c471, 1-RTT 2025/09/12 02:43:07 server Short Header{DestConnectionID: c733c471, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:07 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 34518dcc404ec2e5, StatelessResetToken: 0xdacecdef52897aaf3d2a226c39a9cb90} 2025/09/12 02:43:07 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:07 server -> Sending packet 3 (37 bytes) for connection 4fd68350ab89d3b5, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:07 server Short Header{DestConnectionID: fe4c90a5311d6670, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:07 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 101.271µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:07 server <- Reading packet 4 (55 bytes) for connection c733c471, 1-RTT 2025/09/12 02:43:07 server Short Header{DestConnectionID: c733c471, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:07 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 4.248ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:07 server newly acked packets (2): [0 1] 2025/09/12 02:43:07 server updated RTT: 32.671ms (σ: 12.819ms) 2025/09/12 02:43:07 server ECN capability confirmed. 2025/09/12 02:43:07 server Ignoring all packets below 1. 2025/09/12 02:43:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:07 server -> Sending packet 5 (1053 bytes) for connection 4fd68350ab89d3b5, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:07 server Short Header{DestConnectionID: fe4c90a5311d6670, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:07 server -> Sending packet 6 (1053 bytes) for connection 4fd68350ab89d3b5, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:07 server Short Header{DestConnectionID: fe4c90a5311d6670, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:08 server <- Reading packet 5 (55 bytes) for connection c733c471, 1-RTT 2025/09/12 02:43:08 server Short Header{DestConnectionID: c733c471, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:08 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:08 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:08 server <- Reading packet 6 (35 bytes) for connection c733c471, 1-RTT 2025/09/12 02:43:08 server Short Header{DestConnectionID: c733c471, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:08 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 160µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:08 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:08 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:08 Replacing connection for connection IDs [74c60998 cb9feb2e cc8868be b109df81 c733c471 df4181ad 4fd68350ab89d3b5] with a closed connection. 2025/09/12 02:43:08 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:08 server Connection 4fd68350ab89d3b5 closed. 2025/09/12 02:43:08 Removing connection IDs [74c60998 cb9feb2e cc8868be b109df81 c733c471 df4181ad 4fd68350ab89d3b5] for a closed connection after it has been retired. 2025/09/12 02:43:08 server <- Received Initial packet. 2025/09/12 02:43:08 Created qlog file: /logs/qlog/09a0b5133e83cbbc.sqlog 2025/09/12 02:43:08 server Changing connection ID to 13b1127a. 2025/09/12 02:43:08 Adding connection IDs 09a0b5133e83cbbc and 13b1127a for a new connection. 2025/09/12 02:43:08 server <- Reading packet 107035 (1252 bytes) for connection 09a0b5133e83cbbc, Initial 2025/09/12 02:43:08 server Long Header{Type: Initial, DestConnectionID: 09a0b5133e83cbbc, SrcConnectionID: 340689d692021b72, Token: 0xf1213fe6e73dd9d8fe711d4c3d22b3507094a5d87c3d2f92b467be2d329359bc371c7e8d71eaa4e596a40f977aece2c734f7f52186e6b404b3086e49f86e6b4935708ebfbd5cc40bdc9d7856245299caf7d12e70b4260ad10aae, PacketNumber: 107035, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:08 server <- &wire.PingFrame{} 2025/09/12 02:43:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:08 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:08 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:08 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:08 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 340689d692021b72, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:08 Adding connection ID 8444eb0e. 2025/09/12 02:43:08 Adding connection ID 113b7bd9. 2025/09/12 02:43:08 Adding connection ID 43ba9bf8. 2025/09/12 02:43:08 Adding connection ID 3444b536. 2025/09/12 02:43:08 Adding connection ID 79c54a4d. 2025/09/12 02:43:08 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 09a0b5133e83cbbc 2025/09/12 02:43:08 server Long Header{Type: Initial, DestConnectionID: 340689d692021b72, SrcConnectionID: 13b1127a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 918, Version: v1} 2025/09/12 02:43:08 server -> &wire.AckFrame{LargestAcked: 107035, LowestAcked: 107035, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:08 server Long Header{Type: Handshake, DestConnectionID: 340689d692021b72, SrcConnectionID: 13b1127a, PacketNumber: 0, PacketNumberLen: 2, Length: 172, Version: v1} 2025/09/12 02:43:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 150, Offset + Data length: 150} 2025/09/12 02:43:08 server Short Header{DestConnectionID: 340689d692021b72, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 113b7bd9, StatelessResetToken: 0xef25d049178e18837e73e83eae87da2a} 2025/09/12 02:43:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 43ba9bf8, StatelessResetToken: 0xdeca3098c0d2b876991ee29c4e2ed9ae} 2025/09/12 02:43:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8444eb0e, StatelessResetToken: 0xc0f21190e00682af6cd3525359f8c52f} 2025/09/12 02:43:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3444b536, StatelessResetToken: 0xed373fd650873db7b259ee08ec721c33} 2025/09/12 02:43:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 79c54a4d, StatelessResetToken: 0x15f698db5258d5f7b126c9ef640bd189} 2025/09/12 02:43:08 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:08 server <- Reading packet 0 (85 bytes) for connection 13b1127a, Handshake 2025/09/12 02:43:08 server Long Header{Type: Handshake, DestConnectionID: 13b1127a, SrcConnectionID: 340689d692021b72, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:08 server Dropping Initial keys. 2025/09/12 02:43:08 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368µs} 2025/09/12 02:43:08 server newly acked packets (1): [0] 2025/09/12 02:43:08 server updated RTT: 32.329129ms (σ: 16.164564ms) 2025/09/12 02:43:08 server Canceling loss detection timer. 2025/09/12 02:43:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:08 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:08 server Dropping Handshake keys. 2025/09/12 02:43:08 server <- Reading packet 0 (183 bytes) for connection 13b1127a, 1-RTT 2025/09/12 02:43:08 server Short Header{DestConnectionID: 13b1127a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:08 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 82ee5ba1f08aab96, StatelessResetToken: 0xb26cada5f08a55547160e0782b71f0f5} 2025/09/12 02:43:08 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bd37eac187e9e798, StatelessResetToken: 0xf765036723e5ece5081ccfd9e83ceee9} 2025/09/12 02:43:08 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c1d49222f72ce44a, StatelessResetToken: 0xcbed3714d3edf31b7d542c33620bdfef} 2025/09/12 02:43:08 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:08 server -> Sending packet 1 (305 bytes) for connection 09a0b5133e83cbbc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:08 server Short Header{DestConnectionID: 82ee5ba1f08aab96, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:08 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 258.436µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:08 server -> &wire.NewTokenFrame{Token: 0xd60c86383de40721868cfa133defb05a449019be0d5a5ad95011ba221afc7cc820d84b1a0eb6979ce8e45794c623a7b1f8cfcbfd26a12d793009c16f5aed56df5b76bc818af8ae2950aecc893e15d5213c0d7471ea2230880ea6} 2025/09/12 02:43:08 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:08 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:08 server <- Reading packet 1 (55 bytes) for connection 13b1127a, 1-RTT 2025/09/12 02:43:08 server Short Header{DestConnectionID: 13b1127a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:08 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:08 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:08 server <- Reading packet 2 (55 bytes) for connection 13b1127a, 1-RTT 2025/09/12 02:43:08 server Short Header{DestConnectionID: 13b1127a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:08 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.056ms} 2025/09/12 02:43:08 server newly acked packets (1): [0] 2025/09/12 02:43:08 server updated RTT: 32.373ms (σ: 12.212ms) 2025/09/12 02:43:08 Received request: GET /memntlmfil 2025/09/12 02:43:08 server -> Sending packet 2 (1061 bytes) for connection 09a0b5133e83cbbc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:08 server Short Header{DestConnectionID: 82ee5ba1f08aab96, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:08 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 218.221µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:08 server <- Reading packet 4 (55 bytes) for connection 13b1127a, 1-RTT 2025/09/12 02:43:08 server Short Header{DestConnectionID: 13b1127a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:08 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 4.216ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:08 server newly acked packets (1): [1] 2025/09/12 02:43:08 server updated RTT: 32.725ms (σ: 9.864ms) 2025/09/12 02:43:08 server ECN capability confirmed. 2025/09/12 02:43:08 server Ignoring all packets below 1. 2025/09/12 02:43:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:08 server -> Sending packet 4 (1053 bytes) for connection 09a0b5133e83cbbc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:08 server Short Header{DestConnectionID: 82ee5ba1f08aab96, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:08 server Skipping packet number 5 2025/09/12 02:43:08 server -> Sending packet 6 (1053 bytes) for connection 09a0b5133e83cbbc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:08 server Short Header{DestConnectionID: 82ee5ba1f08aab96, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:08 server <- Reading packet 5 (35 bytes) for connection 13b1127a, 1-RTT 2025/09/12 02:43:08 server Short Header{DestConnectionID: 13b1127a, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:08 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 0}}, DelayTime: 120µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:08 server newly acked packets (1): [6] 2025/09/12 02:43:08 server updated RTT: 32.68ms (σ: 7.486ms) 2025/09/12 02:43:08 server Canceling loss detection timer. 2025/09/12 02:43:08 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:08 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:08 Replacing connection for connection IDs [79c54a4d 13b1127a 8444eb0e 113b7bd9 43ba9bf8 3444b536 09a0b5133e83cbbc] with a closed connection. 2025/09/12 02:43:08 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:08 server Connection 09a0b5133e83cbbc closed. 2025/09/12 02:43:08 Removing connection IDs [79c54a4d 13b1127a 8444eb0e 113b7bd9 43ba9bf8 3444b536 09a0b5133e83cbbc] for a closed connection after it has been retired. 2025/09/12 02:43:08 server <- Received Initial packet. 2025/09/12 02:43:08 Created qlog file: /logs/qlog/777d467a986e978f.sqlog 2025/09/12 02:43:08 server Changing connection ID to 15f3029a. 2025/09/12 02:43:08 Adding connection IDs 777d467a986e978f and 15f3029a for a new connection. 2025/09/12 02:43:08 server <- Reading packet 126209 (1252 bytes) for connection 777d467a986e978f, Initial 2025/09/12 02:43:08 server Long Header{Type: Initial, DestConnectionID: 777d467a986e978f, SrcConnectionID: 467d60470dc7f21a, Token: 0xd60c86383de40721868cfa133defb05a449019be0d5a5ad95011ba221afc7cc820d84b1a0eb6979ce8e45794c623a7b1f8cfcbfd26a12d793009c16f5aed56df5b76bc818af8ae2950aecc893e15d5213c0d7471ea2230880ea6, PacketNumber: 126209, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:08 server <- &wire.PingFrame{} 2025/09/12 02:43:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:08 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:08 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:08 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:08 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 467d60470dc7f21a, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:08 Adding connection ID 6bd728c3. 2025/09/12 02:43:08 Adding connection ID c41e08f6. 2025/09/12 02:43:08 Adding connection ID ff556f90. 2025/09/12 02:43:08 Adding connection ID b8f171fc. 2025/09/12 02:43:08 Adding connection ID ecf10b55. 2025/09/12 02:43:08 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 777d467a986e978f 2025/09/12 02:43:08 server Long Header{Type: Initial, DestConnectionID: 467d60470dc7f21a, SrcConnectionID: 15f3029a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 920, Version: v1} 2025/09/12 02:43:08 server -> &wire.AckFrame{LargestAcked: 126209, LowestAcked: 126209, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:08 server Long Header{Type: Handshake, DestConnectionID: 467d60470dc7f21a, SrcConnectionID: 15f3029a, PacketNumber: 0, PacketNumberLen: 2, Length: 170, Version: v1} 2025/09/12 02:43:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/09/12 02:43:08 server Short Header{DestConnectionID: 467d60470dc7f21a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c41e08f6, StatelessResetToken: 0x6028c1e6fcaf7544cb21ec2b7f9483d8} 2025/09/12 02:43:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: ecf10b55, StatelessResetToken: 0xf311b448455bcc7b187f4d3ea01be4cb} 2025/09/12 02:43:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b8f171fc, StatelessResetToken: 0x8a72cb22f18bf74ed00cb97576d05406} 2025/09/12 02:43:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ff556f90, StatelessResetToken: 0xc7fa8143afcf9b27fbe6b769fe96954e} 2025/09/12 02:43:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6bd728c3, StatelessResetToken: 0x6664dc9cb9cbd7ea42013654497ad3da} 2025/09/12 02:43:08 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:08 server <- Reading packet 0 (85 bytes) for connection 15f3029a, Handshake 2025/09/12 02:43:08 server Long Header{Type: Handshake, DestConnectionID: 15f3029a, SrcConnectionID: 467d60470dc7f21a, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:08 server Dropping Initial keys. 2025/09/12 02:43:08 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 384µs} 2025/09/12 02:43:08 server newly acked packets (1): [0] 2025/09/12 02:43:08 server updated RTT: 32.324347ms (σ: 16.162173ms) 2025/09/12 02:43:08 server Canceling loss detection timer. 2025/09/12 02:43:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:08 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:08 server Dropping Handshake keys. 2025/09/12 02:43:08 server <- Reading packet 0 (183 bytes) for connection 15f3029a, 1-RTT 2025/09/12 02:43:08 server Short Header{DestConnectionID: 15f3029a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:08 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92aa3ce0c33706b2, StatelessResetToken: 0x99e4c0bd9518fdd3643cab6791b53f6b} 2025/09/12 02:43:08 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 589aa38451bc61ee, StatelessResetToken: 0xc9ccc50e2d40ba2796a038b0aeba3e06} 2025/09/12 02:43:08 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 74e08f07cff43bc6, StatelessResetToken: 0xd4866bdc415a1a7b4b11b2782ef960b4} 2025/09/12 02:43:08 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:08 server -> Sending packet 1 (305 bytes) for connection 777d467a986e978f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:08 server Short Header{DestConnectionID: 92aa3ce0c33706b2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:08 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 203.102µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:08 server -> &wire.NewTokenFrame{Token: 0xab423d2b8bcd2f45245d8c0ad8a0cc38c78e1ec88339cfaa46bc7013178edd52bf701ef64d05be26714c392b84c5c0b7ce1a37822ac325188f7f8ec2b2ac772bbb59b4970ce1ba224fa1f5d362070efd275c6b59816294f671fc} 2025/09/12 02:43:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:08 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:08 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:08 server <- Reading packet 1 (55 bytes) for connection 15f3029a, 1-RTT 2025/09/12 02:43:08 server Short Header{DestConnectionID: 15f3029a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:08 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:08 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:08 Received request: GET /dfsempavnb 2025/09/12 02:43:08 server -> Sending packet 2 (1061 bytes) for connection 777d467a986e978f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:08 server Short Header{DestConnectionID: 92aa3ce0c33706b2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:08 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 134.556µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:08 server <- Reading packet 3 (55 bytes) for connection 15f3029a, 1-RTT 2025/09/12 02:43:08 server Short Header{DestConnectionID: 15f3029a, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:08 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7713e7cf628bbfc5, StatelessResetToken: 0x3a44a1ee7a4065b13f020073bd786b97} 2025/09/12 02:43:08 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:08 server -> Sending packet 3 (37 bytes) for connection 777d467a986e978f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:08 server Short Header{DestConnectionID: 92aa3ce0c33706b2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:08 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 70.582µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:08 server <- Reading packet 4 (33 bytes) for connection 15f3029a, 1-RTT 2025/09/12 02:43:08 server Short Header{DestConnectionID: 15f3029a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:08 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 152µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:08 server newly acked packets (3): [0 1 2] 2025/09/12 02:43:08 server updated RTT: 32.255ms (σ: 12.258ms) 2025/09/12 02:43:08 server ECN capability confirmed. 2025/09/12 02:43:08 server Canceling loss detection timer. 2025/09/12 02:43:08 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:08 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:08 Replacing connection for connection IDs [b8f171fc ecf10b55 15f3029a 6bd728c3 c41e08f6 ff556f90 777d467a986e978f] with a closed connection. 2025/09/12 02:43:08 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:08 server Connection 777d467a986e978f closed. 2025/09/12 02:43:08 Removing connection IDs [b8f171fc ecf10b55 15f3029a 6bd728c3 c41e08f6 ff556f90 777d467a986e978f] for a closed connection after it has been retired. 2025/09/12 02:43:09 server <- Received Initial packet. 2025/09/12 02:43:09 Created qlog file: /logs/qlog/9ef6e974b89dc058.sqlog 2025/09/12 02:43:09 server Changing connection ID to 51eb9aab. 2025/09/12 02:43:09 Adding connection IDs 9ef6e974b89dc058 and 51eb9aab for a new connection. 2025/09/12 02:43:09 server <- Reading packet 95898 (1252 bytes) for connection 9ef6e974b89dc058, Initial 2025/09/12 02:43:09 server Long Header{Type: Initial, DestConnectionID: 9ef6e974b89dc058, SrcConnectionID: 8946c48a44206533, Token: 0xab423d2b8bcd2f45245d8c0ad8a0cc38c78e1ec88339cfaa46bc7013178edd52bf701ef64d05be26714c392b84c5c0b7ce1a37822ac325188f7f8ec2b2ac772bbb59b4970ce1ba224fa1f5d362070efd275c6b59816294f671fc, PacketNumber: 95898, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:09 server <- &wire.PingFrame{} 2025/09/12 02:43:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:09 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:09 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:09 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:09 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 8946c48a44206533, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:09 Adding connection ID b9eacd7b. 2025/09/12 02:43:09 Adding connection ID f1ae30db. 2025/09/12 02:43:09 Adding connection ID b5beed9f. 2025/09/12 02:43:09 Adding connection ID 155584ad. 2025/09/12 02:43:09 Adding connection ID b6276989. 2025/09/12 02:43:09 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9ef6e974b89dc058 2025/09/12 02:43:09 server Long Header{Type: Initial, DestConnectionID: 8946c48a44206533, SrcConnectionID: 51eb9aab, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 906, Version: v1} 2025/09/12 02:43:09 server -> &wire.AckFrame{LargestAcked: 95898, LowestAcked: 95898, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:09 server Long Header{Type: Handshake, DestConnectionID: 8946c48a44206533, SrcConnectionID: 51eb9aab, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/09/12 02:43:09 server Short Header{DestConnectionID: 8946c48a44206533, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b9eacd7b, StatelessResetToken: 0xadaf6f5881359290f6e29da6d63e8ec5} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b5beed9f, StatelessResetToken: 0xb109a24ef5e99c37ea97cdd3bd47a5b2} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f1ae30db, StatelessResetToken: 0xe6b944e3864daddaaa2f2dc46b03115e} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b6276989, StatelessResetToken: 0x76c7befc05a4be08e7260d7c0c10d526} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 155584ad, StatelessResetToken: 0xce6e528217fa46091b0dafc7d41db056} 2025/09/12 02:43:09 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:09 server <- Reading packet 0 (85 bytes) for connection 51eb9aab, Handshake 2025/09/12 02:43:09 server Long Header{Type: Handshake, DestConnectionID: 51eb9aab, SrcConnectionID: 8946c48a44206533, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:09 server Dropping Initial keys. 2025/09/12 02:43:09 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 440µs} 2025/09/12 02:43:09 server newly acked packets (1): [0] 2025/09/12 02:43:09 server updated RTT: 32.372934ms (σ: 16.186467ms) 2025/09/12 02:43:09 server Canceling loss detection timer. 2025/09/12 02:43:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:09 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:09 server Dropping Handshake keys. 2025/09/12 02:43:09 server <- Reading packet 0 (183 bytes) for connection 51eb9aab, 1-RTT 2025/09/12 02:43:09 server Short Header{DestConnectionID: 51eb9aab, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:09 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 86c0964316393f3d, StatelessResetToken: 0x511868a9005a3ef45200f272ad0015c5} 2025/09/12 02:43:09 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 61fdeb2430515b3f, StatelessResetToken: 0xfdea00c855b8c48cc8e7dc4b229a57cf} 2025/09/12 02:43:09 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 42638d5d688858c8, StatelessResetToken: 0xd5fd1f43fa47fae68eb7688aa892e376} 2025/09/12 02:43:09 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:09 server <- Reading packet 1 (55 bytes) for connection 51eb9aab, 1-RTT 2025/09/12 02:43:09 server Short Header{DestConnectionID: 51eb9aab, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:09 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:09 server -> Sending packet 1 (305 bytes) for connection 9ef6e974b89dc058, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:09 server Short Header{DestConnectionID: 86c0964316393f3d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 Received request: GET /inoyexusce 2025/09/12 02:43:09 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 386.006µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:09 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:09 server -> &wire.NewTokenFrame{Token: 0x60e160d8dd1e4899dc20be69a1712df63cb1c830e7cf9c8f26411466bf93edfa76f43dfcaadb6caafa284682bf37a5ac369c8efb994ffee1f17dc3c050aee92b3f8064564ef92e563f9007de612857ab0faf0966e8c5399094ec} 2025/09/12 02:43:09 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:09 server <- Reading packet 2 (55 bytes) for connection 51eb9aab, 1-RTT 2025/09/12 02:43:09 server Short Header{DestConnectionID: 51eb9aab, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:09 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:09 server newly acked packets (1): [0] 2025/09/12 02:43:09 server updated RTT: 32.435ms (σ: 12.266ms) 2025/09/12 02:43:09 server -> Sending packet 2 (1053 bytes) for connection 9ef6e974b89dc058, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:09 server Short Header{DestConnectionID: 86c0964316393f3d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:09 server <- Reading packet 3 (55 bytes) for connection 51eb9aab, 1-RTT 2025/09/12 02:43:09 server Short Header{DestConnectionID: 51eb9aab, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:09 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e754a78d15a54cab, StatelessResetToken: 0x95b40e8d1caf14ba50dcf2eabc630cdd} 2025/09/12 02:43:09 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:09 server <- Reading packet 4 (33 bytes) for connection 51eb9aab, 1-RTT 2025/09/12 02:43:09 server Short Header{DestConnectionID: 51eb9aab, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:09 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 104µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:09 server newly acked packets (2): [1 2] 2025/09/12 02:43:09 server updated RTT: 32.35ms (σ: 9.368ms) 2025/09/12 02:43:09 server ECN capability confirmed. 2025/09/12 02:43:09 server Canceling loss detection timer. 2025/09/12 02:43:09 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:09 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:09 Replacing connection for connection IDs [51eb9aab b9eacd7b f1ae30db b5beed9f 155584ad b6276989 9ef6e974b89dc058] with a closed connection. 2025/09/12 02:43:09 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:09 server Connection 9ef6e974b89dc058 closed. 2025/09/12 02:43:09 Removing connection IDs [51eb9aab b9eacd7b f1ae30db b5beed9f 155584ad b6276989 9ef6e974b89dc058] for a closed connection after it has been retired. 2025/09/12 02:43:09 server <- Received Initial packet. 2025/09/12 02:43:09 Created qlog file: /logs/qlog/9e82a93b3e21f480.sqlog 2025/09/12 02:43:09 server Changing connection ID to daafc27f. 2025/09/12 02:43:09 Adding connection IDs 9e82a93b3e21f480 and daafc27f for a new connection. 2025/09/12 02:43:09 server <- Reading packet 67573 (1252 bytes) for connection 9e82a93b3e21f480, Initial 2025/09/12 02:43:09 server Long Header{Type: Initial, DestConnectionID: 9e82a93b3e21f480, SrcConnectionID: c522e33837bcfebb, Token: 0x60e160d8dd1e4899dc20be69a1712df63cb1c830e7cf9c8f26411466bf93edfa76f43dfcaadb6caafa284682bf37a5ac369c8efb994ffee1f17dc3c050aee92b3f8064564ef92e563f9007de612857ab0faf0966e8c5399094ec, PacketNumber: 67573, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:09 server <- &wire.PingFrame{} 2025/09/12 02:43:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:09 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:09 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:09 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:09 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c522e33837bcfebb, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:09 Adding connection ID 954b4394. 2025/09/12 02:43:09 Adding connection ID 7adf9dc5. 2025/09/12 02:43:09 Adding connection ID 42b01adc. 2025/09/12 02:43:09 Adding connection ID d69813ee. 2025/09/12 02:43:09 Adding connection ID b9883472. 2025/09/12 02:43:09 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9e82a93b3e21f480 2025/09/12 02:43:09 server Long Header{Type: Initial, DestConnectionID: c522e33837bcfebb, SrcConnectionID: daafc27f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 916, Version: v1} 2025/09/12 02:43:09 server -> &wire.AckFrame{LargestAcked: 67573, LowestAcked: 67573, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:09 server Long Header{Type: Handshake, DestConnectionID: c522e33837bcfebb, SrcConnectionID: daafc27f, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/09/12 02:43:09 server Short Header{DestConnectionID: c522e33837bcfebb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 954b4394, StatelessResetToken: 0x908498022a121cb3de327b6c5e87b55a} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 42b01adc, StatelessResetToken: 0xfd60a914ba59193b2f962d2c40a90efc} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d69813ee, StatelessResetToken: 0x41116c93d52e14ba335eb739c660b737} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7adf9dc5, StatelessResetToken: 0x6d807baee88a4ea87c99e7973123192c} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b9883472, StatelessResetToken: 0xbd2bc5c43908ec2ed6f0bd99b51709d2} 2025/09/12 02:43:09 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:09 server -> Sending packet 1 (1280 bytes) for connection 9e82a93b3e21f480, Initial 2025/09/12 02:43:09 server Long Header{Type: Initial, DestConnectionID: c522e33837bcfebb, SrcConnectionID: daafc27f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:09 server -> Sending packet 2 (1280 bytes) for connection 9e82a93b3e21f480, Initial 2025/09/12 02:43:09 server Long Header{Type: Initial, DestConnectionID: c522e33837bcfebb, SrcConnectionID: daafc27f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:09 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:09 server -> Sending packet 1 (195 bytes) for connection 9e82a93b3e21f480, Handshake 2025/09/12 02:43:09 server Long Header{Type: Handshake, DestConnectionID: c522e33837bcfebb, SrcConnectionID: daafc27f, PacketNumber: 1, PacketNumberLen: 2, Length: 174, Version: v1} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/09/12 02:43:09 server -> Sending packet 2 (195 bytes) for connection 9e82a93b3e21f480, Handshake 2025/09/12 02:43:09 server Long Header{Type: Handshake, DestConnectionID: c522e33837bcfebb, SrcConnectionID: daafc27f, PacketNumber: 2, PacketNumberLen: 2, Length: 174, Version: v1} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/09/12 02:43:09 server <- Reading packet 0 (42 bytes) for connection daafc27f, Handshake 2025/09/12 02:43:09 server Long Header{Type: Handshake, DestConnectionID: daafc27f, SrcConnectionID: c522e33837bcfebb, PacketNumber: 0, PacketNumberLen: 4, Length: 21, Version: v1} 2025/09/12 02:43:09 server Dropping Initial keys. 2025/09/12 02:43:09 server <- &wire.PingFrame{} 2025/09/12 02:43:09 server -> Sending packet 3 (47 bytes) for connection 9e82a93b3e21f480, Handshake 2025/09/12 02:43:09 server Long Header{Type: Handshake, DestConnectionID: c522e33837bcfebb, SrcConnectionID: daafc27f, PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 02:43:09 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:09 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:09 server <- Reading packet 1 (85 bytes) for connection daafc27f, Handshake 2025/09/12 02:43:09 server Long Header{Type: Handshake, DestConnectionID: daafc27f, SrcConnectionID: c522e33837bcfebb, PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:09 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 192µs} 2025/09/12 02:43:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:09 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:09 server Dropping Handshake keys. 2025/09/12 02:43:09 server <- Reading packet 0 (183 bytes) for connection daafc27f, 1-RTT 2025/09/12 02:43:09 server Short Header{DestConnectionID: daafc27f, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:09 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 737ed56375e06a8b, StatelessResetToken: 0x1f2c9779b7979112208f85f0ade36001} 2025/09/12 02:43:09 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9dc660531d2c4acb, StatelessResetToken: 0x39b828c76fa233b24d5df4ff0f182e8c} 2025/09/12 02:43:09 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a999eaa7be689702, StatelessResetToken: 0x9714a4a69ddecc7de13bb4c1bf03a127} 2025/09/12 02:43:09 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:09 server Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 55 bytes. 2025/09/12 02:43:09 server Dropping %!s(logging.PacketType=1) packet (55 bytes) because we already dropped the keys. 2025/09/12 02:43:09 server <- Reading packet 1 (55 bytes) for connection daafc27f, 1-RTT 2025/09/12 02:43:09 server Short Header{DestConnectionID: daafc27f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:09 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:09 server -> Sending packet 2 (425 bytes) for connection 9e82a93b3e21f480, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:09 Received request: GET /kotzkwtpyw 2025/09/12 02:43:09 server Short Header{DestConnectionID: 737ed56375e06a8b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 251.121µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d69813ee, StatelessResetToken: 0x41116c93d52e14ba335eb739c660b737} 2025/09/12 02:43:09 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 954b4394, StatelessResetToken: 0x908498022a121cb3de327b6c5e87b55a} 2025/09/12 02:43:09 server -> &wire.NewTokenFrame{Token: 0x7405c31c6ca159d0c8eceafa67c8c4586fd0022d88dd9e4899adbbfdc51d1a1bae16177033314ca5278f49fdf7af19946de3d7c7bc49bf73016f9302a2aeed0b8924c2c3d5998996754d61409068a94aa1faba412ee1e9da624c} 2025/09/12 02:43:09 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7adf9dc5, StatelessResetToken: 0x6d807baee88a4ea87c99e7973123192c} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b9883472, StatelessResetToken: 0xbd2bc5c43908ec2ed6f0bd99b51709d2} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 42b01adc, StatelessResetToken: 0xfd60a914ba59193b2f962d2c40a90efc} 2025/09/12 02:43:09 server -> Sending packet 3 (1280 bytes) for connection 9e82a93b3e21f480, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:09 server Short Header{DestConnectionID: 737ed56375e06a8b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 42b01adc, StatelessResetToken: 0xfd60a914ba59193b2f962d2c40a90efc} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d69813ee, StatelessResetToken: 0x41116c93d52e14ba335eb739c660b737} 2025/09/12 02:43:09 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7adf9dc5, StatelessResetToken: 0x6d807baee88a4ea87c99e7973123192c} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 954b4394, StatelessResetToken: 0x908498022a121cb3de327b6c5e87b55a} 2025/09/12 02:43:09 server -> &wire.NewTokenFrame{Token: 0x7405c31c6ca159d0c8eceafa67c8c4586fd0022d88dd9e4899adbbfdc51d1a1bae16177033314ca5278f49fdf7af19946de3d7c7bc49bf73016f9302a2aeed0b8924c2c3d5998996754d61409068a94aa1faba412ee1e9da624c} 2025/09/12 02:43:09 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b9883472, StatelessResetToken: 0xbd2bc5c43908ec2ed6f0bd99b51709d2} 2025/09/12 02:43:09 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 861, Offset + Data length: 861} 2025/09/12 02:43:09 server -> Sending packet 4 (194 bytes) for connection 9e82a93b3e21f480, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:09 server Short Header{DestConnectionID: 737ed56375e06a8b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 861, Data length: 163, Offset + Data length: 1024} 2025/09/12 02:43:09 server <- Reading packet 2 (55 bytes) for connection daafc27f, 1-RTT 2025/09/12 02:43:09 server Short Header{DestConnectionID: daafc27f, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:09 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:09 server newly acked packets (1): [4] 2025/09/12 02:43:09 server updated RTT: 32.297757ms (σ: 16.148878ms) 2025/09/12 02:43:09 server ECN capability confirmed. 2025/09/12 02:43:09 server setting loss timer for packet 3 (1-RTT) to 36.334976ms (in 2025-09-12 02:43:09.547018533 +0000 UTC m=+5.735169178) 2025/09/12 02:43:09 server Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 02:43:09.547018533 +0000 UTC m=+5.735169178 2025/09/12 02:43:09 server lost packet 3 (time threshold) 2025/09/12 02:43:09 server Canceling loss detection timer. 2025/09/12 02:43:09 server -> Sending packet 5 (1280 bytes) for connection 9e82a93b3e21f480, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:09 server Short Header{DestConnectionID: 737ed56375e06a8b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d69813ee, StatelessResetToken: 0x41116c93d52e14ba335eb739c660b737} 2025/09/12 02:43:09 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7adf9dc5, StatelessResetToken: 0x6d807baee88a4ea87c99e7973123192c} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b9883472, StatelessResetToken: 0xbd2bc5c43908ec2ed6f0bd99b51709d2} 2025/09/12 02:43:09 server -> &wire.NewTokenFrame{Token: 0x7405c31c6ca159d0c8eceafa67c8c4586fd0022d88dd9e4899adbbfdc51d1a1bae16177033314ca5278f49fdf7af19946de3d7c7bc49bf73016f9302a2aeed0b8924c2c3d5998996754d61409068a94aa1faba412ee1e9da624c} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:09 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 954b4394, StatelessResetToken: 0x908498022a121cb3de327b6c5e87b55a} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 42b01adc, StatelessResetToken: 0xfd60a914ba59193b2f962d2c40a90efc} 2025/09/12 02:43:09 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 861, Offset + Data length: 861} 2025/09/12 02:43:09 Removing connection ID 9e82a93b3e21f480. 2025/09/12 02:43:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:09 server -> Sending packet 7 (1280 bytes) for connection 9e82a93b3e21f480, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:09 server Short Header{DestConnectionID: 737ed56375e06a8b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:09 server -> &wire.NewTokenFrame{Token: 0x7405c31c6ca159d0c8eceafa67c8c4586fd0022d88dd9e4899adbbfdc51d1a1bae16177033314ca5278f49fdf7af19946de3d7c7bc49bf73016f9302a2aeed0b8924c2c3d5998996754d61409068a94aa1faba412ee1e9da624c} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d69813ee, StatelessResetToken: 0x41116c93d52e14ba335eb739c660b737} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 954b4394, StatelessResetToken: 0x908498022a121cb3de327b6c5e87b55a} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7adf9dc5, StatelessResetToken: 0x6d807baee88a4ea87c99e7973123192c} 2025/09/12 02:43:09 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b9883472, StatelessResetToken: 0xbd2bc5c43908ec2ed6f0bd99b51709d2} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 42b01adc, StatelessResetToken: 0xfd60a914ba59193b2f962d2c40a90efc} 2025/09/12 02:43:09 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 861, Offset + Data length: 861} 2025/09/12 02:43:09 server -> Sending packet 8 (1280 bytes) for connection 9e82a93b3e21f480, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:09 server Short Header{DestConnectionID: 737ed56375e06a8b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 954b4394, StatelessResetToken: 0x908498022a121cb3de327b6c5e87b55a} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d69813ee, StatelessResetToken: 0x41116c93d52e14ba335eb739c660b737} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7adf9dc5, StatelessResetToken: 0x6d807baee88a4ea87c99e7973123192c} 2025/09/12 02:43:09 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 42b01adc, StatelessResetToken: 0xfd60a914ba59193b2f962d2c40a90efc} 2025/09/12 02:43:09 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:09 server -> &wire.NewTokenFrame{Token: 0x7405c31c6ca159d0c8eceafa67c8c4586fd0022d88dd9e4899adbbfdc51d1a1bae16177033314ca5278f49fdf7af19946de3d7c7bc49bf73016f9302a2aeed0b8924c2c3d5998996754d61409068a94aa1faba412ee1e9da624c} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b9883472, StatelessResetToken: 0xbd2bc5c43908ec2ed6f0bd99b51709d2} 2025/09/12 02:43:09 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 861, Offset + Data length: 861} 2025/09/12 02:43:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:43:09 server -> Sending packet 10 (1280 bytes) for connection 9e82a93b3e21f480, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:09 server Short Header{DestConnectionID: 737ed56375e06a8b, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:09 server -> &wire.NewTokenFrame{Token: 0x7405c31c6ca159d0c8eceafa67c8c4586fd0022d88dd9e4899adbbfdc51d1a1bae16177033314ca5278f49fdf7af19946de3d7c7bc49bf73016f9302a2aeed0b8924c2c3d5998996754d61409068a94aa1faba412ee1e9da624c} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 42b01adc, StatelessResetToken: 0xfd60a914ba59193b2f962d2c40a90efc} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b9883472, StatelessResetToken: 0xbd2bc5c43908ec2ed6f0bd99b51709d2} 2025/09/12 02:43:09 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d69813ee, StatelessResetToken: 0x41116c93d52e14ba335eb739c660b737} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 954b4394, StatelessResetToken: 0x908498022a121cb3de327b6c5e87b55a} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7adf9dc5, StatelessResetToken: 0x6d807baee88a4ea87c99e7973123192c} 2025/09/12 02:43:09 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 861, Offset + Data length: 861} 2025/09/12 02:43:09 server -> Sending packet 11 (1280 bytes) for connection 9e82a93b3e21f480, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:09 server Short Header{DestConnectionID: 737ed56375e06a8b, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:09 server -> &wire.NewTokenFrame{Token: 0x7405c31c6ca159d0c8eceafa67c8c4586fd0022d88dd9e4899adbbfdc51d1a1bae16177033314ca5278f49fdf7af19946de3d7c7bc49bf73016f9302a2aeed0b8924c2c3d5998996754d61409068a94aa1faba412ee1e9da624c} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 42b01adc, StatelessResetToken: 0xfd60a914ba59193b2f962d2c40a90efc} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 954b4394, StatelessResetToken: 0x908498022a121cb3de327b6c5e87b55a} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b9883472, StatelessResetToken: 0xbd2bc5c43908ec2ed6f0bd99b51709d2} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d69813ee, StatelessResetToken: 0x41116c93d52e14ba335eb739c660b737} 2025/09/12 02:43:09 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7adf9dc5, StatelessResetToken: 0x6d807baee88a4ea87c99e7973123192c} 2025/09/12 02:43:09 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 861, Offset + Data length: 861} 2025/09/12 02:43:09 server -> Sending packet 12 (1360 bytes) for connection 9e82a93b3e21f480, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:09 server Short Header{DestConnectionID: 737ed56375e06a8b, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:09 server -> &wire.PingFrame{} 2025/09/12 02:43:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:43:10 server -> Sending packet 14 (1280 bytes) for connection 9e82a93b3e21f480, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:10 server Short Header{DestConnectionID: 737ed56375e06a8b, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:10 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 42b01adc, StatelessResetToken: 0xfd60a914ba59193b2f962d2c40a90efc} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d69813ee, StatelessResetToken: 0x41116c93d52e14ba335eb739c660b737} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7adf9dc5, StatelessResetToken: 0x6d807baee88a4ea87c99e7973123192c} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 954b4394, StatelessResetToken: 0x908498022a121cb3de327b6c5e87b55a} 2025/09/12 02:43:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:10 server -> &wire.NewTokenFrame{Token: 0x7405c31c6ca159d0c8eceafa67c8c4586fd0022d88dd9e4899adbbfdc51d1a1bae16177033314ca5278f49fdf7af19946de3d7c7bc49bf73016f9302a2aeed0b8924c2c3d5998996754d61409068a94aa1faba412ee1e9da624c} 2025/09/12 02:43:10 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b9883472, StatelessResetToken: 0xbd2bc5c43908ec2ed6f0bd99b51709d2} 2025/09/12 02:43:10 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 861, Offset + Data length: 861} 2025/09/12 02:43:10 server -> Sending packet 15 (1280 bytes) for connection 9e82a93b3e21f480, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:10 server Short Header{DestConnectionID: 737ed56375e06a8b, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:10 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 954b4394, StatelessResetToken: 0x908498022a121cb3de327b6c5e87b55a} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b9883472, StatelessResetToken: 0xbd2bc5c43908ec2ed6f0bd99b51709d2} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d69813ee, StatelessResetToken: 0x41116c93d52e14ba335eb739c660b737} 2025/09/12 02:43:10 server -> &wire.NewTokenFrame{Token: 0x7405c31c6ca159d0c8eceafa67c8c4586fd0022d88dd9e4899adbbfdc51d1a1bae16177033314ca5278f49fdf7af19946de3d7c7bc49bf73016f9302a2aeed0b8924c2c3d5998996754d61409068a94aa1faba412ee1e9da624c} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 42b01adc, StatelessResetToken: 0xfd60a914ba59193b2f962d2c40a90efc} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7adf9dc5, StatelessResetToken: 0x6d807baee88a4ea87c99e7973123192c} 2025/09/12 02:43:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:10 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:10 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 861, Offset + Data length: 861} 2025/09/12 02:43:10 server <- Reading packet 4 (25 bytes) for connection daafc27f, 1-RTT 2025/09/12 02:43:10 server Short Header{DestConnectionID: daafc27f, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:10 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:10 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:10 Replacing connection for connection IDs [d69813ee b9883472 daafc27f 954b4394 7adf9dc5 42b01adc] with a closed connection. 2025/09/12 02:43:10 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:10 server Connection 9e82a93b3e21f480 closed. 2025/09/12 02:43:10 Removing connection IDs [d69813ee b9883472 daafc27f 954b4394 7adf9dc5 42b01adc] for a closed connection after it has been retired. 2025/09/12 02:43:10 server <- Received Initial packet. 2025/09/12 02:43:10 Created qlog file: /logs/qlog/8519be53d6133c22.sqlog 2025/09/12 02:43:10 server Changing connection ID to fefaaddc. 2025/09/12 02:43:10 Adding connection IDs 8519be53d6133c22 and fefaaddc for a new connection. 2025/09/12 02:43:10 server <- Reading packet 101166 (1252 bytes) for connection 8519be53d6133c22, Initial 2025/09/12 02:43:10 server Long Header{Type: Initial, DestConnectionID: 8519be53d6133c22, SrcConnectionID: 7cf2aec567e2b219, Token: 0x7405c31c6ca159d0c8eceafa67c8c4586fd0022d88dd9e4899adbbfdc51d1a1bae16177033314ca5278f49fdf7af19946de3d7c7bc49bf73016f9302a2aeed0b8924c2c3d5998996754d61409068a94aa1faba412ee1e9da624c, PacketNumber: 101166, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:10 server <- &wire.PingFrame{} 2025/09/12 02:43:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:10 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:10 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:10 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:10 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7cf2aec567e2b219, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:10 Adding connection ID 201aa849. 2025/09/12 02:43:10 Adding connection ID 38b38cd0. 2025/09/12 02:43:10 Adding connection ID ea4d9a2e. 2025/09/12 02:43:10 Adding connection ID 90b7f0d4. 2025/09/12 02:43:10 Adding connection ID e7c7e6b6. 2025/09/12 02:43:10 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8519be53d6133c22 2025/09/12 02:43:10 server Long Header{Type: Initial, DestConnectionID: 7cf2aec567e2b219, SrcConnectionID: fefaaddc, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 907, Version: v1} 2025/09/12 02:43:10 server -> &wire.AckFrame{LargestAcked: 101166, LowestAcked: 101166, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:10 server Long Header{Type: Handshake, DestConnectionID: 7cf2aec567e2b219, SrcConnectionID: fefaaddc, PacketNumber: 0, PacketNumberLen: 2, Length: 183, Version: v1} 2025/09/12 02:43:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/09/12 02:43:10 server Short Header{DestConnectionID: 7cf2aec567e2b219, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 38b38cd0, StatelessResetToken: 0x460b06a6c0dcfb6cff4100b9af9a2286} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 90b7f0d4, StatelessResetToken: 0x482cc4afe9874ee3de7006233c39ceeb} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 201aa849, StatelessResetToken: 0xeb6cf617159907f65bf7e09760b70fb4} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e7c7e6b6, StatelessResetToken: 0xaf61909307cfe73177ad074ac9156b57} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ea4d9a2e, StatelessResetToken: 0xa69c3fcdd266927127db71e0c6521dae} 2025/09/12 02:43:10 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:10 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:10 server -> Sending packet 1 (1280 bytes) for connection 8519be53d6133c22, Initial 2025/09/12 02:43:10 server Long Header{Type: Initial, DestConnectionID: 7cf2aec567e2b219, SrcConnectionID: fefaaddc, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:10 server -> Sending packet 2 (1280 bytes) for connection 8519be53d6133c22, Initial 2025/09/12 02:43:10 server Long Header{Type: Initial, DestConnectionID: 7cf2aec567e2b219, SrcConnectionID: fefaaddc, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:10 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:10 server -> Sending packet 1 (204 bytes) for connection 8519be53d6133c22, Handshake 2025/09/12 02:43:10 server Long Header{Type: Handshake, DestConnectionID: 7cf2aec567e2b219, SrcConnectionID: fefaaddc, PacketNumber: 1, PacketNumberLen: 2, Length: 183, Version: v1} 2025/09/12 02:43:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/09/12 02:43:10 server -> Sending packet 2 (204 bytes) for connection 8519be53d6133c22, Handshake 2025/09/12 02:43:10 server Long Header{Type: Handshake, DestConnectionID: 7cf2aec567e2b219, SrcConnectionID: fefaaddc, PacketNumber: 2, PacketNumberLen: 2, Length: 183, Version: v1} 2025/09/12 02:43:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/09/12 02:43:10 server <- Reading packet 1 (183 bytes) for connection fefaaddc, Handshake 2025/09/12 02:43:10 server Long Header{Type: Handshake, DestConnectionID: fefaaddc, SrcConnectionID: 7cf2aec567e2b219, PacketNumber: 1, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:10 server Dropping Initial keys. 2025/09/12 02:43:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:10 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:10 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 83.896ms} 2025/09/12 02:43:10 server Dropping Handshake keys. 2025/09/12 02:43:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:10 server -> Sending packet 2 (415 bytes) for connection 8519be53d6133c22, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:10 server Short Header{DestConnectionID: 7cf2aec567e2b219, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 201aa849, StatelessResetToken: 0xeb6cf617159907f65bf7e09760b70fb4} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ea4d9a2e, StatelessResetToken: 0xa69c3fcdd266927127db71e0c6521dae} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 38b38cd0, StatelessResetToken: 0x460b06a6c0dcfb6cff4100b9af9a2286} 2025/09/12 02:43:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e7c7e6b6, StatelessResetToken: 0xaf61909307cfe73177ad074ac9156b57} 2025/09/12 02:43:10 server -> &wire.NewTokenFrame{Token: 0xaa3df0b55ebeabc7d11c73f9f152639ad8e7560306284b3581ad6c9d4a99de6a04858474b9264548935ce04ea15a03763ad89a4327aa445de22cf52dc2a324d788650a25dc0175c961b8cd7bb9f81fbaedcd48de0d12cde578df} 2025/09/12 02:43:10 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 90b7f0d4, StatelessResetToken: 0x482cc4afe9874ee3de7006233c39ceeb} 2025/09/12 02:43:10 server -> Sending packet 3 (415 bytes) for connection 8519be53d6133c22, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:10 server Short Header{DestConnectionID: 7cf2aec567e2b219, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 201aa849, StatelessResetToken: 0xeb6cf617159907f65bf7e09760b70fb4} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 38b38cd0, StatelessResetToken: 0x460b06a6c0dcfb6cff4100b9af9a2286} 2025/09/12 02:43:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:10 server -> &wire.NewTokenFrame{Token: 0xaa3df0b55ebeabc7d11c73f9f152639ad8e7560306284b3581ad6c9d4a99de6a04858474b9264548935ce04ea15a03763ad89a4327aa445de22cf52dc2a324d788650a25dc0175c961b8cd7bb9f81fbaedcd48de0d12cde578df} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ea4d9a2e, StatelessResetToken: 0xa69c3fcdd266927127db71e0c6521dae} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 90b7f0d4, StatelessResetToken: 0x482cc4afe9874ee3de7006233c39ceeb} 2025/09/12 02:43:10 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e7c7e6b6, StatelessResetToken: 0xaf61909307cfe73177ad074ac9156b57} 2025/09/12 02:43:10 server <- Reading packet 2 (55 bytes) for connection fefaaddc, 1-RTT 2025/09/12 02:43:10 server Short Header{DestConnectionID: fefaaddc, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:10 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:10 server <- Reading packet 3 (55 bytes) for connection fefaaddc, 1-RTT 2025/09/12 02:43:10 server Short Header{DestConnectionID: fefaaddc, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:10 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:10 server <- Reading packet 4 (55 bytes) for connection fefaaddc, 1-RTT 2025/09/12 02:43:10 server Short Header{DestConnectionID: fefaaddc, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:10 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 4.232ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:10 server newly acked packets (1): [3] 2025/09/12 02:43:10 server updated RTT: 35.54402ms (σ: 17.77201ms) 2025/09/12 02:43:10 server ECN capability confirmed. 2025/09/12 02:43:10 server Canceling loss detection timer. 2025/09/12 02:43:10 Removing connection ID 8519be53d6133c22. 2025/09/12 02:43:11 server <- Reading packet 5 (183 bytes) for connection fefaaddc, 1-RTT 2025/09/12 02:43:11 server Short Header{DestConnectionID: fefaaddc, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:11 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ba8c2e933339bfe2, StatelessResetToken: 0x7b042905302b8946813683d131305072} 2025/09/12 02:43:11 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9f8351a0e8dff945, StatelessResetToken: 0xc56ac8eded84349441bf31626f38104a} 2025/09/12 02:43:11 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0ecd26b7a0a94afd, StatelessResetToken: 0xb79e42bad67d7cec6e3015c55f59bbfb} 2025/09/12 02:43:11 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 171.296ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:11 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:11 server -> Sending packet 4 (1360 bytes) for connection 8519be53d6133c22, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:11 server Short Header{DestConnectionID: ba8c2e933339bfe2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:11 server -> &wire.PingFrame{} 2025/09/12 02:43:11 server -> Sending packet 5 (37 bytes) for connection 8519be53d6133c22, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:11 server Short Header{DestConnectionID: ba8c2e933339bfe2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:11 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 191.5µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:11 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:11 server <- Reading packet 6 (183 bytes) for connection fefaaddc, 1-RTT 2025/09/12 02:43:11 server Short Header{DestConnectionID: fefaaddc, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:11 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 56µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:11 server newly acked packets (1): [5] 2025/09/12 02:43:11 server updated RTT: 35.1ms (σ: 14.216ms) 2025/09/12 02:43:11 server setting loss timer for packet 4 (1-RTT) to 39.4875ms (in 2025-09-12 02:43:11.054452266 +0000 UTC m=+7.242602921) 2025/09/12 02:43:11 server Canceling loss detection timer. 2025/09/12 02:43:11 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 43988d75c568a30d, StatelessResetToken: 0x9b2b2895253f392467b94c2ee90610db} 2025/09/12 02:43:11 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:11 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:11 server Ignoring all packets below 6. 2025/09/12 02:43:11 Received request: GET /zxzzlsqlbr 2025/09/12 02:43:11 server -> Sending packet 6 (1061 bytes) for connection 8519be53d6133c22, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:11 server Short Header{DestConnectionID: ba8c2e933339bfe2, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:11 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 271.31µs, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 02:43:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:11 server Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 02:43:11.054452266 +0000 UTC m=+7.242602921 2025/09/12 02:43:11 server lost packet 4 (time threshold) 2025/09/12 02:43:11 server <- Reading packet 7 (183 bytes) for connection fefaaddc, 1-RTT 2025/09/12 02:43:11 server Short Header{DestConnectionID: fefaaddc, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:11 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 43988d75c568a30d, StatelessResetToken: 0x9b2b2895253f392467b94c2ee90610db} 2025/09/12 02:43:11 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 97.84ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:11 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:11 server <- Reading packet 8 (55 bytes) for connection fefaaddc, 1-RTT 2025/09/12 02:43:11 server Short Header{DestConnectionID: fefaaddc, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:11 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:11 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/09/12 02:43:11 server -> Sending packet 7 (35 bytes) for connection 8519be53d6133c22, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:11 server Short Header{DestConnectionID: ba8c2e933339bfe2, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:11 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 136.817µs, ECT0: 0, ECT1: 7, CE: 0} 2025/09/12 02:43:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:11 server -> Sending packet 9 (1053 bytes) for connection 8519be53d6133c22, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:11 server Short Header{DestConnectionID: ba8c2e933339bfe2, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:11 server -> Sending packet 10 (1053 bytes) for connection 8519be53d6133c22, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:11 server Short Header{DestConnectionID: ba8c2e933339bfe2, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:11 server <- Reading packet 9 (37 bytes) for connection fefaaddc, 1-RTT 2025/09/12 02:43:11 server Short Header{DestConnectionID: fefaaddc, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:11 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 160µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 02:43:11 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:11 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:11 Replacing connection for connection IDs [ea4d9a2e 90b7f0d4 e7c7e6b6 fefaaddc 201aa849 38b38cd0] with a closed connection. 2025/09/12 02:43:11 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:11 server Connection 8519be53d6133c22 closed. 2025/09/12 02:43:11 Removing connection IDs [ea4d9a2e 90b7f0d4 e7c7e6b6 fefaaddc 201aa849 38b38cd0] for a closed connection after it has been retired. 2025/09/12 02:43:11 server <- Received Initial packet. 2025/09/12 02:43:11 Created qlog file: /logs/qlog/b837f228ef82a923.sqlog 2025/09/12 02:43:11 server Changing connection ID to fc47d899. 2025/09/12 02:43:11 Adding connection IDs b837f228ef82a923 and fc47d899 for a new connection. 2025/09/12 02:43:11 server <- Reading packet 101558 (1252 bytes) for connection b837f228ef82a923, Initial 2025/09/12 02:43:11 server Long Header{Type: Initial, DestConnectionID: b837f228ef82a923, SrcConnectionID: 25f0aee106d3d1a2, Token: 0xaa3df0b55ebeabc7d11c73f9f152639ad8e7560306284b3581ad6c9d4a99de6a04858474b9264548935ce04ea15a03763ad89a4327aa445de22cf52dc2a324d788650a25dc0175c961b8cd7bb9f81fbaedcd48de0d12cde578df, PacketNumber: 101558, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:11 server <- &wire.PingFrame{} 2025/09/12 02:43:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:11 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:11 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:11 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:11 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 25f0aee106d3d1a2, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:11 Adding connection ID fd2a1849. 2025/09/12 02:43:11 Adding connection ID c33d834a. 2025/09/12 02:43:11 Adding connection ID c02acca2. 2025/09/12 02:43:11 Adding connection ID 1eff7fbe. 2025/09/12 02:43:11 Adding connection ID 4d62a5c2. 2025/09/12 02:43:11 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b837f228ef82a923 2025/09/12 02:43:11 server Long Header{Type: Initial, DestConnectionID: 25f0aee106d3d1a2, SrcConnectionID: fc47d899, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 906, Version: v1} 2025/09/12 02:43:11 server -> &wire.AckFrame{LargestAcked: 101558, LowestAcked: 101558, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:11 server Long Header{Type: Handshake, DestConnectionID: 25f0aee106d3d1a2, SrcConnectionID: fc47d899, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/09/12 02:43:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/09/12 02:43:11 server Short Header{DestConnectionID: 25f0aee106d3d1a2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c02acca2, StatelessResetToken: 0xbb9cbee2958191c315b56bb78786b520} 2025/09/12 02:43:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4d62a5c2, StatelessResetToken: 0xb3d408df9efa3dbb17d0802775533e88} 2025/09/12 02:43:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1eff7fbe, StatelessResetToken: 0x20c9cfe7b1459fec6aed0dbbaf154a26} 2025/09/12 02:43:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fd2a1849, StatelessResetToken: 0x718b34b2fd62adcc51d87967db43ae33} 2025/09/12 02:43:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c33d834a, StatelessResetToken: 0x35505910299fe984d0aeda84026a81ee} 2025/09/12 02:43:11 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:11 server <- Reading packet 0 (85 bytes) for connection fc47d899, Handshake 2025/09/12 02:43:11 server Long Header{Type: Handshake, DestConnectionID: fc47d899, SrcConnectionID: 25f0aee106d3d1a2, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:11 server Dropping Initial keys. 2025/09/12 02:43:11 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 352µs} 2025/09/12 02:43:11 server newly acked packets (1): [0] 2025/09/12 02:43:11 server updated RTT: 32.286447ms (σ: 16.143223ms) 2025/09/12 02:43:11 server Canceling loss detection timer. 2025/09/12 02:43:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:11 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:11 server Dropping Handshake keys. 2025/09/12 02:43:11 server <- Reading packet 0 (183 bytes) for connection fc47d899, 1-RTT 2025/09/12 02:43:11 server Short Header{DestConnectionID: fc47d899, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:11 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7787e12d64da32f8, StatelessResetToken: 0x337ae21f9fdc366e6a8aa38a567d42ef} 2025/09/12 02:43:11 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1201a55325d062fb, StatelessResetToken: 0xd0b31f1084a9c94543be2c00eae7295e} 2025/09/12 02:43:11 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 084d315f0b030266, StatelessResetToken: 0x3c64ce0287ddc0296d4ad2e4dd41dbc7} 2025/09/12 02:43:11 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:11 server -> Sending packet 1 (305 bytes) for connection b837f228ef82a923, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:11 server Short Header{DestConnectionID: 7787e12d64da32f8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:11 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 323.488µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:11 server -> &wire.NewTokenFrame{Token: 0xbbb87d70d7ba3839be2e48f788e05200bf96db71a7f6f8624a1a28ff1ce32fea907aad2dff8010bf5803442f69a0fc3197a8bad284de89cdedb141a89feacc96c7d7af028fdd11322e73cdc6bf5ac84f117e24a42b978324fae7} 2025/09/12 02:43:11 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:11 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:11 server <- Reading packet 2 (55 bytes) for connection fc47d899, 1-RTT 2025/09/12 02:43:11 server Short Header{DestConnectionID: fc47d899, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:11 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.056ms} 2025/09/12 02:43:11 server newly acked packets (1): [0] 2025/09/12 02:43:11 server updated RTT: 32.339ms (σ: 12.214ms) 2025/09/12 02:43:11 server <- Reading packet 4 (55 bytes) for connection fc47d899, 1-RTT 2025/09/12 02:43:11 server Short Header{DestConnectionID: fc47d899, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:11 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 4.24ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:11 server newly acked packets (1): [1] 2025/09/12 02:43:11 server updated RTT: 32.69ms (σ: 9.863ms) 2025/09/12 02:43:11 server ECN capability confirmed. 2025/09/12 02:43:11 server Canceling loss detection timer. 2025/09/12 02:43:11 server Ignoring all packets below 1. 2025/09/12 02:43:11 Removing connection ID b837f228ef82a923. 2025/09/12 02:43:11 server -> Sending packet 2 (1360 bytes) for connection b837f228ef82a923, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:11 server Short Header{DestConnectionID: 7787e12d64da32f8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:11 server -> &wire.PingFrame{} 2025/09/12 02:43:11 server <- Reading packet 7 (55 bytes) for connection fc47d899, 1-RTT 2025/09/12 02:43:11 server Short Header{DestConnectionID: fc47d899, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:11 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 4.008ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:11 server newly acked packets (1): [2] 2025/09/12 02:43:11 server updated RTT: 33.076ms (σ: 8.17ms) 2025/09/12 02:43:12 server <- Reading packet 8 (55 bytes) for connection fc47d899, 1-RTT 2025/09/12 02:43:12 server Short Header{DestConnectionID: fc47d899, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:12 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:12 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:12 server -> Sending packet 3 (1400 bytes) for connection b837f228ef82a923, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:12 server Short Header{DestConnectionID: 7787e12d64da32f8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 Received request: GET /rkpglkbjkp 2025/09/12 02:43:12 server -> &wire.PingFrame{} 2025/09/12 02:43:12 server -> Sending packet 4 (1065 bytes) for connection b837f228ef82a923, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:12 server Short Header{DestConnectionID: 7787e12d64da32f8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 263.276µs, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 02:43:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:12 server <- Reading packet 9 (55 bytes) for connection fc47d899, 1-RTT 2025/09/12 02:43:12 server Short Header{DestConnectionID: fc47d899, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:12 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 4ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:12 server newly acked packets (1): [3] 2025/09/12 02:43:12 server updated RTT: 33.426ms (σ: 6.827ms) 2025/09/12 02:43:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:12 server -> Sending packet 6 (1053 bytes) for connection b837f228ef82a923, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:12 server Short Header{DestConnectionID: 7787e12d64da32f8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:12 server -> Sending packet 7 (1053 bytes) for connection b837f228ef82a923, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:12 server Short Header{DestConnectionID: 7787e12d64da32f8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:43:12 server -> Sending packet 9 (1053 bytes) for connection b837f228ef82a923, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:12 server Short Header{DestConnectionID: 7787e12d64da32f8, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:12 server -> Sending packet 10 (1053 bytes) for connection b837f228ef82a923, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:12 server Short Header{DestConnectionID: 7787e12d64da32f8, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:12 server -> Sending packet 11 (1420 bytes) for connection b837f228ef82a923, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:12 server Short Header{DestConnectionID: 7787e12d64da32f8, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 server -> &wire.PingFrame{} 2025/09/12 02:43:12 server <- Reading packet 11 (25 bytes) for connection fc47d899, 1-RTT 2025/09/12 02:43:12 server Short Header{DestConnectionID: fc47d899, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:12 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:12 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:12 Replacing connection for connection IDs [fc47d899 fd2a1849 c33d834a c02acca2 1eff7fbe 4d62a5c2] with a closed connection. 2025/09/12 02:43:12 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:12 server Connection b837f228ef82a923 closed. 2025/09/12 02:43:12 server <- Received Initial packet. 2025/09/12 02:43:12 Created qlog file: /logs/qlog/23e07d008c598d4d.sqlog 2025/09/12 02:43:12 server Changing connection ID to 63fde745. 2025/09/12 02:43:12 Adding connection IDs 23e07d008c598d4d and 63fde745 for a new connection. 2025/09/12 02:43:12 server <- Reading packet 101309 (1252 bytes) for connection 23e07d008c598d4d, Initial 2025/09/12 02:43:12 server Long Header{Type: Initial, DestConnectionID: 23e07d008c598d4d, SrcConnectionID: fed3fd957b760570, Token: 0xbbb87d70d7ba3839be2e48f788e05200bf96db71a7f6f8624a1a28ff1ce32fea907aad2dff8010bf5803442f69a0fc3197a8bad284de89cdedb141a89feacc96c7d7af028fdd11322e73cdc6bf5ac84f117e24a42b978324fae7, PacketNumber: 101309, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:12 server <- &wire.PingFrame{} 2025/09/12 02:43:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:12 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:12 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:12 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:12 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: fed3fd957b760570, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:12 Adding connection ID 730a1b9f. 2025/09/12 02:43:12 Adding connection ID 8b868eef. 2025/09/12 02:43:12 Adding connection ID 0b84b216. 2025/09/12 02:43:12 Adding connection ID 64fc6a27. 2025/09/12 02:43:12 Adding connection ID b5c16202. 2025/09/12 02:43:12 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 23e07d008c598d4d 2025/09/12 02:43:12 server Long Header{Type: Initial, DestConnectionID: fed3fd957b760570, SrcConnectionID: 63fde745, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 919, Version: v1} 2025/09/12 02:43:12 server -> &wire.AckFrame{LargestAcked: 101309, LowestAcked: 101309, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:12 server Long Header{Type: Handshake, DestConnectionID: fed3fd957b760570, SrcConnectionID: 63fde745, PacketNumber: 0, PacketNumberLen: 2, Length: 171, Version: v1} 2025/09/12 02:43:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/09/12 02:43:12 server Short Header{DestConnectionID: fed3fd957b760570, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 64fc6a27, StatelessResetToken: 0x5acad89867c546644f34f1b92719bb4b} 2025/09/12 02:43:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8b868eef, StatelessResetToken: 0xbfb4178ec4c8cdaf86d9d62acd88ec6d} 2025/09/12 02:43:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b5c16202, StatelessResetToken: 0x48da7a03ad1a471d7a018098b50cf6a1} 2025/09/12 02:43:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 730a1b9f, StatelessResetToken: 0xc84b6a3ae403b4c0140f7148b46602bb} 2025/09/12 02:43:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b84b216, StatelessResetToken: 0x9554b6f2d2a09c2236c3284fa8a59689} 2025/09/12 02:43:12 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:12 server <- Reading packet 0 (85 bytes) for connection 63fde745, Handshake 2025/09/12 02:43:12 server Long Header{Type: Handshake, DestConnectionID: 63fde745, SrcConnectionID: fed3fd957b760570, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:12 server Dropping Initial keys. 2025/09/12 02:43:12 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 304µs} 2025/09/12 02:43:12 server newly acked packets (1): [0] 2025/09/12 02:43:12 server updated RTT: 32.189017ms (σ: 16.094508ms) 2025/09/12 02:43:12 server Canceling loss detection timer. 2025/09/12 02:43:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:12 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:12 server Dropping Handshake keys. 2025/09/12 02:43:12 server <- Reading packet 0 (183 bytes) for connection 63fde745, 1-RTT 2025/09/12 02:43:12 server Short Header{DestConnectionID: 63fde745, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:12 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2f1188873471dba7, StatelessResetToken: 0x5a13ed77db6aa6abf55d5309d2727084} 2025/09/12 02:43:12 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e709755b858f7050, StatelessResetToken: 0x4507c8f3557e32f9bf0d6d9f59a90409} 2025/09/12 02:43:12 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 19c88ed3f999902e, StatelessResetToken: 0x6a16024c650e4b07bc47a88a4284e9ab} 2025/09/12 02:43:12 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:12 server -> Sending packet 1 (305 bytes) for connection 23e07d008c598d4d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:12 server Short Header{DestConnectionID: 2f1188873471dba7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 288.984µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:12 server -> &wire.NewTokenFrame{Token: 0x0b238a66a6ea0983c01b825c9b725c7da48e37ae217200066d6c565a6c040bcd242dccc1411672942cd325bcaf75d8da46a8dfb2d9400a9d21f6ada8085a21c77e0f438d995a91431e1d04ff7e0eaa752999d743b18bbeae8e8d} 2025/09/12 02:43:12 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:12 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:12 server <- Reading packet 2 (55 bytes) for connection 63fde745, 1-RTT 2025/09/12 02:43:12 server Short Header{DestConnectionID: 63fde745, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:12 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.056ms} 2025/09/12 02:43:12 server newly acked packets (1): [0] 2025/09/12 02:43:12 server updated RTT: 32.252ms (σ: 12.197ms) 2025/09/12 02:43:12 server <- Reading packet 3 (55 bytes) for connection 63fde745, 1-RTT 2025/09/12 02:43:12 server Short Header{DestConnectionID: 63fde745, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:12 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0e2d0cc9b51aa636, StatelessResetToken: 0xfd1e6b72206e38d99e9920e46f6795eb} 2025/09/12 02:43:12 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:12 server -> Sending packet 2 (37 bytes) for connection 23e07d008c598d4d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:12 server Short Header{DestConnectionID: 2f1188873471dba7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 72.927µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:12 Removing connection IDs [fc47d899 fd2a1849 c33d834a c02acca2 1eff7fbe 4d62a5c2] for a closed connection after it has been retired. 2025/09/12 02:43:12 server <- Reading packet 5 (55 bytes) for connection 63fde745, 1-RTT 2025/09/12 02:43:12 server Short Header{DestConnectionID: 63fde745, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:12 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:12 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:12 server -> Sending packet 3 (39 bytes) for connection 23e07d008c598d4d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:12 server Short Header{DestConnectionID: 2f1188873471dba7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 Received request: GET /xoidbggyjj 2025/09/12 02:43:12 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 94.648µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:12 server -> Sending packet 4 (1053 bytes) for connection 23e07d008c598d4d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:12 server Short Header{DestConnectionID: 2f1188873471dba7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:12 server <- Reading packet 6 (33 bytes) for connection 63fde745, 1-RTT 2025/09/12 02:43:12 server Short Header{DestConnectionID: 63fde745, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:12 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 112µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:43:12 server newly acked packets (2): [1 4] 2025/09/12 02:43:12 server updated RTT: 32.159ms (σ: 9.332ms) 2025/09/12 02:43:12 server ECN capability confirmed. 2025/09/12 02:43:12 server Canceling loss detection timer. 2025/09/12 02:43:12 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:12 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:12 Replacing connection for connection IDs [63fde745 730a1b9f 8b868eef 0b84b216 64fc6a27 b5c16202 23e07d008c598d4d] with a closed connection. 2025/09/12 02:43:12 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:12 server Connection 23e07d008c598d4d closed. 2025/09/12 02:43:12 Removing connection IDs [63fde745 730a1b9f 8b868eef 0b84b216 64fc6a27 b5c16202 23e07d008c598d4d] for a closed connection after it has been retired. 2025/09/12 02:43:12 server <- Received Initial packet. 2025/09/12 02:43:12 Created qlog file: /logs/qlog/48ab4d1bd2597313.sqlog 2025/09/12 02:43:12 server Changing connection ID to b3e973bf. 2025/09/12 02:43:12 Adding connection IDs 48ab4d1bd2597313 and b3e973bf for a new connection. 2025/09/12 02:43:12 server <- Reading packet 93900 (1252 bytes) for connection 48ab4d1bd2597313, Initial 2025/09/12 02:43:12 server Long Header{Type: Initial, DestConnectionID: 48ab4d1bd2597313, SrcConnectionID: ce26fc684d8214cd, Token: 0x0b238a66a6ea0983c01b825c9b725c7da48e37ae217200066d6c565a6c040bcd242dccc1411672942cd325bcaf75d8da46a8dfb2d9400a9d21f6ada8085a21c77e0f438d995a91431e1d04ff7e0eaa752999d743b18bbeae8e8d, PacketNumber: 93900, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:12 server <- &wire.PingFrame{} 2025/09/12 02:43:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:12 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:12 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:12 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:12 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: ce26fc684d8214cd, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:12 Adding connection ID 351ae5f8. 2025/09/12 02:43:12 Adding connection ID bdf8509b. 2025/09/12 02:43:12 Adding connection ID eb293256. 2025/09/12 02:43:12 Adding connection ID db54d0f3. 2025/09/12 02:43:12 Adding connection ID 7609a949. 2025/09/12 02:43:12 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 48ab4d1bd2597313 2025/09/12 02:43:12 server Long Header{Type: Initial, DestConnectionID: ce26fc684d8214cd, SrcConnectionID: b3e973bf, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 906, Version: v1} 2025/09/12 02:43:12 server -> &wire.AckFrame{LargestAcked: 93900, LowestAcked: 93900, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:12 server Long Header{Type: Handshake, DestConnectionID: ce26fc684d8214cd, SrcConnectionID: b3e973bf, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/09/12 02:43:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/09/12 02:43:12 server Short Header{DestConnectionID: ce26fc684d8214cd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 7609a949, StatelessResetToken: 0x9afa78421bc1b42c820e8a3c81446627} 2025/09/12 02:43:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: db54d0f3, StatelessResetToken: 0x7e4646dfd7ff80c0840090f4f15560cb} 2025/09/12 02:43:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bdf8509b, StatelessResetToken: 0x17a796a45e8e792a22810bf9e506635b} 2025/09/12 02:43:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eb293256, StatelessResetToken: 0xf9ee7fd690ea04d8d306bda1b245f477} 2025/09/12 02:43:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 351ae5f8, StatelessResetToken: 0x53ef2cf06655d18f5136ec4795f349fe} 2025/09/12 02:43:12 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:12 server -> Sending packet 1 (1280 bytes) for connection 48ab4d1bd2597313, Initial 2025/09/12 02:43:12 server Long Header{Type: Initial, DestConnectionID: ce26fc684d8214cd, SrcConnectionID: b3e973bf, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:12 server -> Sending packet 2 (1280 bytes) for connection 48ab4d1bd2597313, Initial 2025/09/12 02:43:12 server Long Header{Type: Initial, DestConnectionID: ce26fc684d8214cd, SrcConnectionID: b3e973bf, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:12 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:12 server -> Sending packet 1 (205 bytes) for connection 48ab4d1bd2597313, Handshake 2025/09/12 02:43:12 server Long Header{Type: Handshake, DestConnectionID: ce26fc684d8214cd, SrcConnectionID: b3e973bf, PacketNumber: 1, PacketNumberLen: 2, Length: 184, Version: v1} 2025/09/12 02:43:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/09/12 02:43:12 server -> Sending packet 2 (205 bytes) for connection 48ab4d1bd2597313, Handshake 2025/09/12 02:43:12 server Long Header{Type: Handshake, DestConnectionID: ce26fc684d8214cd, SrcConnectionID: b3e973bf, PacketNumber: 2, PacketNumberLen: 2, Length: 184, Version: v1} 2025/09/12 02:43:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/09/12 02:43:13 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:13 server <- Reading packet 1 (85 bytes) for connection b3e973bf, Handshake 2025/09/12 02:43:13 server Long Header{Type: Handshake, DestConnectionID: b3e973bf, SrcConnectionID: ce26fc684d8214cd, PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:13 server Dropping Initial keys. 2025/09/12 02:43:13 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 64µs} 2025/09/12 02:43:13 server newly acked packets (1): [2] 2025/09/12 02:43:13 server updated RTT: 31.31861ms (σ: 15.659305ms) 2025/09/12 02:43:13 server Canceling loss detection timer. 2025/09/12 02:43:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:13 server Dropping Handshake keys. 2025/09/12 02:43:13 server <- Reading packet 0 (183 bytes) for connection b3e973bf, 1-RTT 2025/09/12 02:43:13 server Short Header{DestConnectionID: b3e973bf, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:13 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a31c939a64b5e0ee, StatelessResetToken: 0x119d2dcb2773bca4bb6e8ba22478fdce} 2025/09/12 02:43:13 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 603dd9b5495ac211, StatelessResetToken: 0xa191cba6f1440465d8e59804775b980a} 2025/09/12 02:43:13 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fd1c99b9f2b2224f, StatelessResetToken: 0x337c30739afec19a78c2a4fa1de30d71} 2025/09/12 02:43:13 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:13 server -> Sending packet 1 (305 bytes) for connection 48ab4d1bd2597313, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:13 server Short Header{DestConnectionID: a31c939a64b5e0ee, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:13 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 234.682µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:13 server -> &wire.NewTokenFrame{Token: 0xe94593b583d3284f493144ff8041b79ee42dfadad69ab5f18be872e42660f5e92d6b9bd85e8b1ed742db7e0fa2f1f098bfd802e8febb75cbabe468d1e9a466e8d6c8c375e5430c3737640c248593639322a687d32a53d86762c0} 2025/09/12 02:43:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:13 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:13 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:13 server <- Reading packet 1 (55 bytes) for connection b3e973bf, 1-RTT 2025/09/12 02:43:13 server Short Header{DestConnectionID: b3e973bf, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:13 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:13 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:13 Received request: GET /laqxnfzbwy 2025/09/12 02:43:13 server -> Sending packet 2 (1061 bytes) for connection 48ab4d1bd2597313, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:13 server Short Header{DestConnectionID: a31c939a64b5e0ee, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:13 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 322.912µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:13 server <- Reading packet 2 (55 bytes) for connection b3e973bf, 1-RTT 2025/09/12 02:43:13 server Short Header{DestConnectionID: b3e973bf, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:13 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8c30048daf6c4c95, StatelessResetToken: 0xbe212113405e00c4a90210d5cc11bd3e} 2025/09/12 02:43:13 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:13 server Sending ACK because the ACK timer expired. 2025/09/12 02:43:13 server -> Sending packet 3 (36 bytes) for connection 48ab4d1bd2597313, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:13 server Short Header{DestConnectionID: a31c939a64b5e0ee, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:13 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 25.312439ms, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:13 server <- Reading packet 4 (25 bytes) for connection b3e973bf, 1-RTT 2025/09/12 02:43:13 server Short Header{DestConnectionID: b3e973bf, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:13 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:13 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:13 Replacing connection for connection IDs [b3e973bf 351ae5f8 bdf8509b eb293256 db54d0f3 7609a949 48ab4d1bd2597313] with a closed connection. 2025/09/12 02:43:13 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:13 server Connection 48ab4d1bd2597313 closed. 2025/09/12 02:43:13 Removing connection IDs [b3e973bf 351ae5f8 bdf8509b eb293256 db54d0f3 7609a949 48ab4d1bd2597313] for a closed connection after it has been retired. 2025/09/12 02:43:13 server <- Received Initial packet. 2025/09/12 02:43:13 Created qlog file: /logs/qlog/77bd5bdb6c05d96e.sqlog 2025/09/12 02:43:13 server Changing connection ID to 3d64ac96. 2025/09/12 02:43:13 Adding connection IDs 77bd5bdb6c05d96e and 3d64ac96 for a new connection. 2025/09/12 02:43:13 server <- Reading packet 83850 (1252 bytes) for connection 77bd5bdb6c05d96e, Initial 2025/09/12 02:43:13 server Long Header{Type: Initial, DestConnectionID: 77bd5bdb6c05d96e, SrcConnectionID: 3bd2f4dd711336e6, Token: 0xe94593b583d3284f493144ff8041b79ee42dfadad69ab5f18be872e42660f5e92d6b9bd85e8b1ed742db7e0fa2f1f098bfd802e8febb75cbabe468d1e9a466e8d6c8c375e5430c3737640c248593639322a687d32a53d86762c0, PacketNumber: 83850, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:13 server <- &wire.PingFrame{} 2025/09/12 02:43:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:13 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:13 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:13 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:13 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 3bd2f4dd711336e6, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:13 Adding connection ID 8c81fce3. 2025/09/12 02:43:13 Adding connection ID ce502c26. 2025/09/12 02:43:13 Adding connection ID 811fc84f. 2025/09/12 02:43:13 Adding connection ID 2ec10cdc. 2025/09/12 02:43:13 Adding connection ID eeae4998. 2025/09/12 02:43:13 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 77bd5bdb6c05d96e 2025/09/12 02:43:13 server Long Header{Type: Initial, DestConnectionID: 3bd2f4dd711336e6, SrcConnectionID: 3d64ac96, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 915, Version: v1} 2025/09/12 02:43:13 server -> &wire.AckFrame{LargestAcked: 83850, LowestAcked: 83850, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:13 server Long Header{Type: Handshake, DestConnectionID: 3bd2f4dd711336e6, SrcConnectionID: 3d64ac96, PacketNumber: 0, PacketNumberLen: 2, Length: 175, Version: v1} 2025/09/12 02:43:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 153, Offset + Data length: 153} 2025/09/12 02:43:13 server Short Header{DestConnectionID: 3bd2f4dd711336e6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 811fc84f, StatelessResetToken: 0x3010a99b5c77cf42e98fc53169b4659a} 2025/09/12 02:43:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: eeae4998, StatelessResetToken: 0x220941201f10e5a693c5e881fb87f7a3} 2025/09/12 02:43:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ce502c26, StatelessResetToken: 0x3b04b49508c8f110de2ef87255339e64} 2025/09/12 02:43:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2ec10cdc, StatelessResetToken: 0xd6659ef608c10f634a375e2b56c3fdeb} 2025/09/12 02:43:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8c81fce3, StatelessResetToken: 0x18324cd9226aedb87b7c2ba0096db721} 2025/09/12 02:43:13 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:13 server <- Reading packet 0 (85 bytes) for connection 3d64ac96, Handshake 2025/09/12 02:43:13 server Long Header{Type: Handshake, DestConnectionID: 3d64ac96, SrcConnectionID: 3bd2f4dd711336e6, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:13 server Dropping Initial keys. 2025/09/12 02:43:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 440µs} 2025/09/12 02:43:13 server newly acked packets (1): [0] 2025/09/12 02:43:13 server updated RTT: 32.351499ms (σ: 16.175749ms) 2025/09/12 02:43:13 server Canceling loss detection timer. 2025/09/12 02:43:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:13 server Dropping Handshake keys. 2025/09/12 02:43:13 server <- Reading packet 0 (183 bytes) for connection 3d64ac96, 1-RTT 2025/09/12 02:43:13 server Short Header{DestConnectionID: 3d64ac96, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:13 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df2e3ebdc8def841, StatelessResetToken: 0x61eaa39de903348b6797b6da6c0fc641} 2025/09/12 02:43:13 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f653dabd7d6a8d6, StatelessResetToken: 0x27c4f16bcf483f2e67f698c2bf8a6591} 2025/09/12 02:43:13 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5ca3a2a696650b85, StatelessResetToken: 0x0710e3e59f845aac52985532620434e3} 2025/09/12 02:43:13 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:13 server -> Sending packet 1 (305 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:13 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:13 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 302.328µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:13 server -> &wire.NewTokenFrame{Token: 0x050a018875369afa271f6271e6618eb826019e6e241a24149279cebb60f82b201f00cc62f99bed927bd0d52ceb43aaf30ff80c3f4a53ce28b48cf1e4575ca74edff3a7e4fcbe29204a768276171d8641154a1c3fbaf882f2a1b1} 2025/09/12 02:43:13 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:13 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:13 server <- Reading packet 1 (55 bytes) for connection 3d64ac96, 1-RTT 2025/09/12 02:43:13 server Short Header{DestConnectionID: 3d64ac96, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:13 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:13 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:13 Received request: GET /maegtojqek 2025/09/12 02:43:13 server -> Sending packet 2 (1061 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:13 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:13 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 468.552µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:13 server <- Reading packet 3 (55 bytes) for connection 3d64ac96, 1-RTT 2025/09/12 02:43:13 server Short Header{DestConnectionID: 3d64ac96, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:13 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bd3ec07f7ddc928c, StatelessResetToken: 0x05a4dc5281514655711e0d028e752681} 2025/09/12 02:43:13 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:13 server -> Sending packet 3 (37 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:13 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:13 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 74.069µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:13 server <- Reading packet 4 (55 bytes) for connection 3d64ac96, 1-RTT 2025/09/12 02:43:13 server Short Header{DestConnectionID: 3d64ac96, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:13 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 4.232ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:13 server newly acked packets (2): [0 1] 2025/09/12 02:43:13 server updated RTT: 32.694ms (σ: 12.819ms) 2025/09/12 02:43:13 server ECN capability confirmed. 2025/09/12 02:43:13 server Ignoring all packets below 1. 2025/09/12 02:43:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:13 server -> Sending packet 5 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:13 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:13 server -> Sending packet 6 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:13 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:43:13 server -> Sending packet 8 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:13 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:13 server -> Sending packet 9 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:13 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:13 server -> Sending packet 10 (1360 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:13 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:13 server -> &wire.PingFrame{} 2025/09/12 02:43:13 Removing connection ID 77bd5bdb6c05d96e. 2025/09/12 02:43:14 server <- Received Initial packet. 2025/09/12 02:43:14 Created qlog file: /logs/qlog/7fa81e777901f9ec.sqlog 2025/09/12 02:43:14 server Changing connection ID to 3aa23da9. 2025/09/12 02:43:14 Adding connection IDs 7fa81e777901f9ec and 3aa23da9 for a new connection. 2025/09/12 02:43:14 server <- Reading packet 90011 (1252 bytes) for connection 7fa81e777901f9ec, Initial 2025/09/12 02:43:14 server Long Header{Type: Initial, DestConnectionID: 7fa81e777901f9ec, SrcConnectionID: 755fefdaba55e65a, Token: 0x050a018875369afa271f6271e6618eb826019e6e241a24149279cebb60f82b201f00cc62f99bed927bd0d52ceb43aaf30ff80c3f4a53ce28b48cf1e4575ca74edff3a7e4fcbe29204a768276171d8641154a1c3fbaf882f2a1b1, PacketNumber: 90011, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:14 server <- &wire.PingFrame{} 2025/09/12 02:43:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:14 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:14 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:14 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:14 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 755fefdaba55e65a, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:14 Adding connection ID ff35b861. 2025/09/12 02:43:14 Adding connection ID 0fc75f4a. 2025/09/12 02:43:14 Adding connection ID fb2e1ce1. 2025/09/12 02:43:14 Adding connection ID 70ab5d3c. 2025/09/12 02:43:14 Adding connection ID dfa938e0. 2025/09/12 02:43:14 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7fa81e777901f9ec 2025/09/12 02:43:14 server Long Header{Type: Initial, DestConnectionID: 755fefdaba55e65a, SrcConnectionID: 3aa23da9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 910, Version: v1} 2025/09/12 02:43:14 server -> &wire.AckFrame{LargestAcked: 90011, LowestAcked: 90011, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:14 server Long Header{Type: Handshake, DestConnectionID: 755fefdaba55e65a, SrcConnectionID: 3aa23da9, PacketNumber: 0, PacketNumberLen: 2, Length: 180, Version: v1} 2025/09/12 02:43:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/09/12 02:43:14 server Short Header{DestConnectionID: 755fefdaba55e65a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0fc75f4a, StatelessResetToken: 0x16ca94b2f4dda603bf548ae8c4d89417} 2025/09/12 02:43:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff35b861, StatelessResetToken: 0x752d0e21c92aa84078004b8737bbbec2} 2025/09/12 02:43:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fb2e1ce1, StatelessResetToken: 0x50edd6dcf6efb3078563378916eaf3d8} 2025/09/12 02:43:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: dfa938e0, StatelessResetToken: 0x6847fd3df4b0ea25e1109dcbc701c91c} 2025/09/12 02:43:14 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 70ab5d3c, StatelessResetToken: 0x84212369e2acd387efae2b5235739782} 2025/09/12 02:43:14 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:14 server <- Reading packet 0 (85 bytes) for connection 3aa23da9, Handshake 2025/09/12 02:43:14 server Long Header{Type: Handshake, DestConnectionID: 3aa23da9, SrcConnectionID: 755fefdaba55e65a, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:14 server Dropping Initial keys. 2025/09/12 02:43:14 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 392µs} 2025/09/12 02:43:14 server newly acked packets (1): [0] 2025/09/12 02:43:14 server updated RTT: 32.408887ms (σ: 16.204443ms) 2025/09/12 02:43:14 server Canceling loss detection timer. 2025/09/12 02:43:14 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:14 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:14 server Dropping Handshake keys. 2025/09/12 02:43:14 server <- Reading packet 0 (183 bytes) for connection 3aa23da9, 1-RTT 2025/09/12 02:43:14 server Short Header{DestConnectionID: 3aa23da9, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:14 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 66a35eb3cb122b9d, StatelessResetToken: 0x3b3e3c6c91145bf2ae55d72831471503} 2025/09/12 02:43:14 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e2c08c64aa84e5e8, StatelessResetToken: 0x44d3fdb7d7ee32aa1f78152b38a9f222} 2025/09/12 02:43:14 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 635915b45938faa8, StatelessResetToken: 0x785b991a19de7432d5388d037fcce2bd} 2025/09/12 02:43:14 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:14 server -> Sending packet 1 (305 bytes) for connection 7fa81e777901f9ec, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:14 server Short Header{DestConnectionID: 66a35eb3cb122b9d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:14 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 219.682µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:14 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:14 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:14 server -> &wire.NewTokenFrame{Token: 0x58c75d85c6b8834fe0ea89c502915daaff975d2896272ad2e73c771bcbc1963834970c9e7fbd569d068b916456e3752f4ad0026943ae3487eaf356d561bcb9a9eb7d6f668036b9dcacb46cf60b2f4c97b205f88ca276296af371} 2025/09/12 02:43:14 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:14 server <- Reading packet 1 (55 bytes) for connection 3aa23da9, 1-RTT 2025/09/12 02:43:14 server Short Header{DestConnectionID: 3aa23da9, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:14 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:14 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:14 Received request: GET /gklgrgfytr 2025/09/12 02:43:14 server <- Reading packet 2 (55 bytes) for connection 3aa23da9, 1-RTT 2025/09/12 02:43:14 server Short Header{DestConnectionID: 3aa23da9, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:14 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.056ms} 2025/09/12 02:43:14 server newly acked packets (1): [0] 2025/09/12 02:43:14 server updated RTT: 32.448ms (σ: 12.233ms) 2025/09/12 02:43:14 server -> Sending packet 2 (1061 bytes) for connection 7fa81e777901f9ec, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:14 server Short Header{DestConnectionID: 66a35eb3cb122b9d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:14 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 89.547µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:14 server <- Reading packet 3 (35 bytes) for connection 3aa23da9, 1-RTT 2025/09/12 02:43:14 server Short Header{DestConnectionID: 3aa23da9, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:14 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 168µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:14 server newly acked packets (1): [2] 2025/09/12 02:43:14 server updated RTT: 32.366ms (σ: 9.338ms) 2025/09/12 02:43:14 server ECN capability confirmed. 2025/09/12 02:43:14 server setting loss timer for packet 1 (1-RTT) to 36.41175ms (in 2025-09-12 02:43:14.156014819 +0000 UTC m=+10.344165454) 2025/09/12 02:43:14 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:14 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:14 Replacing connection for connection IDs [70ab5d3c dfa938e0 3aa23da9 ff35b861 0fc75f4a fb2e1ce1 7fa81e777901f9ec] with a closed connection. 2025/09/12 02:43:14 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:14 server Connection 7fa81e777901f9ec closed. 2025/09/12 02:43:14 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:43:14 server -> Sending packet 12 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:14 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:14 server -> Sending packet 13 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:14 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:14 Removing connection IDs [70ab5d3c dfa938e0 3aa23da9 ff35b861 0fc75f4a fb2e1ce1 7fa81e777901f9ec] for a closed connection after it has been retired. 2025/09/12 02:43:15 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:43:15 server -> Sending packet 15 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:15 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:15 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:15 server -> Sending packet 16 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:15 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:15 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:15 server <- Received Initial packet. 2025/09/12 02:43:15 Created qlog file: /logs/qlog/d2b2a664b6d79ddc.sqlog 2025/09/12 02:43:15 server Changing connection ID to 3a5ad9ca. 2025/09/12 02:43:15 Adding connection IDs d2b2a664b6d79ddc and 3a5ad9ca for a new connection. 2025/09/12 02:43:15 server <- Reading packet 101031 (1252 bytes) for connection d2b2a664b6d79ddc, Initial 2025/09/12 02:43:15 server Long Header{Type: Initial, DestConnectionID: d2b2a664b6d79ddc, SrcConnectionID: 13a68ebbcefd4873, Token: (empty), PacketNumber: 101031, PacketNumberLen: 4, Length: 1226, Version: v1} 2025/09/12 02:43:15 server <- &wire.PingFrame{} 2025/09/12 02:43:15 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:15 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:15 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:15 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:15 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 13a68ebbcefd4873, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:15 Adding connection ID 722589e0. 2025/09/12 02:43:15 Adding connection ID 4f60a412. 2025/09/12 02:43:15 Adding connection ID ec7b6309. 2025/09/12 02:43:15 Adding connection ID 5912d500. 2025/09/12 02:43:15 Adding connection ID 1f22be29. 2025/09/12 02:43:15 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d2b2a664b6d79ddc 2025/09/12 02:43:15 server Long Header{Type: Initial, DestConnectionID: 13a68ebbcefd4873, SrcConnectionID: 3a5ad9ca, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 916, Version: v1} 2025/09/12 02:43:15 server -> &wire.AckFrame{LargestAcked: 101031, LowestAcked: 101031, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:15 server Long Header{Type: Handshake, DestConnectionID: 13a68ebbcefd4873, SrcConnectionID: 3a5ad9ca, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/09/12 02:43:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/09/12 02:43:15 server Short Header{DestConnectionID: 13a68ebbcefd4873, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5912d500, StatelessResetToken: 0x8e0b201920f61cfe15f04309b5ebc959} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec7b6309, StatelessResetToken: 0xea66ecd1b9111acaf6b6f3006d905506} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1f22be29, StatelessResetToken: 0x528760f6b2968c56e8d17ad0a6e169fd} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 722589e0, StatelessResetToken: 0xfd32ae2e9c06e805a0a31952b05b4316} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f60a412, StatelessResetToken: 0x04f6bc58a448ffed78114caa0f8dabea} 2025/09/12 02:43:15 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:15 server -> Sending packet 1 (1280 bytes) for connection d2b2a664b6d79ddc, Initial 2025/09/12 02:43:15 server Long Header{Type: Initial, DestConnectionID: 13a68ebbcefd4873, SrcConnectionID: 3a5ad9ca, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:15 server -> Sending packet 2 (1280 bytes) for connection d2b2a664b6d79ddc, Initial 2025/09/12 02:43:15 server Long Header{Type: Initial, DestConnectionID: 13a68ebbcefd4873, SrcConnectionID: 3a5ad9ca, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:15 server Canceling loss detection timer. 2025/09/12 02:43:15 server Amplification window limited. Received 1252 bytes, already sent out 3840 bytes 2025/09/12 02:43:15 server <- Reading packet 0 (42 bytes) for connection 3a5ad9ca, Handshake 2025/09/12 02:43:15 server Long Header{Type: Handshake, DestConnectionID: 3a5ad9ca, SrcConnectionID: 13a68ebbcefd4873, PacketNumber: 0, PacketNumberLen: 4, Length: 21, Version: v1} 2025/09/12 02:43:15 server Dropping Initial keys. 2025/09/12 02:43:15 server <- &wire.PingFrame{} 2025/09/12 02:43:15 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:43:15 server -> Sending packet 1 (203 bytes) for connection d2b2a664b6d79ddc, Handshake 2025/09/12 02:43:15 server Long Header{Type: Handshake, DestConnectionID: 13a68ebbcefd4873, SrcConnectionID: 3a5ad9ca, PacketNumber: 1, PacketNumberLen: 2, Length: 182, Version: v1} 2025/09/12 02:43:15 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/09/12 02:43:15 server -> Sending packet 2 (195 bytes) for connection d2b2a664b6d79ddc, Handshake 2025/09/12 02:43:15 server Long Header{Type: Handshake, DestConnectionID: 13a68ebbcefd4873, SrcConnectionID: 3a5ad9ca, PacketNumber: 2, PacketNumberLen: 2, Length: 174, Version: v1} 2025/09/12 02:43:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/09/12 02:43:15 server <- Reading packet 2 (183 bytes) for connection 3a5ad9ca, Handshake 2025/09/12 02:43:15 server Long Header{Type: Handshake, DestConnectionID: 3a5ad9ca, SrcConnectionID: 13a68ebbcefd4873, PacketNumber: 2, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:15 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:15 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:15 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 77.8ms} 2025/09/12 02:43:15 server newly acked packets (1): [2] 2025/09/12 02:43:15 server updated RTT: 109.065496ms (σ: 54.532748ms) 2025/09/12 02:43:15 server Canceling loss detection timer. 2025/09/12 02:43:15 server Dropping Handshake keys. 2025/09/12 02:43:15 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:15 server -> Sending packet 2 (416 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:15 server Short Header{DestConnectionID: 13a68ebbcefd4873, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec7b6309, StatelessResetToken: 0xea66ecd1b9111acaf6b6f3006d905506} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 722589e0, StatelessResetToken: 0xfd32ae2e9c06e805a0a31952b05b4316} 2025/09/12 02:43:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:15 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f60a412, StatelessResetToken: 0x04f6bc58a448ffed78114caa0f8dabea} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1f22be29, StatelessResetToken: 0x528760f6b2968c56e8d17ad0a6e169fd} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5912d500, StatelessResetToken: 0x8e0b201920f61cfe15f04309b5ebc959} 2025/09/12 02:43:15 server -> &wire.NewTokenFrame{Token: 0x78690347c39cb3e587d1037d1f4c7089916648d2ab7d9fafe25d3fba6e54b585a6de99b5fdfec21c1f4308b919af9eb8fe10ba2265f43547f4e41aefc08c1ca17a54ce684132ef7ed83c53a5c16a4e1131caa1f2780c39e6a4dfae} 2025/09/12 02:43:15 server -> Sending packet 3 (416 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:15 server Short Header{DestConnectionID: 13a68ebbcefd4873, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f60a412, StatelessResetToken: 0x04f6bc58a448ffed78114caa0f8dabea} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5912d500, StatelessResetToken: 0x8e0b201920f61cfe15f04309b5ebc959} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 722589e0, StatelessResetToken: 0xfd32ae2e9c06e805a0a31952b05b4316} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1f22be29, StatelessResetToken: 0x528760f6b2968c56e8d17ad0a6e169fd} 2025/09/12 02:43:15 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:15 server -> &wire.NewTokenFrame{Token: 0x78690347c39cb3e587d1037d1f4c7089916648d2ab7d9fafe25d3fba6e54b585a6de99b5fdfec21c1f4308b919af9eb8fe10ba2265f43547f4e41aefc08c1ca17a54ce684132ef7ed83c53a5c16a4e1131caa1f2780c39e6a4dfae} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec7b6309, StatelessResetToken: 0xea66ecd1b9111acaf6b6f3006d905506} 2025/09/12 02:43:15 server <- Reading packet 2 (183 bytes) for connection 3a5ad9ca, 1-RTT 2025/09/12 02:43:15 server Short Header{DestConnectionID: 3a5ad9ca, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:15 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1a8c7c852bc77114, StatelessResetToken: 0xae980d7ce40d2beda64f498a8346afba} 2025/09/12 02:43:15 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 77caa872c7d1002d, StatelessResetToken: 0x202e2a8e7762df21bda385f9142af1d5} 2025/09/12 02:43:15 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5cb8c00fd28d099e, StatelessResetToken: 0xf121e98025ce9f52769301bfaf3036d2} 2025/09/12 02:43:15 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:15 server -> Sending packet 4 (37 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:15 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:15 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 97.573µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:15 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:15 server <- Reading packet 4 (183 bytes) for connection 3a5ad9ca, 1-RTT 2025/09/12 02:43:15 server Short Header{DestConnectionID: 3a5ad9ca, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:15 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9c582c6611c6e19d, StatelessResetToken: 0xc4e9dbd037dd871ca8f23f0db571108d} 2025/09/12 02:43:15 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 92.208ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:15 server newly acked packets (1): [4] 2025/09/12 02:43:15 server updated RTT: 109.57ms (σ: 41.908ms) 2025/09/12 02:43:15 server ECN capability confirmed. 2025/09/12 02:43:15 server lost packet 3 (time threshold) 2025/09/12 02:43:15 server Canceling loss detection timer. 2025/09/12 02:43:15 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:15 server Ignoring all packets below 3. 2025/09/12 02:43:15 server <- Reading packet 5 (55 bytes) for connection 3a5ad9ca, 1-RTT 2025/09/12 02:43:15 server Short Header{DestConnectionID: 3a5ad9ca, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:15 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:15 server -> Sending packet 5 (424 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:15 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:15 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 164.168µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:15 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1f22be29, StatelessResetToken: 0x528760f6b2968c56e8d17ad0a6e169fd} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec7b6309, StatelessResetToken: 0xea66ecd1b9111acaf6b6f3006d905506} 2025/09/12 02:43:15 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:15 server -> &wire.NewTokenFrame{Token: 0x78690347c39cb3e587d1037d1f4c7089916648d2ab7d9fafe25d3fba6e54b585a6de99b5fdfec21c1f4308b919af9eb8fe10ba2265f43547f4e41aefc08c1ca17a54ce684132ef7ed83c53a5c16a4e1131caa1f2780c39e6a4dfae} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 722589e0, StatelessResetToken: 0xfd32ae2e9c06e805a0a31952b05b4316} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5912d500, StatelessResetToken: 0x8e0b201920f61cfe15f04309b5ebc959} 2025/09/12 02:43:15 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f60a412, StatelessResetToken: 0x04f6bc58a448ffed78114caa0f8dabea} 2025/09/12 02:43:15 Received request: GET /cfxaerupzl 2025/09/12 02:43:15 server -> Sending packet 6 (1053 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:15 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:15 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:16 server -> Sending packet 8 (416 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:16 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f60a412, StatelessResetToken: 0x04f6bc58a448ffed78114caa0f8dabea} 2025/09/12 02:43:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 722589e0, StatelessResetToken: 0xfd32ae2e9c06e805a0a31952b05b4316} 2025/09/12 02:43:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec7b6309, StatelessResetToken: 0xea66ecd1b9111acaf6b6f3006d905506} 2025/09/12 02:43:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1f22be29, StatelessResetToken: 0x528760f6b2968c56e8d17ad0a6e169fd} 2025/09/12 02:43:16 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:16 server -> &wire.NewTokenFrame{Token: 0x78690347c39cb3e587d1037d1f4c7089916648d2ab7d9fafe25d3fba6e54b585a6de99b5fdfec21c1f4308b919af9eb8fe10ba2265f43547f4e41aefc08c1ca17a54ce684132ef7ed83c53a5c16a4e1131caa1f2780c39e6a4dfae} 2025/09/12 02:43:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5912d500, StatelessResetToken: 0x8e0b201920f61cfe15f04309b5ebc959} 2025/09/12 02:43:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:16 server Skipping packet number 7 2025/09/12 02:43:16 server -> Sending packet 9 (1053 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:16 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:16 server <- Received Initial packet. 2025/09/12 02:43:16 Created qlog file: /logs/qlog/f9987b6ec566c997.sqlog 2025/09/12 02:43:16 server Changing connection ID to fa979048. 2025/09/12 02:43:16 Adding connection IDs f9987b6ec566c997 and fa979048 for a new connection. 2025/09/12 02:43:16 server <- Reading packet 72534 (1252 bytes) for connection f9987b6ec566c997, Initial 2025/09/12 02:43:16 server Long Header{Type: Initial, DestConnectionID: f9987b6ec566c997, SrcConnectionID: 555818fd6b591aab, Token: 0x78690347c39cb3e587d1037d1f4c7089916648d2ab7d9fafe25d3fba6e54b585a6de99b5fdfec21c1f4308b919af9eb8fe10ba2265f43547f4e41aefc08c1ca17a54ce684132ef7ed83c53a5c16a4e1131caa1f2780c39e6a4dfae, PacketNumber: 72534, PacketNumberLen: 4, Length: 1134, Version: v1} 2025/09/12 02:43:16 server <- &wire.PingFrame{} 2025/09/12 02:43:16 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:16 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:16 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:16 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:16 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 555818fd6b591aab, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:16 Adding connection ID 3cb5a1c5. 2025/09/12 02:43:16 Adding connection ID cb67e90f. 2025/09/12 02:43:16 Adding connection ID ad24ccc5. 2025/09/12 02:43:16 Adding connection ID 780bd80b. 2025/09/12 02:43:16 Adding connection ID bc6dc3a6. 2025/09/12 02:43:16 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f9987b6ec566c997 2025/09/12 02:43:16 server Long Header{Type: Initial, DestConnectionID: 555818fd6b591aab, SrcConnectionID: fa979048, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 906, Version: v1} 2025/09/12 02:43:16 server -> &wire.AckFrame{LargestAcked: 72534, LowestAcked: 72534, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:16 server Long Header{Type: Handshake, DestConnectionID: 555818fd6b591aab, SrcConnectionID: fa979048, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/09/12 02:43:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/09/12 02:43:16 server Short Header{DestConnectionID: 555818fd6b591aab, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3cb5a1c5, StatelessResetToken: 0xeaed58920ad6c965718c46a6e429c1e0} 2025/09/12 02:43:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 780bd80b, StatelessResetToken: 0x2323907f19ede6e951b889add2fcc34c} 2025/09/12 02:43:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cb67e90f, StatelessResetToken: 0x0008824ccadaad8975ded32b418f8304} 2025/09/12 02:43:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ad24ccc5, StatelessResetToken: 0x329913e4a9c1b4252c0889f3377778bb} 2025/09/12 02:43:16 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: bc6dc3a6, StatelessResetToken: 0x3c9a42be4936a3c52fe16da1e35f05b1} 2025/09/12 02:43:16 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:16 server <- Reading packet 0 (85 bytes) for connection fa979048, Handshake 2025/09/12 02:43:16 server Long Header{Type: Handshake, DestConnectionID: fa979048, SrcConnectionID: 555818fd6b591aab, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:16 server Dropping Initial keys. 2025/09/12 02:43:16 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368µs} 2025/09/12 02:43:16 server newly acked packets (1): [0] 2025/09/12 02:43:16 server updated RTT: 32.375134ms (σ: 16.187567ms) 2025/09/12 02:43:16 server Canceling loss detection timer. 2025/09/12 02:43:16 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:16 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:16 server Dropping Handshake keys. 2025/09/12 02:43:16 server <- Reading packet 0 (183 bytes) for connection fa979048, 1-RTT 2025/09/12 02:43:16 server Short Header{DestConnectionID: fa979048, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:16 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: afd54bfbb5c4703d, StatelessResetToken: 0x791d82be46b4da80ceedde6d0a379302} 2025/09/12 02:43:16 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9b179542f1c6a7b6, StatelessResetToken: 0xcfd4759cc2d527d17d7cb2025a63c6af} 2025/09/12 02:43:16 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a74f5b6a44770ade, StatelessResetToken: 0x71ca960ef1d8922dde480870131346ab} 2025/09/12 02:43:16 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:16 server -> Sending packet 1 (305 bytes) for connection f9987b6ec566c997, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:16 server Short Header{DestConnectionID: afd54bfbb5c4703d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:16 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 191.048µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:16 server -> &wire.NewTokenFrame{Token: 0x40c2ce04333b8ec1f7cf0ccf7947974aea9d018d91b72c76d57ec76bca05dd2bde54a3c7d5917c14fd671add11714186353dfb0ba14af0124d861001e91cb64d9695641c5e0adf67ce827f33f9b8bc6b22059275c9f7ed7b42d9} 2025/09/12 02:43:16 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:16 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:16 server <- Reading packet 1 (55 bytes) for connection fa979048, 1-RTT 2025/09/12 02:43:16 server Short Header{DestConnectionID: fa979048, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:16 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:16 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:16 Received request: GET /ysheivmgks 2025/09/12 02:43:16 server -> Sending packet 2 (1061 bytes) for connection f9987b6ec566c997, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:16 server Short Header{DestConnectionID: afd54bfbb5c4703d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:16 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 333.638µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:16 server <- Reading packet 3 (35 bytes) for connection fa979048, 1-RTT 2025/09/12 02:43:16 server Short Header{DestConnectionID: fa979048, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:16 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 184µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:16 server newly acked packets (2): [0 2] 2025/09/12 02:43:16 server updated RTT: 32.287ms (σ: 12.315ms) 2025/09/12 02:43:16 server ECN capability confirmed. 2025/09/12 02:43:16 server setting loss timer for packet 1 (1-RTT) to 36.322875ms (in 2025-09-12 02:43:16.369457046 +0000 UTC m=+12.557607701) 2025/09/12 02:43:16 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:16 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:16 Replacing connection for connection IDs [780bd80b bc6dc3a6 fa979048 3cb5a1c5 cb67e90f ad24ccc5 f9987b6ec566c997] with a closed connection. 2025/09/12 02:43:16 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:16 server Connection f9987b6ec566c997 closed. 2025/09/12 02:43:16 Removing connection ID d2b2a664b6d79ddc. 2025/09/12 02:43:16 server -> Sending packet 10 (1360 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:16 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:16 server -> &wire.PingFrame{} 2025/09/12 02:43:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:43:16 server -> Sending packet 18 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:16 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:16 server -> Sending packet 19 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:16 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:16 Removing connection IDs [780bd80b bc6dc3a6 fa979048 3cb5a1c5 cb67e90f ad24ccc5 f9987b6ec566c997] for a closed connection after it has been retired. 2025/09/12 02:43:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:43:17 server -> Sending packet 12 (416 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5912d500, StatelessResetToken: 0x8e0b201920f61cfe15f04309b5ebc959} 2025/09/12 02:43:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec7b6309, StatelessResetToken: 0xea66ecd1b9111acaf6b6f3006d905506} 2025/09/12 02:43:17 server -> &wire.NewTokenFrame{Token: 0x78690347c39cb3e587d1037d1f4c7089916648d2ab7d9fafe25d3fba6e54b585a6de99b5fdfec21c1f4308b919af9eb8fe10ba2265f43547f4e41aefc08c1ca17a54ce684132ef7ed83c53a5c16a4e1131caa1f2780c39e6a4dfae} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 722589e0, StatelessResetToken: 0xfd32ae2e9c06e805a0a31952b05b4316} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f60a412, StatelessResetToken: 0x04f6bc58a448ffed78114caa0f8dabea} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1f22be29, StatelessResetToken: 0x528760f6b2968c56e8d17ad0a6e169fd} 2025/09/12 02:43:17 server Skipping packet number 11 2025/09/12 02:43:17 server -> Sending packet 13 (1053 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:17 server <- Received Initial packet. 2025/09/12 02:43:17 Created qlog file: /logs/qlog/eacee66e59396015.sqlog 2025/09/12 02:43:17 server Changing connection ID to 3fe99f47. 2025/09/12 02:43:17 Adding connection IDs eacee66e59396015 and 3fe99f47 for a new connection. 2025/09/12 02:43:17 server <- Reading packet 96059 (1252 bytes) for connection eacee66e59396015, Initial 2025/09/12 02:43:17 server Long Header{Type: Initial, DestConnectionID: eacee66e59396015, SrcConnectionID: 8f85934e32a4e7b1, Token: (empty), PacketNumber: 96059, PacketNumberLen: 4, Length: 1226, Version: v1} 2025/09/12 02:43:17 server <- &wire.PingFrame{} 2025/09/12 02:43:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 8f85934e32a4e7b1, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:17 Adding connection ID b061d6d6. 2025/09/12 02:43:17 Adding connection ID 18b620fa. 2025/09/12 02:43:17 Adding connection ID ffb5b111. 2025/09/12 02:43:17 Adding connection ID 157976f1. 2025/09/12 02:43:17 Adding connection ID e447a092. 2025/09/12 02:43:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection eacee66e59396015 2025/09/12 02:43:17 server Long Header{Type: Initial, DestConnectionID: 8f85934e32a4e7b1, SrcConnectionID: 3fe99f47, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 920, Version: v1} 2025/09/12 02:43:17 server -> &wire.AckFrame{LargestAcked: 96059, LowestAcked: 96059, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:17 server Long Header{Type: Handshake, DestConnectionID: 8f85934e32a4e7b1, SrcConnectionID: 3fe99f47, PacketNumber: 0, PacketNumberLen: 2, Length: 170, Version: v1} 2025/09/12 02:43:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/09/12 02:43:17 server Short Header{DestConnectionID: 8f85934e32a4e7b1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e447a092, StatelessResetToken: 0xe753dcde4a172ffe3ef3a79230d5de21} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 157976f1, StatelessResetToken: 0x70adb0a30c193633c89ee3df556e77f8} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b061d6d6, StatelessResetToken: 0x576ea893f29554b8967cff8d6222e265} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 18b620fa, StatelessResetToken: 0x7166f2c82ecf4f78d4a96ade8889899b} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ffb5b111, StatelessResetToken: 0x8b44b1a32e0e3cb87648346200c5a01c} 2025/09/12 02:43:17 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:17 server <- Reading packet 0 (85 bytes) for connection 3fe99f47, Handshake 2025/09/12 02:43:17 server Long Header{Type: Handshake, DestConnectionID: 3fe99f47, SrcConnectionID: 8f85934e32a4e7b1, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:17 server Dropping Initial keys. 2025/09/12 02:43:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/09/12 02:43:17 server newly acked packets (1): [0] 2025/09/12 02:43:17 server updated RTT: 32.466239ms (σ: 16.233119ms) 2025/09/12 02:43:17 server Canceling loss detection timer. 2025/09/12 02:43:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:17 server Dropping Handshake keys. 2025/09/12 02:43:17 server <- Reading packet 0 (183 bytes) for connection 3fe99f47, 1-RTT 2025/09/12 02:43:17 server Short Header{DestConnectionID: 3fe99f47, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 14ce70efc25e676c, StatelessResetToken: 0xb1a101586d44d17462108c2d37694656} 2025/09/12 02:43:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9b4bac9623487285, StatelessResetToken: 0x6a793e26e54a3a1f20456a26acbd63fb} 2025/09/12 02:43:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 83a07d8ce823606a, StatelessResetToken: 0x1c962167324ba5490801a25c554a950c} 2025/09/12 02:43:17 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:17 server <- Reading packet 1 (55 bytes) for connection 3fe99f47, 1-RTT 2025/09/12 02:43:17 server Short Header{DestConnectionID: 3fe99f47, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:17 server -> Sending packet 1 (305 bytes) for connection eacee66e59396015, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 208.842µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:17 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:17 server -> &wire.NewTokenFrame{Token: 0x630f84fc82d7f08738a6bd58713f3770ae01b68b0f870adb1f83f8700c2f9df2c3dbe23e3c97e3821b9fe554435d3f5101629158d5fdad5c6a734f7606dd47c2bd76d0f88a8001e38be090cf52b14c6a79c71343f8d3e51aa95d} 2025/09/12 02:43:17 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:17 Received request: GET /dcswmecaxo 2025/09/12 02:43:17 server <- Reading packet 2 (55 bytes) for connection 3fe99f47, 1-RTT 2025/09/12 02:43:17 server Short Header{DestConnectionID: 3fe99f47, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.072ms} 2025/09/12 02:43:17 server newly acked packets (1): [0] 2025/09/12 02:43:17 server updated RTT: 32.511ms (σ: 12.265ms) 2025/09/12 02:43:17 server -> Sending packet 2 (1053 bytes) for connection eacee66e59396015, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:17 server -> Sending packet 4 (297 bytes) for connection eacee66e59396015, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:17 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:17 server -> &wire.NewTokenFrame{Token: 0x630f84fc82d7f08738a6bd58713f3770ae01b68b0f870adb1f83f8700c2f9df2c3dbe23e3c97e3821b9fe554435d3f5101629158d5fdad5c6a734f7606dd47c2bd76d0f88a8001e38be090cf52b14c6a79c71343f8d3e51aa95d} 2025/09/12 02:43:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:17 server Skipping packet number 3 2025/09/12 02:43:17 server -> Sending packet 5 (1053 bytes) for connection eacee66e59396015, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:43:17 server -> Sending packet 7 (297 bytes) for connection eacee66e59396015, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:17 server -> &wire.NewTokenFrame{Token: 0x630f84fc82d7f08738a6bd58713f3770ae01b68b0f870adb1f83f8700c2f9df2c3dbe23e3c97e3821b9fe554435d3f5101629158d5fdad5c6a734f7606dd47c2bd76d0f88a8001e38be090cf52b14c6a79c71343f8d3e51aa95d} 2025/09/12 02:43:17 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:17 server Skipping packet number 6 2025/09/12 02:43:17 server -> Sending packet 8 (1053 bytes) for connection eacee66e59396015, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:17 server -> Sending packet 9 (1360 bytes) for connection eacee66e59396015, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.PingFrame{} 2025/09/12 02:43:17 server <- Received Initial packet. 2025/09/12 02:43:17 Created qlog file: /logs/qlog/4f2a5248a7ab3383.sqlog 2025/09/12 02:43:17 server Changing connection ID to fae6f5b7. 2025/09/12 02:43:17 Adding connection IDs 4f2a5248a7ab3383 and fae6f5b7 for a new connection. 2025/09/12 02:43:17 server <- Reading packet 74201 (1252 bytes) for connection 4f2a5248a7ab3383, Initial 2025/09/12 02:43:17 server Long Header{Type: Initial, DestConnectionID: 4f2a5248a7ab3383, SrcConnectionID: d8d3763d7972191b, Token: (empty), PacketNumber: 74201, PacketNumberLen: 4, Length: 1226, Version: v1} 2025/09/12 02:43:17 server <- &wire.PingFrame{} 2025/09/12 02:43:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:17 Removing connection ID eacee66e59396015. 2025/09/12 02:43:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d8d3763d7972191b, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:17 Adding connection ID abb36290. 2025/09/12 02:43:17 Adding connection ID e7091afc. 2025/09/12 02:43:17 Adding connection ID 3152cec3. 2025/09/12 02:43:17 Adding connection ID 308ec2ec. 2025/09/12 02:43:17 Adding connection ID 85d1d5cc. 2025/09/12 02:43:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4f2a5248a7ab3383 2025/09/12 02:43:17 server Long Header{Type: Initial, DestConnectionID: d8d3763d7972191b, SrcConnectionID: fae6f5b7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 914, Version: v1} 2025/09/12 02:43:17 server -> &wire.AckFrame{LargestAcked: 74201, LowestAcked: 74201, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:17 server Long Header{Type: Handshake, DestConnectionID: d8d3763d7972191b, SrcConnectionID: fae6f5b7, PacketNumber: 0, PacketNumberLen: 2, Length: 176, Version: v1} 2025/09/12 02:43:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/09/12 02:43:17 server Short Header{DestConnectionID: d8d3763d7972191b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3152cec3, StatelessResetToken: 0x2db49269f372d170ec3a34797b74dd87} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 85d1d5cc, StatelessResetToken: 0x45c1026979c655a0677febc4455a6743} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e7091afc, StatelessResetToken: 0xa4fc112003cb98037b1e285978d7d678} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: abb36290, StatelessResetToken: 0x9abffcc204458e905d0edc0b077331fc} 2025/09/12 02:43:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 308ec2ec, StatelessResetToken: 0x082b74808517d4a9445eb4ec2cae8511} 2025/09/12 02:43:17 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:17 server <- Reading packet 0 (85 bytes) for connection fae6f5b7, Handshake 2025/09/12 02:43:17 server Long Header{Type: Handshake, DestConnectionID: fae6f5b7, SrcConnectionID: d8d3763d7972191b, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:17 server Dropping Initial keys. 2025/09/12 02:43:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 384µs} 2025/09/12 02:43:17 server newly acked packets (1): [0] 2025/09/12 02:43:17 server updated RTT: 32.436003ms (σ: 16.218001ms) 2025/09/12 02:43:17 server Canceling loss detection timer. 2025/09/12 02:43:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:17 server Dropping Handshake keys. 2025/09/12 02:43:17 server <- Reading packet 0 (183 bytes) for connection fae6f5b7, 1-RTT 2025/09/12 02:43:17 server Short Header{DestConnectionID: fae6f5b7, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 63ef8fbddc1b427c, StatelessResetToken: 0xf111e79a36677beac1b5c2937afa59ff} 2025/09/12 02:43:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6dbeef2d2e379567, StatelessResetToken: 0x767a52110db7e16b09854ded3366b840} 2025/09/12 02:43:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7159c8a33b7796a7, StatelessResetToken: 0xf9e6d15e2bd17fdaaa93e9c80e81c530} 2025/09/12 02:43:17 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:17 server -> Sending packet 1 (305 bytes) for connection 4f2a5248a7ab3383, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 63ef8fbddc1b427c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 276.54µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:17 server -> &wire.NewTokenFrame{Token: 0xd45e24217da4c8d10bc65294e692086d1cba317d6e8f1a399571dda64447d0d77379dbda2d0ecd62841325ceb415f4c58104a69d68a34ef52aeb1e40cf31e4ce29f049abf618232dc07d476d9baf5e1df752a2e272e1a54956cc} 2025/09/12 02:43:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:17 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:17 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:17 server <- Reading packet 2 (55 bytes) for connection fae6f5b7, 1-RTT 2025/09/12 02:43:17 server Short Header{DestConnectionID: fae6f5b7, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:17 server newly acked packets (1): [0] 2025/09/12 02:43:17 server updated RTT: 32.482ms (σ: 12.255ms) 2025/09/12 02:43:17 server Dropping %!s(logging.PacketType=1) packet (183 bytes) because we already dropped the keys. 2025/09/12 02:43:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:17 server -> Sending packet 3 (297 bytes) for connection 4f2a5248a7ab3383, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 63ef8fbddc1b427c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:17 server -> &wire.NewTokenFrame{Token: 0xd45e24217da4c8d10bc65294e692086d1cba317d6e8f1a399571dda64447d0d77379dbda2d0ecd62841325ceb415f4c58104a69d68a34ef52aeb1e40cf31e4ce29f049abf618232dc07d476d9baf5e1df752a2e272e1a54956cc} 2025/09/12 02:43:17 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:17 server -> Sending packet 4 (297 bytes) for connection 4f2a5248a7ab3383, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 63ef8fbddc1b427c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:17 server -> &wire.NewTokenFrame{Token: 0xd45e24217da4c8d10bc65294e692086d1cba317d6e8f1a399571dda64447d0d77379dbda2d0ecd62841325ceb415f4c58104a69d68a34ef52aeb1e40cf31e4ce29f049abf618232dc07d476d9baf5e1df752a2e272e1a54956cc} 2025/09/12 02:43:17 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:17 server <- Reading packet 3 (183 bytes) for connection fae6f5b7, 1-RTT 2025/09/12 02:43:17 server Short Header{DestConnectionID: fae6f5b7, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 104µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0974f9c4970d04ac, StatelessResetToken: 0xdeb6c3cef1338736a4f5a8f527a8ded9} 2025/09/12 02:43:17 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:17 server -> Sending packet 5 (37 bytes) for connection 4f2a5248a7ab3383, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 63ef8fbddc1b427c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 90.099µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:17 server <- Reading packet 5 (55 bytes) for connection fae6f5b7, 1-RTT 2025/09/12 02:43:17 server Short Header{DestConnectionID: fae6f5b7, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:17 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:17 server -> Sending packet 6 (39 bytes) for connection 4f2a5248a7ab3383, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 63ef8fbddc1b427c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 80.291µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:17 Received request: GET /gptpijgaog 2025/09/12 02:43:17 server -> Sending packet 7 (1053 bytes) for connection 4f2a5248a7ab3383, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:17 server Short Header{DestConnectionID: 63ef8fbddc1b427c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:17 server <- Reading packet 6 (33 bytes) for connection fae6f5b7, 1-RTT 2025/09/12 02:43:17 server Short Header{DestConnectionID: fae6f5b7, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:17 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, DelayTime: 144µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 02:43:17 server newly acked packets (2): [4 7] 2025/09/12 02:43:17 server updated RTT: 32.366ms (σ: 9.421ms) 2025/09/12 02:43:17 server ECN capability confirmed. 2025/09/12 02:43:17 server Canceling loss detection timer. 2025/09/12 02:43:17 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:17 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:17 Replacing connection for connection IDs [308ec2ec 85d1d5cc fae6f5b7 abb36290 e7091afc 3152cec3 4f2a5248a7ab3383] with a closed connection. 2025/09/12 02:43:17 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:17 server Connection 4f2a5248a7ab3383 closed. 2025/09/12 02:43:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:43:18 server -> Sending packet 11 (297 bytes) for connection eacee66e59396015, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:18 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:18 server -> &wire.NewTokenFrame{Token: 0x630f84fc82d7f08738a6bd58713f3770ae01b68b0f870adb1f83f8700c2f9df2c3dbe23e3c97e3821b9fe554435d3f5101629158d5fdad5c6a734f7606dd47c2bd76d0f88a8001e38be090cf52b14c6a79c71343f8d3e51aa95d} 2025/09/12 02:43:18 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:18 server Skipping packet number 10 2025/09/12 02:43:18 server -> Sending packet 12 (1053 bytes) for connection eacee66e59396015, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:18 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:18 Removing connection IDs [308ec2ec 85d1d5cc fae6f5b7 abb36290 e7091afc 3152cec3 4f2a5248a7ab3383] for a closed connection after it has been retired. 2025/09/12 02:43:18 server <- Received Initial packet. 2025/09/12 02:43:18 Created qlog file: /logs/qlog/e79e7e85e7f803b0.sqlog 2025/09/12 02:43:18 server Changing connection ID to 749070ae. 2025/09/12 02:43:18 Adding connection IDs e79e7e85e7f803b0 and 749070ae for a new connection. 2025/09/12 02:43:18 server <- Reading packet 127441 (1252 bytes) for connection e79e7e85e7f803b0, Initial 2025/09/12 02:43:18 server Long Header{Type: Initial, DestConnectionID: e79e7e85e7f803b0, SrcConnectionID: b35abf5ef27318bd, Token: 0xd45e24217da4c8d10bc65294e692086d1cba317d6e8f1a399571dda64447d0d77379dbda2d0ecd62841325ceb415f4c58104a69d68a34ef52aeb1e40cf31e4ce29f049abf618232dc07d476d9baf5e1df752a2e272e1a54956cc, PacketNumber: 127441, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:18 server <- &wire.PingFrame{} 2025/09/12 02:43:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: b35abf5ef27318bd, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:18 Adding connection ID 5f61466b. 2025/09/12 02:43:18 Adding connection ID 8fdae06c. 2025/09/12 02:43:18 Adding connection ID fe5765cd. 2025/09/12 02:43:18 Adding connection ID 31f5b599. 2025/09/12 02:43:18 Adding connection ID e12aa61d. 2025/09/12 02:43:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e79e7e85e7f803b0 2025/09/12 02:43:18 server Long Header{Type: Initial, DestConnectionID: b35abf5ef27318bd, SrcConnectionID: 749070ae, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 910, Version: v1} 2025/09/12 02:43:18 server -> &wire.AckFrame{LargestAcked: 127441, LowestAcked: 127441, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:18 server Long Header{Type: Handshake, DestConnectionID: b35abf5ef27318bd, SrcConnectionID: 749070ae, PacketNumber: 0, PacketNumberLen: 2, Length: 180, Version: v1} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/09/12 02:43:18 server Short Header{DestConnectionID: b35abf5ef27318bd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f61466b, StatelessResetToken: 0x50c22e4935cac8d5f6c9fc98048a6fd9} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fe5765cd, StatelessResetToken: 0xa40cf5027c6e3e6b7871017b2b47c196} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8fdae06c, StatelessResetToken: 0x8eb9c74b93ee4d28999ae0adfff25f11} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e12aa61d, StatelessResetToken: 0xb7bb0346511925f30757ab44984e73fd} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 31f5b599, StatelessResetToken: 0xcfb92bb37a8397722455888d45f2f8c0} 2025/09/12 02:43:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:43:18 server -> Sending packet 15 (416 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:18 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 722589e0, StatelessResetToken: 0xfd32ae2e9c06e805a0a31952b05b4316} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f60a412, StatelessResetToken: 0x04f6bc58a448ffed78114caa0f8dabea} 2025/09/12 02:43:18 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:18 server -> &wire.NewTokenFrame{Token: 0x78690347c39cb3e587d1037d1f4c7089916648d2ab7d9fafe25d3fba6e54b585a6de99b5fdfec21c1f4308b919af9eb8fe10ba2265f43547f4e41aefc08c1ca17a54ce684132ef7ed83c53a5c16a4e1131caa1f2780c39e6a4dfae} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec7b6309, StatelessResetToken: 0xea66ecd1b9111acaf6b6f3006d905506} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1f22be29, StatelessResetToken: 0x528760f6b2968c56e8d17ad0a6e169fd} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5912d500, StatelessResetToken: 0x8e0b201920f61cfe15f04309b5ebc959} 2025/09/12 02:43:18 server Skipping packet number 14 2025/09/12 02:43:18 server -> Sending packet 16 (1053 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:18 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:18 server -> Sending packet 1 (1280 bytes) for connection e79e7e85e7f803b0, Initial 2025/09/12 02:43:18 server Long Header{Type: Initial, DestConnectionID: b35abf5ef27318bd, SrcConnectionID: 749070ae, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:18 server -> Sending packet 2 (1280 bytes) for connection e79e7e85e7f803b0, Initial 2025/09/12 02:43:18 server Long Header{Type: Initial, DestConnectionID: b35abf5ef27318bd, SrcConnectionID: 749070ae, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:18 server -> Sending packet 1 (201 bytes) for connection e79e7e85e7f803b0, Handshake 2025/09/12 02:43:18 server Long Header{Type: Handshake, DestConnectionID: b35abf5ef27318bd, SrcConnectionID: 749070ae, PacketNumber: 1, PacketNumberLen: 2, Length: 180, Version: v1} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/09/12 02:43:18 server -> Sending packet 2 (201 bytes) for connection e79e7e85e7f803b0, Handshake 2025/09/12 02:43:18 server Long Header{Type: Handshake, DestConnectionID: b35abf5ef27318bd, SrcConnectionID: 749070ae, PacketNumber: 2, PacketNumberLen: 2, Length: 180, Version: v1} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/09/12 02:43:18 server <- Reading packet 0 (42 bytes) for connection 749070ae, Handshake 2025/09/12 02:43:18 server Long Header{Type: Handshake, DestConnectionID: 749070ae, SrcConnectionID: b35abf5ef27318bd, PacketNumber: 0, PacketNumberLen: 4, Length: 21, Version: v1} 2025/09/12 02:43:18 server Dropping Initial keys. 2025/09/12 02:43:18 server <- &wire.PingFrame{} 2025/09/12 02:43:18 server -> Sending packet 3 (47 bytes) for connection e79e7e85e7f803b0, Handshake 2025/09/12 02:43:18 server Long Header{Type: Handshake, DestConnectionID: b35abf5ef27318bd, SrcConnectionID: 749070ae, PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 02:43:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:18 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:18 server <- Reading packet 1 (85 bytes) for connection 749070ae, Handshake 2025/09/12 02:43:18 server Long Header{Type: Handshake, DestConnectionID: 749070ae, SrcConnectionID: b35abf5ef27318bd, PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 152µs} 2025/09/12 02:43:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:18 server Dropping Handshake keys. 2025/09/12 02:43:18 server <- Reading packet 0 (183 bytes) for connection 749070ae, 1-RTT 2025/09/12 02:43:18 server Short Header{DestConnectionID: 749070ae, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ddf2523ffe2ea6ac, StatelessResetToken: 0xcbc9f8dffedf2781b595e8ebf5388d2c} 2025/09/12 02:43:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8668f93a91b39a25, StatelessResetToken: 0x87bb43cbdd78873777b2ab827124629e} 2025/09/12 02:43:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 67f96cd39175daab, StatelessResetToken: 0xb11138fd7e2e2904a67d5f836365cf39} 2025/09/12 02:43:18 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:18 server Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 55 bytes. 2025/09/12 02:43:18 server Dropping %!s(logging.PacketType=1) packet (55 bytes) because we already dropped the keys. 2025/09/12 02:43:18 server <- Reading packet 1 (55 bytes) for connection 749070ae, 1-RTT 2025/09/12 02:43:18 server Short Header{DestConnectionID: 749070ae, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:18 server -> Sending packet 2 (425 bytes) for connection e79e7e85e7f803b0, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:18 server Short Header{DestConnectionID: ddf2523ffe2ea6ac, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 201.408µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e12aa61d, StatelessResetToken: 0xb7bb0346511925f30757ab44984e73fd} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8fdae06c, StatelessResetToken: 0x8eb9c74b93ee4d28999ae0adfff25f11} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 31f5b599, StatelessResetToken: 0xcfb92bb37a8397722455888d45f2f8c0} 2025/09/12 02:43:18 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f61466b, StatelessResetToken: 0x50c22e4935cac8d5f6c9fc98048a6fd9} 2025/09/12 02:43:18 server -> &wire.NewTokenFrame{Token: 0xd23127731e0de0e8ff2732ab56acec737175c5c11317e3be9bf260850d0dfb8ca8c83591873492fb2c084b341a6e9b4ba317ac3b3f28fa4314ce4c324d2d04848c3ae6d26e1bd93d794731cd5056e965caff0b0760a1f63faa19} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fe5765cd, StatelessResetToken: 0xa40cf5027c6e3e6b7871017b2b47c196} 2025/09/12 02:43:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:18 server -> Sending packet 3 (417 bytes) for connection e79e7e85e7f803b0, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:18 server Short Header{DestConnectionID: ddf2523ffe2ea6ac, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8fdae06c, StatelessResetToken: 0x8eb9c74b93ee4d28999ae0adfff25f11} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f61466b, StatelessResetToken: 0x50c22e4935cac8d5f6c9fc98048a6fd9} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 31f5b599, StatelessResetToken: 0xcfb92bb37a8397722455888d45f2f8c0} 2025/09/12 02:43:18 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:18 Received request: GET /dppabxzsfs 2025/09/12 02:43:18 server -> &wire.NewTokenFrame{Token: 0xd23127731e0de0e8ff2732ab56acec737175c5c11317e3be9bf260850d0dfb8ca8c83591873492fb2c084b341a6e9b4ba317ac3b3f28fa4314ce4c324d2d04848c3ae6d26e1bd93d794731cd5056e965caff0b0760a1f63faa19} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e12aa61d, StatelessResetToken: 0xb7bb0346511925f30757ab44984e73fd} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fe5765cd, StatelessResetToken: 0xa40cf5027c6e3e6b7871017b2b47c196} 2025/09/12 02:43:18 server -> Sending packet 4 (1053 bytes) for connection e79e7e85e7f803b0, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:18 server Short Header{DestConnectionID: ddf2523ffe2ea6ac, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:18 server <- Reading packet 2 (183 bytes) for connection 749070ae, 1-RTT 2025/09/12 02:43:18 server Short Header{DestConnectionID: 749070ae, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 120µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:18 server newly acked packets (1): [3] 2025/09/12 02:43:18 server updated RTT: 31.61473ms (σ: 15.807365ms) 2025/09/12 02:43:18 server ECN capability confirmed. 2025/09/12 02:43:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f4d4dac0ba68cb60, StatelessResetToken: 0x4123f5324f4fc8dbdef5c72b90caf210} 2025/09/12 02:43:18 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:18 server <- Reading packet 3 (33 bytes) for connection 749070ae, 1-RTT 2025/09/12 02:43:18 server Short Header{DestConnectionID: 749070ae, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 104µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:18 server newly acked packets (1): [4] 2025/09/12 02:43:18 server updated RTT: 31.662ms (σ: 11.951ms) 2025/09/12 02:43:18 server Canceling loss detection timer. 2025/09/12 02:43:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:18 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:18 Replacing connection for connection IDs [749070ae 5f61466b 8fdae06c fe5765cd 31f5b599 e12aa61d e79e7e85e7f803b0] with a closed connection. 2025/09/12 02:43:18 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:18 server Connection e79e7e85e7f803b0 closed. 2025/09/12 02:43:18 Removing connection IDs [749070ae 5f61466b 8fdae06c fe5765cd 31f5b599 e12aa61d e79e7e85e7f803b0] for a closed connection after it has been retired. 2025/09/12 02:43:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:43:18 server -> Sending packet 14 (297 bytes) for connection eacee66e59396015, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:18 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:18 server -> &wire.NewTokenFrame{Token: 0x630f84fc82d7f08738a6bd58713f3770ae01b68b0f870adb1f83f8700c2f9df2c3dbe23e3c97e3821b9fe554435d3f5101629158d5fdad5c6a734f7606dd47c2bd76d0f88a8001e38be090cf52b14c6a79c71343f8d3e51aa95d} 2025/09/12 02:43:18 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:18 server Skipping packet number 13 2025/09/12 02:43:18 server -> Sending packet 15 (1053 bytes) for connection eacee66e59396015, 1-RTT (ECN: Not-ECT) 2025/09/12 02:43:18 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:18 server <- Received Initial packet. 2025/09/12 02:43:18 Created qlog file: /logs/qlog/18e393947b136f45.sqlog 2025/09/12 02:43:18 server Changing connection ID to 8a91eb15. 2025/09/12 02:43:18 Adding connection IDs 18e393947b136f45 and 8a91eb15 for a new connection. 2025/09/12 02:43:18 server <- Reading packet 124703 (1252 bytes) for connection 18e393947b136f45, Initial 2025/09/12 02:43:18 server Long Header{Type: Initial, DestConnectionID: 18e393947b136f45, SrcConnectionID: 75a658c514057929, Token: 0xd23127731e0de0e8ff2732ab56acec737175c5c11317e3be9bf260850d0dfb8ca8c83591873492fb2c084b341a6e9b4ba317ac3b3f28fa4314ce4c324d2d04848c3ae6d26e1bd93d794731cd5056e965caff0b0760a1f63faa19, PacketNumber: 124703, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:18 server <- &wire.PingFrame{} 2025/09/12 02:43:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 75a658c514057929, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:18 Adding connection ID be9f2bc7. 2025/09/12 02:43:18 Adding connection ID 898abfe9. 2025/09/12 02:43:18 Adding connection ID bda46924. 2025/09/12 02:43:18 Adding connection ID ad499ad4. 2025/09/12 02:43:18 Adding connection ID 67cb925a. 2025/09/12 02:43:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 18e393947b136f45 2025/09/12 02:43:18 server Long Header{Type: Initial, DestConnectionID: 75a658c514057929, SrcConnectionID: 8a91eb15, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 914, Version: v1} 2025/09/12 02:43:18 server -> &wire.AckFrame{LargestAcked: 124703, LowestAcked: 124703, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:18 server Long Header{Type: Handshake, DestConnectionID: 75a658c514057929, SrcConnectionID: 8a91eb15, PacketNumber: 0, PacketNumberLen: 2, Length: 176, Version: v1} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/09/12 02:43:18 server Short Header{DestConnectionID: 75a658c514057929, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 898abfe9, StatelessResetToken: 0xb987a3397bdf31363c5f0c6277b454f3} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ad499ad4, StatelessResetToken: 0x71c285d8430278fabe7df856a7b8d9da} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 67cb925a, StatelessResetToken: 0xfa028d6aeb976fea661f0580bea6911e} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: be9f2bc7, StatelessResetToken: 0xaa8e9fb0336a7c6052e6d668a8c4941d} 2025/09/12 02:43:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bda46924, StatelessResetToken: 0x79bab8ce58c7d5f64749159fe60118ff} 2025/09/12 02:43:18 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:18 server <- Reading packet 0 (85 bytes) for connection 8a91eb15, Handshake 2025/09/12 02:43:18 server Long Header{Type: Handshake, DestConnectionID: 8a91eb15, SrcConnectionID: 75a658c514057929, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:18 server Dropping Initial keys. 2025/09/12 02:43:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 352µs} 2025/09/12 02:43:18 server newly acked packets (1): [0] 2025/09/12 02:43:18 server updated RTT: 32.401109ms (σ: 16.200554ms) 2025/09/12 02:43:18 server Canceling loss detection timer. 2025/09/12 02:43:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:18 server Dropping Handshake keys. 2025/09/12 02:43:18 server <- Reading packet 0 (183 bytes) for connection 8a91eb15, 1-RTT 2025/09/12 02:43:18 server Short Header{DestConnectionID: 8a91eb15, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1b51c8a059cb8422, StatelessResetToken: 0xc909a6ef47f4d67bb33e8c13e52e8665} 2025/09/12 02:43:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2d2fa4923cc3747c, StatelessResetToken: 0x97de5afd5ba9ca650d54bc355417637d} 2025/09/12 02:43:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b0735f0d9df3c743, StatelessResetToken: 0xf628abf2ea5be66bd66fbc3b6c807fe2} 2025/09/12 02:43:18 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:18 server -> Sending packet 1 (305 bytes) for connection 18e393947b136f45, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:18 server Short Header{DestConnectionID: 1b51c8a059cb8422, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 258.855µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:18 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:18 server -> &wire.NewTokenFrame{Token: 0x29f4c08b2ca5fd957d4fd4d3227064436b1aa68846b8231319064fdc6ebc3f511c0c035fd964d68b94df9f21d7fc7fbb33044f02692e2733ec59b159538f34c1994ba6c4c50107d838426e9545e74c9b571218b932b6b2a86243} 2025/09/12 02:43:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:18 server <- Reading packet 2 (55 bytes) for connection 8a91eb15, 1-RTT 2025/09/12 02:43:18 server Short Header{DestConnectionID: 8a91eb15, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:18 server newly acked packets (1): [0] 2025/09/12 02:43:18 server updated RTT: 32.458ms (σ: 12.264ms) 2025/09/12 02:43:19 server <- Reading packet 4 (55 bytes) for connection 8a91eb15, 1-RTT 2025/09/12 02:43:19 server Short Header{DestConnectionID: 8a91eb15, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 4.264ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:19 server newly acked packets (1): [1] 2025/09/12 02:43:19 server updated RTT: 32.79ms (σ: 9.862ms) 2025/09/12 02:43:19 server ECN capability confirmed. 2025/09/12 02:43:19 server Canceling loss detection timer. 2025/09/12 02:43:19 server Ignoring all packets below 1. 2025/09/12 02:43:19 server <- Reading packet 6 (183 bytes) for connection 8a91eb15, 1-RTT 2025/09/12 02:43:19 server Short Header{DestConnectionID: 8a91eb15, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 26f9305448128dc1, StatelessResetToken: 0x90fcda90df52212073d67b09abc5dfe5} 2025/09/12 02:43:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 256.368ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:19 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:19 server -> Sending packet 2 (1360 bytes) for connection 18e393947b136f45, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:19 server Short Header{DestConnectionID: 1b51c8a059cb8422, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:19 server -> &wire.PingFrame{} 2025/09/12 02:43:19 server -> Sending packet 3 (39 bytes) for connection 18e393947b136f45, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:19 server Short Header{DestConnectionID: 1b51c8a059cb8422, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:19 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 149.571µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:19 Removing connection ID 18e393947b136f45. 2025/09/12 02:43:19 server <- Reading packet 7 (55 bytes) for connection 8a91eb15, 1-RTT 2025/09/12 02:43:19 server Short Header{DestConnectionID: 8a91eb15, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:19 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:19 Received request: GET /essasxcprm 2025/09/12 02:43:19 server -> Sending packet 4 (1065 bytes) for connection 18e393947b136f45, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:19 server Short Header{DestConnectionID: 1b51c8a059cb8422, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:19 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 200.669µs, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 02:43:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:19 server <- Reading packet 8 (35 bytes) for connection 8a91eb15, 1-RTT 2025/09/12 02:43:19 server Short Header{DestConnectionID: 8a91eb15, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 120µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:19 server newly acked packets (1): [4] 2025/09/12 02:43:19 server updated RTT: 32.631ms (σ: 7.712ms) 2025/09/12 02:43:19 server lost packet 2 (time threshold) 2025/09/12 02:43:19 server Canceling loss detection timer. 2025/09/12 02:43:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:19 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:19 Replacing connection for connection IDs [898abfe9 bda46924 ad499ad4 67cb925a 8a91eb15 be9f2bc7] with a closed connection. 2025/09/12 02:43:19 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:19 server Connection 18e393947b136f45 closed. 2025/09/12 02:43:19 Removing connection IDs [898abfe9 bda46924 ad499ad4 67cb925a 8a91eb15 be9f2bc7] for a closed connection after it has been retired. 2025/09/12 02:43:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:43:19 server -> Sending packet 21 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:19 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:19 server -> Sending packet 22 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:19 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:19 server <- Received Initial packet. 2025/09/12 02:43:19 Created qlog file: /logs/qlog/1f3d36b1ad1e7ca7.sqlog 2025/09/12 02:43:19 server Changing connection ID to a38b8795. 2025/09/12 02:43:19 Adding connection IDs 1f3d36b1ad1e7ca7 and a38b8795 for a new connection. 2025/09/12 02:43:19 server <- Reading packet 119826 (1252 bytes) for connection 1f3d36b1ad1e7ca7, Initial 2025/09/12 02:43:19 server Long Header{Type: Initial, DestConnectionID: 1f3d36b1ad1e7ca7, SrcConnectionID: 31b38d386b88db7e, Token: 0x29f4c08b2ca5fd957d4fd4d3227064436b1aa68846b8231319064fdc6ebc3f511c0c035fd964d68b94df9f21d7fc7fbb33044f02692e2733ec59b159538f34c1994ba6c4c50107d838426e9545e74c9b571218b932b6b2a86243, PacketNumber: 119826, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:19 server <- &wire.PingFrame{} 2025/09/12 02:43:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 31b38d386b88db7e, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:19 Adding connection ID d8f7bfea. 2025/09/12 02:43:19 Adding connection ID c1238bf6. 2025/09/12 02:43:19 Adding connection ID a6aa5cc6. 2025/09/12 02:43:19 Adding connection ID d0c1e248. 2025/09/12 02:43:19 Adding connection ID 745ae937. 2025/09/12 02:43:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1f3d36b1ad1e7ca7 2025/09/12 02:43:19 server Long Header{Type: Initial, DestConnectionID: 31b38d386b88db7e, SrcConnectionID: a38b8795, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 909, Version: v1} 2025/09/12 02:43:19 server -> &wire.AckFrame{LargestAcked: 119826, LowestAcked: 119826, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:19 server Long Header{Type: Handshake, DestConnectionID: 31b38d386b88db7e, SrcConnectionID: a38b8795, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/09/12 02:43:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/09/12 02:43:19 server Short Header{DestConnectionID: 31b38d386b88db7e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c1238bf6, StatelessResetToken: 0x81c72385ca7662d32d411014bd07bba6} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d0c1e248, StatelessResetToken: 0x2dfba58c93afea904d0eca4ba1637902} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8f7bfea, StatelessResetToken: 0x67734ce1878f961917e5c37da8f9b171} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 745ae937, StatelessResetToken: 0xccfabccbca3ab82391225497330dbafa} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a6aa5cc6, StatelessResetToken: 0xb60db11e5fb3d097ba5e775991da7558} 2025/09/12 02:43:19 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:19 server <- Reading packet 0 (85 bytes) for connection a38b8795, Handshake 2025/09/12 02:43:19 server Long Header{Type: Handshake, DestConnectionID: a38b8795, SrcConnectionID: 31b38d386b88db7e, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:19 server Dropping Initial keys. 2025/09/12 02:43:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408µs} 2025/09/12 02:43:19 server newly acked packets (1): [0] 2025/09/12 02:43:19 server updated RTT: 32.377735ms (σ: 16.188867ms) 2025/09/12 02:43:19 server Canceling loss detection timer. 2025/09/12 02:43:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:19 server Dropping Handshake keys. 2025/09/12 02:43:19 server <- Reading packet 0 (183 bytes) for connection a38b8795, 1-RTT 2025/09/12 02:43:19 server Short Header{DestConnectionID: a38b8795, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ad9b1cfa3abb2c11, StatelessResetToken: 0x5d0e7e672948cd41bd31f7809a0f23f5} 2025/09/12 02:43:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8dfeec621bb3c339, StatelessResetToken: 0x7bb1cd0c59eeb0bba65e2ed22c77eaf5} 2025/09/12 02:43:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c78f9e5865265e8f, StatelessResetToken: 0xa369f9020eb687373e289b61ff64aae4} 2025/09/12 02:43:19 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:19 server -> Sending packet 1 (305 bytes) for connection 1f3d36b1ad1e7ca7, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:19 server Short Header{DestConnectionID: ad9b1cfa3abb2c11, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 321.875µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:19 server -> &wire.NewTokenFrame{Token: 0xd42d255348501ebf7d9482bb580a4f3d2c34b8487d6ee6e59bd4375c940ebe8d57a82f70d56bda3993cb55dcf4b007e324bb83200907b441e7dab16768a1a33e5f3dd3d70dcbb9c793ae1fd76a7070234f76437436ace5f50a2c} 2025/09/12 02:43:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:19 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:19 server Dropping %!s(logging.PacketType=1) packet (183 bytes) because we already dropped the keys. 2025/09/12 02:43:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:19 server -> Sending packet 3 (147 bytes) for connection 1f3d36b1ad1e7ca7, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:19 server Short Header{DestConnectionID: ad9b1cfa3abb2c11, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d0c1e248, StatelessResetToken: 0x2dfba58c93afea904d0eca4ba1637902} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8f7bfea, StatelessResetToken: 0x67734ce1878f961917e5c37da8f9b171} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 745ae937, StatelessResetToken: 0xccfabccbca3ab82391225497330dbafa} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a6aa5cc6, StatelessResetToken: 0xb60db11e5fb3d097ba5e775991da7558} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c1238bf6, StatelessResetToken: 0x81c72385ca7662d32d411014bd07bba6} 2025/09/12 02:43:19 server Skipping packet number 2 2025/09/12 02:43:19 server -> Sending packet 4 (297 bytes) for connection 1f3d36b1ad1e7ca7, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:19 server Short Header{DestConnectionID: ad9b1cfa3abb2c11, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:19 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:19 server -> &wire.NewTokenFrame{Token: 0xd42d255348501ebf7d9482bb580a4f3d2c34b8487d6ee6e59bd4375c940ebe8d57a82f70d56bda3993cb55dcf4b007e324bb83200907b441e7dab16768a1a33e5f3dd3d70dcbb9c793ae1fd76a7070234f76437436ace5f50a2c} 2025/09/12 02:43:19 server <- Reading packet 3 (183 bytes) for connection a38b8795, 1-RTT 2025/09/12 02:43:19 server Short Header{DestConnectionID: a38b8795, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 104µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:19 server newly acked packets (1): [4] 2025/09/12 02:43:19 server updated RTT: 32.247ms (σ: 12.4ms) 2025/09/12 02:43:19 server ECN capability confirmed. 2025/09/12 02:43:19 server setting loss timer for packet 3 (1-RTT) to 36.277875ms (in 2025-09-12 02:43:19.779563506 +0000 UTC m=+15.967714141) 2025/09/12 02:43:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 12047e5fb7b87aa3, StatelessResetToken: 0x668fc55847e473bc6b90989975b3b62c} 2025/09/12 02:43:19 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:19 server -> Sending packet 5 (37 bytes) for connection 1f3d36b1ad1e7ca7, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:19 server Short Header{DestConnectionID: ad9b1cfa3abb2c11, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:19 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 129.012µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:19 server Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 02:43:19.779563506 +0000 UTC m=+15.967714141 2025/09/12 02:43:19 server lost packet 3 (time threshold) 2025/09/12 02:43:19 server Canceling loss detection timer. 2025/09/12 02:43:19 server -> Sending packet 6 (147 bytes) for connection 1f3d36b1ad1e7ca7, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:19 server Short Header{DestConnectionID: ad9b1cfa3abb2c11, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a6aa5cc6, StatelessResetToken: 0xb60db11e5fb3d097ba5e775991da7558} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8f7bfea, StatelessResetToken: 0x67734ce1878f961917e5c37da8f9b171} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c1238bf6, StatelessResetToken: 0x81c72385ca7662d32d411014bd07bba6} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 745ae937, StatelessResetToken: 0xccfabccbca3ab82391225497330dbafa} 2025/09/12 02:43:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d0c1e248, StatelessResetToken: 0x2dfba58c93afea904d0eca4ba1637902} 2025/09/12 02:43:19 server <- Reading packet 5 (55 bytes) for connection a38b8795, 1-RTT 2025/09/12 02:43:19 server Short Header{DestConnectionID: a38b8795, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:19 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 48µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:19 server newly acked packets (1): [6] 2025/09/12 02:43:19 server updated RTT: 32.062ms (σ: 9.668ms) 2025/09/12 02:43:19 server Canceling loss detection timer. 2025/09/12 02:43:19 server -> Sending packet 7 (1360 bytes) for connection 1f3d36b1ad1e7ca7, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:19 server Short Header{DestConnectionID: ad9b1cfa3abb2c11, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:19 server -> &wire.PingFrame{} 2025/09/12 02:43:19 server <- Reading packet 6 (55 bytes) for connection a38b8795, 1-RTT 2025/09/12 02:43:19 server Short Header{DestConnectionID: a38b8795, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:19 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, DelayTime: 3.936ms, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:43:19 server newly acked packets (1): [7] 2025/09/12 02:43:19 server updated RTT: 32.028ms (σ: 7.317ms) 2025/09/12 02:43:19 Removing connection ID 1f3d36b1ad1e7ca7. 2025/09/12 02:43:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:43:20 server -> Sending packet 17 (297 bytes) for connection eacee66e59396015, 1-RTT (ECN: Not-ECT) 2025/09/12 02:43:20 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:20 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:20 server -> &wire.NewTokenFrame{Token: 0x630f84fc82d7f08738a6bd58713f3770ae01b68b0f870adb1f83f8700c2f9df2c3dbe23e3c97e3821b9fe554435d3f5101629158d5fdad5c6a734f7606dd47c2bd76d0f88a8001e38be090cf52b14c6a79c71343f8d3e51aa95d} 2025/09/12 02:43:20 server Skipping packet number 16 2025/09/12 02:43:20 server -> Sending packet 18 (1053 bytes) for connection eacee66e59396015, 1-RTT (ECN: Not-ECT) 2025/09/12 02:43:20 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:20 server <- Reading packet 9 (55 bytes) for connection a38b8795, 1-RTT 2025/09/12 02:43:20 server Short Header{DestConnectionID: a38b8795, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:20 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:20 server -> Sending packet 8 (1400 bytes) for connection 1f3d36b1ad1e7ca7, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:20 server Short Header{DestConnectionID: ad9b1cfa3abb2c11, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:20 server -> &wire.PingFrame{} 2025/09/12 02:43:20 Received request: GET /iyvdejszyx 2025/09/12 02:43:20 server -> Sending packet 9 (41 bytes) for connection 1f3d36b1ad1e7ca7, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:20 server Short Header{DestConnectionID: ad9b1cfa3abb2c11, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:20 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 95.019µs, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 02:43:20 server -> Sending packet 10 (1053 bytes) for connection 1f3d36b1ad1e7ca7, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:20 server Short Header{DestConnectionID: ad9b1cfa3abb2c11, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:43:20 server -> Sending packet 18 (416 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:20 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:20 server -> &wire.NewTokenFrame{Token: 0x78690347c39cb3e587d1037d1f4c7089916648d2ab7d9fafe25d3fba6e54b585a6de99b5fdfec21c1f4308b919af9eb8fe10ba2265f43547f4e41aefc08c1ca17a54ce684132ef7ed83c53a5c16a4e1131caa1f2780c39e6a4dfae} 2025/09/12 02:43:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f60a412, StatelessResetToken: 0x04f6bc58a448ffed78114caa0f8dabea} 2025/09/12 02:43:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 722589e0, StatelessResetToken: 0xfd32ae2e9c06e805a0a31952b05b4316} 2025/09/12 02:43:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec7b6309, StatelessResetToken: 0xea66ecd1b9111acaf6b6f3006d905506} 2025/09/12 02:43:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1f22be29, StatelessResetToken: 0x528760f6b2968c56e8d17ad0a6e169fd} 2025/09/12 02:43:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5912d500, StatelessResetToken: 0x8e0b201920f61cfe15f04309b5ebc959} 2025/09/12 02:43:20 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:20 server Skipping packet number 17 2025/09/12 02:43:20 server -> Sending packet 19 (1053 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:20 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:20 server <- Reading packet 11 (33 bytes) for connection a38b8795, 1-RTT 2025/09/12 02:43:20 server Short Header{DestConnectionID: a38b8795, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:20 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 4, DelayTime: 112µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 02:43:20 server newly acked packets (2): [8 10] 2025/09/12 02:43:20 server updated RTT: 32.087ms (σ: 5.607ms) 2025/09/12 02:43:20 server Canceling loss detection timer. 2025/09/12 02:43:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:20 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:20 Replacing connection for connection IDs [a38b8795 d8f7bfea c1238bf6 a6aa5cc6 d0c1e248 745ae937] with a closed connection. 2025/09/12 02:43:20 server Connection 1f3d36b1ad1e7ca7 closed. 2025/09/12 02:43:20 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:20 Removing connection IDs [a38b8795 d8f7bfea c1238bf6 a6aa5cc6 d0c1e248 745ae937] for a closed connection after it has been retired. 2025/09/12 02:43:20 server <- Received Initial packet. 2025/09/12 02:43:20 Created qlog file: /logs/qlog/3128c1f66a343715.sqlog 2025/09/12 02:43:20 server Changing connection ID to 51b9251c. 2025/09/12 02:43:20 Adding connection IDs 3128c1f66a343715 and 51b9251c for a new connection. 2025/09/12 02:43:20 server <- Reading packet 117881 (1252 bytes) for connection 3128c1f66a343715, Initial 2025/09/12 02:43:20 server Long Header{Type: Initial, DestConnectionID: 3128c1f66a343715, SrcConnectionID: 97399ecca7f5834d, Token: 0xd42d255348501ebf7d9482bb580a4f3d2c34b8487d6ee6e59bd4375c940ebe8d57a82f70d56bda3993cb55dcf4b007e324bb83200907b441e7dab16768a1a33e5f3dd3d70dcbb9c793ae1fd76a7070234f76437436ace5f50a2c, PacketNumber: 117881, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:20 server <- &wire.PingFrame{} 2025/09/12 02:43:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 97399ecca7f5834d, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:20 Adding connection ID 60dd0bc4. 2025/09/12 02:43:20 Adding connection ID 35156413. 2025/09/12 02:43:20 Adding connection ID 51597268. 2025/09/12 02:43:20 Adding connection ID 9a2108e5. 2025/09/12 02:43:20 Adding connection ID 9bc5a59e. 2025/09/12 02:43:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3128c1f66a343715 2025/09/12 02:43:20 server Long Header{Type: Initial, DestConnectionID: 97399ecca7f5834d, SrcConnectionID: 51b9251c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 919, Version: v1} 2025/09/12 02:43:20 server -> &wire.AckFrame{LargestAcked: 117881, LowestAcked: 117881, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:20 server Long Header{Type: Handshake, DestConnectionID: 97399ecca7f5834d, SrcConnectionID: 51b9251c, PacketNumber: 0, PacketNumberLen: 2, Length: 171, Version: v1} 2025/09/12 02:43:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/09/12 02:43:20 server Short Header{DestConnectionID: 97399ecca7f5834d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 9bc5a59e, StatelessResetToken: 0xae19ddad11bd294d365b381ca2fe323a} 2025/09/12 02:43:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 60dd0bc4, StatelessResetToken: 0x9c47a9e08ddd37966e9efe36b3a2068d} 2025/09/12 02:43:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 35156413, StatelessResetToken: 0x7e16c318388209bdbc923158323467dc} 2025/09/12 02:43:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9a2108e5, StatelessResetToken: 0x4c4dc4b6072167afe5550e0892cf69ad} 2025/09/12 02:43:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 51597268, StatelessResetToken: 0x8b4e4579bb94c5e48d77e4f56963ee8f} 2025/09/12 02:43:20 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:20 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:20 server -> Sending packet 1 (1280 bytes) for connection 3128c1f66a343715, Initial 2025/09/12 02:43:20 server Long Header{Type: Initial, DestConnectionID: 97399ecca7f5834d, SrcConnectionID: 51b9251c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:20 server -> Sending packet 2 (1280 bytes) for connection 3128c1f66a343715, Initial 2025/09/12 02:43:20 server Long Header{Type: Initial, DestConnectionID: 97399ecca7f5834d, SrcConnectionID: 51b9251c, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:20 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:20 server -> Sending packet 1 (192 bytes) for connection 3128c1f66a343715, Handshake 2025/09/12 02:43:20 server Long Header{Type: Handshake, DestConnectionID: 97399ecca7f5834d, SrcConnectionID: 51b9251c, PacketNumber: 1, PacketNumberLen: 2, Length: 171, Version: v1} 2025/09/12 02:43:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/09/12 02:43:20 server -> Sending packet 2 (192 bytes) for connection 3128c1f66a343715, Handshake 2025/09/12 02:43:20 server Long Header{Type: Handshake, DestConnectionID: 97399ecca7f5834d, SrcConnectionID: 51b9251c, PacketNumber: 2, PacketNumberLen: 2, Length: 171, Version: v1} 2025/09/12 02:43:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/09/12 02:43:20 server <- Reading packet 1 (55 bytes) for connection 51b9251c, Handshake 2025/09/12 02:43:20 server Long Header{Type: Handshake, DestConnectionID: 51b9251c, SrcConnectionID: 97399ecca7f5834d, PacketNumber: 1, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:20 server Dropping Initial keys. 2025/09/12 02:43:20 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 48µs} 2025/09/12 02:43:20 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:43:20 server -> Sending packet 3 (192 bytes) for connection 3128c1f66a343715, Handshake 2025/09/12 02:43:20 server Long Header{Type: Handshake, DestConnectionID: 97399ecca7f5834d, SrcConnectionID: 51b9251c, PacketNumber: 3, PacketNumberLen: 2, Length: 171, Version: v1} 2025/09/12 02:43:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/09/12 02:43:20 server -> Sending packet 4 (192 bytes) for connection 3128c1f66a343715, Handshake 2025/09/12 02:43:20 server Long Header{Type: Handshake, DestConnectionID: 97399ecca7f5834d, SrcConnectionID: 51b9251c, PacketNumber: 4, PacketNumberLen: 2, Length: 171, Version: v1} 2025/09/12 02:43:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/09/12 02:43:20 server Queueing packet (183 bytes) for later decryption 2025/09/12 02:43:20 server <- Reading packet 2 (55 bytes) for connection 51b9251c, Handshake 2025/09/12 02:43:20 server Long Header{Type: Handshake, DestConnectionID: 51b9251c, SrcConnectionID: 97399ecca7f5834d, PacketNumber: 2, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:20 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 32µs} 2025/09/12 02:43:20 server newly acked packets (1): [4] 2025/09/12 02:43:20 server updated RTT: 30.966652ms (σ: 15.483326ms) 2025/09/12 02:43:20 server Canceling loss detection timer. 2025/09/12 02:43:21 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:21 server <- Reading packet 3 (183 bytes) for connection 51b9251c, Handshake 2025/09/12 02:43:21 server Long Header{Type: Handshake, DestConnectionID: 51b9251c, SrcConnectionID: 97399ecca7f5834d, PacketNumber: 3, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:21 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 166.216ms} 2025/09/12 02:43:21 server Dropping Handshake keys. 2025/09/12 02:43:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:21 server -> Sending packet 2 (415 bytes) for connection 3128c1f66a343715, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:21 server Short Header{DestConnectionID: 97399ecca7f5834d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 60dd0bc4, StatelessResetToken: 0x9c47a9e08ddd37966e9efe36b3a2068d} 2025/09/12 02:43:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 35156413, StatelessResetToken: 0x7e16c318388209bdbc923158323467dc} 2025/09/12 02:43:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9a2108e5, StatelessResetToken: 0x4c4dc4b6072167afe5550e0892cf69ad} 2025/09/12 02:43:21 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:21 server -> &wire.NewTokenFrame{Token: 0x35658b4e9bd6b150e4745930dc1988aaf6f6c2d915685cdb325bcf3e69302c53139d672723ef8aff0dfb2305157b331495551c84a6df2e6460c7398a3882f12b4aefd91a2b51e95197f14e58f39b4e7d530b12b0675fe3e39c59} 2025/09/12 02:43:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 9bc5a59e, StatelessResetToken: 0xae19ddad11bd294d365b381ca2fe323a} 2025/09/12 02:43:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 51597268, StatelessResetToken: 0x8b4e4579bb94c5e48d77e4f56963ee8f} 2025/09/12 02:43:21 server -> Sending packet 3 (415 bytes) for connection 3128c1f66a343715, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:21 server Short Header{DestConnectionID: 97399ecca7f5834d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 60dd0bc4, StatelessResetToken: 0x9c47a9e08ddd37966e9efe36b3a2068d} 2025/09/12 02:43:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 51597268, StatelessResetToken: 0x8b4e4579bb94c5e48d77e4f56963ee8f} 2025/09/12 02:43:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 35156413, StatelessResetToken: 0x7e16c318388209bdbc923158323467dc} 2025/09/12 02:43:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:21 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 9bc5a59e, StatelessResetToken: 0xae19ddad11bd294d365b381ca2fe323a} 2025/09/12 02:43:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9a2108e5, StatelessResetToken: 0x4c4dc4b6072167afe5550e0892cf69ad} 2025/09/12 02:43:21 server -> &wire.NewTokenFrame{Token: 0x35658b4e9bd6b150e4745930dc1988aaf6f6c2d915685cdb325bcf3e69302c53139d672723ef8aff0dfb2305157b331495551c84a6df2e6460c7398a3882f12b4aefd91a2b51e95197f14e58f39b4e7d530b12b0675fe3e39c59} 2025/09/12 02:43:21 server <- Reading packet 1 (55 bytes) for connection 51b9251c, 1-RTT 2025/09/12 02:43:21 server Short Header{DestConnectionID: 51b9251c, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:21 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:21 server <- Reading packet 3 (183 bytes) for connection 51b9251c, 1-RTT 2025/09/12 02:43:21 server Short Header{DestConnectionID: 51b9251c, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 316491da9287fed3, StatelessResetToken: 0xbfba65d6122a1d3091aa2579610576cd} 2025/09/12 02:43:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b85a7db39fe8ba83, StatelessResetToken: 0x900cffdf0fdbb090ecf635b45d36d89c} 2025/09/12 02:43:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 76d8c6b99537d665, StatelessResetToken: 0x6ffed032c6cf1221cc264e016a2ee0ad} 2025/09/12 02:43:21 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 84.152ms} 2025/09/12 02:43:21 Received request: GET /pmeygxazsq 2025/09/12 02:43:21 server <- Reading packet 4 (55 bytes) for connection 51b9251c, 1-RTT 2025/09/12 02:43:21 server Short Header{DestConnectionID: 51b9251c, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:21 server -> Sending packet 4 (1066 bytes) for connection 3128c1f66a343715, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:21 server Short Header{DestConnectionID: 316491da9287fed3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:21 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 17.400188ms, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:21 server <- Reading packet 6 (55 bytes) for connection 51b9251c, 1-RTT 2025/09/12 02:43:21 server Short Header{DestConnectionID: 51b9251c, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:21 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 4.216ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:21 server newly acked packets (1): [3] 2025/09/12 02:43:21 server updated RTT: 31.023ms (σ: 11.727ms) 2025/09/12 02:43:21 server ECN capability confirmed. 2025/09/12 02:43:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:21 server -> Sending packet 6 (1055 bytes) for connection 3128c1f66a343715, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:21 server Short Header{DestConnectionID: 316491da9287fed3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:21 server -> Sending packet 7 (1055 bytes) for connection 3128c1f66a343715, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:21 server Short Header{DestConnectionID: 316491da9287fed3, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:21 server <- Reading packet 7 (37 bytes) for connection 51b9251c, 1-RTT 2025/09/12 02:43:21 server Short Header{DestConnectionID: 51b9251c, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:21 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 152µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:21 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:21 Replacing connection for connection IDs [60dd0bc4 35156413 51597268 9a2108e5 9bc5a59e 51b9251c 3128c1f66a343715] with a closed connection. 2025/09/12 02:43:21 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:21 server Connection 3128c1f66a343715 closed. 2025/09/12 02:43:21 Removing connection IDs [60dd0bc4 35156413 51597268 9a2108e5 9bc5a59e 51b9251c 3128c1f66a343715] for a closed connection after it has been retired. 2025/09/12 02:43:22 server <- Received Initial packet. 2025/09/12 02:43:22 Created qlog file: /logs/qlog/42ad969d4ac7ff83.sqlog 2025/09/12 02:43:22 server Changing connection ID to 77b0cc90. 2025/09/12 02:43:22 Adding connection IDs 42ad969d4ac7ff83 and 77b0cc90 for a new connection. 2025/09/12 02:43:22 server <- Reading packet 123473 (1252 bytes) for connection 42ad969d4ac7ff83, Initial 2025/09/12 02:43:22 server Long Header{Type: Initial, DestConnectionID: 42ad969d4ac7ff83, SrcConnectionID: 32c43ad831d003f6, Token: 0x35658b4e9bd6b150e4745930dc1988aaf6f6c2d915685cdb325bcf3e69302c53139d672723ef8aff0dfb2305157b331495551c84a6df2e6460c7398a3882f12b4aefd91a2b51e95197f14e58f39b4e7d530b12b0675fe3e39c59, PacketNumber: 123473, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:22 server <- &wire.PingFrame{} 2025/09/12 02:43:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:22 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:22 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:22 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:22 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 32c43ad831d003f6, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:22 Adding connection ID f6acd9d1. 2025/09/12 02:43:22 Adding connection ID 363dc45b. 2025/09/12 02:43:22 Adding connection ID e7879ab3. 2025/09/12 02:43:22 Adding connection ID 45d20830. 2025/09/12 02:43:22 Adding connection ID 586b57aa. 2025/09/12 02:43:22 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 42ad969d4ac7ff83 2025/09/12 02:43:22 server Long Header{Type: Initial, DestConnectionID: 32c43ad831d003f6, SrcConnectionID: 77b0cc90, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 907, Version: v1} 2025/09/12 02:43:22 server -> &wire.AckFrame{LargestAcked: 123473, LowestAcked: 123473, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:22 server Long Header{Type: Handshake, DestConnectionID: 32c43ad831d003f6, SrcConnectionID: 77b0cc90, PacketNumber: 0, PacketNumberLen: 2, Length: 183, Version: v1} 2025/09/12 02:43:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/09/12 02:43:22 server Short Header{DestConnectionID: 32c43ad831d003f6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e7879ab3, StatelessResetToken: 0x387cf00fa628f24ed9fdea729acdeb00} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f6acd9d1, StatelessResetToken: 0x9d2587807ba23e0c58355c8c285c55dd} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 45d20830, StatelessResetToken: 0x07629cf804f301b1ee7ca6d3a1501de0} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 586b57aa, StatelessResetToken: 0xf2cf413325044de174707811c76cf061} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 363dc45b, StatelessResetToken: 0x658b1b599702f9bcc6bcb3b8e678d82d} 2025/09/12 02:43:22 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:22 server -> Sending packet 1 (1280 bytes) for connection 42ad969d4ac7ff83, Initial 2025/09/12 02:43:22 server Long Header{Type: Initial, DestConnectionID: 32c43ad831d003f6, SrcConnectionID: 77b0cc90, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:22 server -> Sending packet 2 (1280 bytes) for connection 42ad969d4ac7ff83, Initial 2025/09/12 02:43:22 server Long Header{Type: Initial, DestConnectionID: 32c43ad831d003f6, SrcConnectionID: 77b0cc90, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:22 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:22 server -> Sending packet 1 (204 bytes) for connection 42ad969d4ac7ff83, Handshake 2025/09/12 02:43:22 server Long Header{Type: Handshake, DestConnectionID: 32c43ad831d003f6, SrcConnectionID: 77b0cc90, PacketNumber: 1, PacketNumberLen: 2, Length: 183, Version: v1} 2025/09/12 02:43:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/09/12 02:43:22 server -> Sending packet 2 (204 bytes) for connection 42ad969d4ac7ff83, Handshake 2025/09/12 02:43:22 server Long Header{Type: Handshake, DestConnectionID: 32c43ad831d003f6, SrcConnectionID: 77b0cc90, PacketNumber: 2, PacketNumberLen: 2, Length: 183, Version: v1} 2025/09/12 02:43:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/09/12 02:43:22 server <- Reading packet 0 (42 bytes) for connection 77b0cc90, Handshake 2025/09/12 02:43:22 server Long Header{Type: Handshake, DestConnectionID: 77b0cc90, SrcConnectionID: 32c43ad831d003f6, PacketNumber: 0, PacketNumberLen: 4, Length: 21, Version: v1} 2025/09/12 02:43:22 server Dropping Initial keys. 2025/09/12 02:43:22 server <- &wire.PingFrame{} 2025/09/12 02:43:22 server -> Sending packet 3 (47 bytes) for connection 42ad969d4ac7ff83, Handshake 2025/09/12 02:43:22 server Long Header{Type: Handshake, DestConnectionID: 32c43ad831d003f6, SrcConnectionID: 77b0cc90, PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 02:43:22 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:22 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:22 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:43:22 server -> Sending packet 4 (204 bytes) for connection 42ad969d4ac7ff83, Handshake 2025/09/12 02:43:22 server Long Header{Type: Handshake, DestConnectionID: 32c43ad831d003f6, SrcConnectionID: 77b0cc90, PacketNumber: 4, PacketNumberLen: 2, Length: 183, Version: v1} 2025/09/12 02:43:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/09/12 02:43:22 server -> Sending packet 5 (204 bytes) for connection 42ad969d4ac7ff83, Handshake 2025/09/12 02:43:22 server Long Header{Type: Handshake, DestConnectionID: 32c43ad831d003f6, SrcConnectionID: 77b0cc90, PacketNumber: 5, PacketNumberLen: 2, Length: 183, Version: v1} 2025/09/12 02:43:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/09/12 02:43:22 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:22 server -> Sending packet 6 (204 bytes) for connection 42ad969d4ac7ff83, Handshake 2025/09/12 02:43:22 server Long Header{Type: Handshake, DestConnectionID: 32c43ad831d003f6, SrcConnectionID: 77b0cc90, PacketNumber: 6, PacketNumberLen: 2, Length: 183, Version: v1} 2025/09/12 02:43:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/09/12 02:43:22 server -> Sending packet 7 (204 bytes) for connection 42ad969d4ac7ff83, Handshake 2025/09/12 02:43:22 server Long Header{Type: Handshake, DestConnectionID: 32c43ad831d003f6, SrcConnectionID: 77b0cc90, PacketNumber: 7, PacketNumberLen: 2, Length: 183, Version: v1} 2025/09/12 02:43:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/09/12 02:43:22 server <- Reading packet 4 (55 bytes) for connection 77b0cc90, Handshake 2025/09/12 02:43:22 server Long Header{Type: Handshake, DestConnectionID: 77b0cc90, SrcConnectionID: 32c43ad831d003f6, PacketNumber: 4, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:22 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 56µs} 2025/09/12 02:43:22 server newly acked packets (1): [7] 2025/09/12 02:43:22 server updated RTT: 31.099815ms (σ: 15.549907ms) 2025/09/12 02:43:22 server Canceling loss detection timer. 2025/09/12 02:43:22 server Queueing packet (183 bytes) for later decryption 2025/09/12 02:43:22 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:22 server <- Reading packet 6 (183 bytes) for connection 77b0cc90, Handshake 2025/09/12 02:43:22 server Long Header{Type: Handshake, DestConnectionID: 77b0cc90, SrcConnectionID: 32c43ad831d003f6, PacketNumber: 6, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:22 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:22 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:22 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 411.432ms} 2025/09/12 02:43:22 server Dropping Handshake keys. 2025/09/12 02:43:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:22 server -> Sending packet 2 (415 bytes) for connection 42ad969d4ac7ff83, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:22 server Short Header{DestConnectionID: 32c43ad831d003f6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e7879ab3, StatelessResetToken: 0x387cf00fa628f24ed9fdea729acdeb00} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 363dc45b, StatelessResetToken: 0x658b1b599702f9bcc6bcb3b8e678d82d} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f6acd9d1, StatelessResetToken: 0x9d2587807ba23e0c58355c8c285c55dd} 2025/09/12 02:43:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 45d20830, StatelessResetToken: 0x07629cf804f301b1ee7ca6d3a1501de0} 2025/09/12 02:43:22 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 586b57aa, StatelessResetToken: 0xf2cf413325044de174707811c76cf061} 2025/09/12 02:43:22 server -> &wire.NewTokenFrame{Token: 0xf2ef27adc077d3172cce7d1acecd3b35646d7862f768dc0665263eccdcfafb730e8b0c24c38a700320d0d74fc81992891e2edba5fd8d9852fb42652de5541dd1a7a954ec7e41ed52ad4a0e1414a37ede1ae9a2bcbf437db6b7b8} 2025/09/12 02:43:22 server -> Sending packet 3 (415 bytes) for connection 42ad969d4ac7ff83, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:22 server Short Header{DestConnectionID: 32c43ad831d003f6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f6acd9d1, StatelessResetToken: 0x9d2587807ba23e0c58355c8c285c55dd} 2025/09/12 02:43:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:22 server -> &wire.NewTokenFrame{Token: 0xf2ef27adc077d3172cce7d1acecd3b35646d7862f768dc0665263eccdcfafb730e8b0c24c38a700320d0d74fc81992891e2edba5fd8d9852fb42652de5541dd1a7a954ec7e41ed52ad4a0e1414a37ede1ae9a2bcbf437db6b7b8} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 586b57aa, StatelessResetToken: 0xf2cf413325044de174707811c76cf061} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 45d20830, StatelessResetToken: 0x07629cf804f301b1ee7ca6d3a1501de0} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 363dc45b, StatelessResetToken: 0x658b1b599702f9bcc6bcb3b8e678d82d} 2025/09/12 02:43:22 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e7879ab3, StatelessResetToken: 0x387cf00fa628f24ed9fdea729acdeb00} 2025/09/12 02:43:22 server <- Reading packet 1 (55 bytes) for connection 77b0cc90, 1-RTT 2025/09/12 02:43:22 server Short Header{DestConnectionID: 77b0cc90, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:22 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:22 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:22 server <- Reading packet 2 (183 bytes) for connection 77b0cc90, 1-RTT 2025/09/12 02:43:22 server Short Header{DestConnectionID: 77b0cc90, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:22 Received request: GET /jbccqieeqq 2025/09/12 02:43:22 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 054f06e052190794, StatelessResetToken: 0x3c9757acbc096281da108f8f39ba81f2} 2025/09/12 02:43:22 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 50ca6e405f2697a2, StatelessResetToken: 0x836ec06d0f1fd5bcf609755747a8e74c} 2025/09/12 02:43:22 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 92a48f16ca19fc27, StatelessResetToken: 0xc0169685e528ba5b01449220f553f065} 2025/09/12 02:43:22 server <- Reading packet 3 (55 bytes) for connection 77b0cc90, 1-RTT 2025/09/12 02:43:22 server Short Header{DestConnectionID: 77b0cc90, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:22 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:22 server -> Sending packet 4 (40 bytes) for connection 42ad969d4ac7ff83, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:22 server Short Header{DestConnectionID: 054f06e052190794, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:22 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 200.226096ms, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:22 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:22 server -> Sending packet 5 (1053 bytes) for connection 42ad969d4ac7ff83, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:22 server Short Header{DestConnectionID: 054f06e052190794, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:22 server <- Reading packet 4 (183 bytes) for connection 77b0cc90, 1-RTT 2025/09/12 02:43:22 server Short Header{DestConnectionID: 77b0cc90, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:22 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 40µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:22 server newly acked packets (2): [3 4] 2025/09/12 02:43:22 server updated RTT: 31.131ms (σ: 11.726ms) 2025/09/12 02:43:22 server ECN capability confirmed. 2025/09/12 02:43:22 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6c61cb1b9d73153c, StatelessResetToken: 0xb13ddbdc5eff885016a1a913b679a0b1} 2025/09/12 02:43:22 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:22 server Ignoring all packets below 4. 2025/09/12 02:43:22 server <- Reading packet 5 (33 bytes) for connection 77b0cc90, 1-RTT 2025/09/12 02:43:22 server Short Header{DestConnectionID: 77b0cc90, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:22 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 144µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:22 server newly acked packets (1): [5] 2025/09/12 02:43:22 server updated RTT: 31.234ms (σ: 9.001ms) 2025/09/12 02:43:22 server Canceling loss detection timer. 2025/09/12 02:43:22 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:22 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:22 Replacing connection for connection IDs [77b0cc90 f6acd9d1 363dc45b e7879ab3 45d20830 586b57aa 42ad969d4ac7ff83] with a closed connection. 2025/09/12 02:43:22 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:22 server Connection 42ad969d4ac7ff83 closed. 2025/09/12 02:43:23 Removing connection IDs [77b0cc90 f6acd9d1 363dc45b e7879ab3 45d20830 586b57aa 42ad969d4ac7ff83] for a closed connection after it has been retired. 2025/09/12 02:43:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:43:23 server -> Sending packet 20 (297 bytes) for connection eacee66e59396015, 1-RTT (ECN: Not-ECT) 2025/09/12 02:43:23 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:23 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:23 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:23 server -> &wire.NewTokenFrame{Token: 0x630f84fc82d7f08738a6bd58713f3770ae01b68b0f870adb1f83f8700c2f9df2c3dbe23e3c97e3821b9fe554435d3f5101629158d5fdad5c6a734f7606dd47c2bd76d0f88a8001e38be090cf52b14c6a79c71343f8d3e51aa95d} 2025/09/12 02:43:23 server Skipping packet number 19 2025/09/12 02:43:23 server -> Sending packet 21 (1053 bytes) for connection eacee66e59396015, 1-RTT (ECN: Not-ECT) 2025/09/12 02:43:23 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:23 server <- Received Initial packet. 2025/09/12 02:43:23 Created qlog file: /logs/qlog/b2776536ae609db9.sqlog 2025/09/12 02:43:23 server Changing connection ID to 1de4a225. 2025/09/12 02:43:23 Adding connection IDs b2776536ae609db9 and 1de4a225 for a new connection. 2025/09/12 02:43:23 server <- Reading packet 86390 (1252 bytes) for connection b2776536ae609db9, Initial 2025/09/12 02:43:23 server Long Header{Type: Initial, DestConnectionID: b2776536ae609db9, SrcConnectionID: bedbc66199b751fa, Token: 0xf2ef27adc077d3172cce7d1acecd3b35646d7862f768dc0665263eccdcfafb730e8b0c24c38a700320d0d74fc81992891e2edba5fd8d9852fb42652de5541dd1a7a954ec7e41ed52ad4a0e1414a37ede1ae9a2bcbf437db6b7b8, PacketNumber: 86390, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:23 server <- &wire.PingFrame{} 2025/09/12 02:43:23 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:23 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:23 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:23 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:23 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: bedbc66199b751fa, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:23 Adding connection ID 04dca2d2. 2025/09/12 02:43:23 Adding connection ID 9f1cf63e. 2025/09/12 02:43:23 Adding connection ID 3bdc8afa. 2025/09/12 02:43:23 Adding connection ID be9698cc. 2025/09/12 02:43:23 Adding connection ID 2d1968f4. 2025/09/12 02:43:23 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b2776536ae609db9 2025/09/12 02:43:23 server Long Header{Type: Initial, DestConnectionID: bedbc66199b751fa, SrcConnectionID: 1de4a225, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 913, Version: v1} 2025/09/12 02:43:23 server -> &wire.AckFrame{LargestAcked: 86390, LowestAcked: 86390, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:23 server Long Header{Type: Handshake, DestConnectionID: bedbc66199b751fa, SrcConnectionID: 1de4a225, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:23 server Short Header{DestConnectionID: bedbc66199b751fa, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3bdc8afa, StatelessResetToken: 0xb0554cc20c0e0ecd4318504139f7d3a3} 2025/09/12 02:43:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: be9698cc, StatelessResetToken: 0x98f68bea47ca9bdad138e85d1b278afa} 2025/09/12 02:43:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 04dca2d2, StatelessResetToken: 0xb315ad0025f14af577da4f43d80200bc} 2025/09/12 02:43:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 2d1968f4, StatelessResetToken: 0x32e3ef0fc17a442e0e31d041a3dbe086} 2025/09/12 02:43:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9f1cf63e, StatelessResetToken: 0xb48bdece53595870823c999379fe3d61} 2025/09/12 02:43:23 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:23 server -> Sending packet 1 (1280 bytes) for connection b2776536ae609db9, Initial 2025/09/12 02:43:23 server Long Header{Type: Initial, DestConnectionID: bedbc66199b751fa, SrcConnectionID: 1de4a225, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:23 server -> Sending packet 2 (1280 bytes) for connection b2776536ae609db9, Initial 2025/09/12 02:43:23 server Long Header{Type: Initial, DestConnectionID: bedbc66199b751fa, SrcConnectionID: 1de4a225, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:23 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:24 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:24 server -> Sending packet 1 (198 bytes) for connection b2776536ae609db9, Handshake 2025/09/12 02:43:24 server Long Header{Type: Handshake, DestConnectionID: bedbc66199b751fa, SrcConnectionID: 1de4a225, PacketNumber: 1, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:24 server -> Sending packet 2 (198 bytes) for connection b2776536ae609db9, Handshake 2025/09/12 02:43:24 server Long Header{Type: Handshake, DestConnectionID: bedbc66199b751fa, SrcConnectionID: 1de4a225, PacketNumber: 2, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:24 server <- Reading packet 1 (55 bytes) for connection 1de4a225, Handshake 2025/09/12 02:43:24 server Long Header{Type: Handshake, DestConnectionID: 1de4a225, SrcConnectionID: bedbc66199b751fa, PacketNumber: 1, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:24 server Dropping Initial keys. 2025/09/12 02:43:24 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs} 2025/09/12 02:43:24 server newly acked packets (1): [2] 2025/09/12 02:43:24 server updated RTT: 31.103804ms (σ: 15.551902ms) 2025/09/12 02:43:24 server Canceling loss detection timer. 2025/09/12 02:43:24 server Queueing packet (183 bytes) for later decryption 2025/09/12 02:43:24 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:24 server <- Reading packet 3 (183 bytes) for connection 1de4a225, Handshake 2025/09/12 02:43:24 server Long Header{Type: Handshake, DestConnectionID: 1de4a225, SrcConnectionID: bedbc66199b751fa, PacketNumber: 3, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:24 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:24 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 334.024ms} 2025/09/12 02:43:24 server Dropping Handshake keys. 2025/09/12 02:43:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:24 server -> Sending packet 2 (415 bytes) for connection b2776536ae609db9, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:24 server Short Header{DestConnectionID: bedbc66199b751fa, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:24 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 2d1968f4, StatelessResetToken: 0x32e3ef0fc17a442e0e31d041a3dbe086} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: be9698cc, StatelessResetToken: 0x98f68bea47ca9bdad138e85d1b278afa} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 04dca2d2, StatelessResetToken: 0xb315ad0025f14af577da4f43d80200bc} 2025/09/12 02:43:24 server -> &wire.NewTokenFrame{Token: 0xe2dfcdf0cb4c38a9ec075421bc63604a2d3466cef3a888642bfdb22dd050e0e151031ad562ad634c45f80728cf35b379ae96f87bf5ef22057984006a6a123fd4e211934ec7d8959217f12152ff6be2d70182495f1ba314343b66} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3bdc8afa, StatelessResetToken: 0xb0554cc20c0e0ecd4318504139f7d3a3} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9f1cf63e, StatelessResetToken: 0xb48bdece53595870823c999379fe3d61} 2025/09/12 02:43:24 server -> Sending packet 3 (415 bytes) for connection b2776536ae609db9, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:24 server Short Header{DestConnectionID: bedbc66199b751fa, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3bdc8afa, StatelessResetToken: 0xb0554cc20c0e0ecd4318504139f7d3a3} 2025/09/12 02:43:24 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:24 server -> &wire.NewTokenFrame{Token: 0xe2dfcdf0cb4c38a9ec075421bc63604a2d3466cef3a888642bfdb22dd050e0e151031ad562ad634c45f80728cf35b379ae96f87bf5ef22057984006a6a123fd4e211934ec7d8959217f12152ff6be2d70182495f1ba314343b66} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: be9698cc, StatelessResetToken: 0x98f68bea47ca9bdad138e85d1b278afa} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 04dca2d2, StatelessResetToken: 0xb315ad0025f14af577da4f43d80200bc} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9f1cf63e, StatelessResetToken: 0xb48bdece53595870823c999379fe3d61} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 2d1968f4, StatelessResetToken: 0x32e3ef0fc17a442e0e31d041a3dbe086} 2025/09/12 02:43:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:24 server <- Reading packet 2 (55 bytes) for connection 1de4a225, 1-RTT 2025/09/12 02:43:24 server Short Header{DestConnectionID: 1de4a225, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:24 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:24 server <- Reading packet 3 (183 bytes) for connection 1de4a225, 1-RTT 2025/09/12 02:43:24 server Short Header{DestConnectionID: 1de4a225, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 187793c6d0a122b0, StatelessResetToken: 0xf5db4b3763ddb7519929c69123520b7a} 2025/09/12 02:43:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ae0fe2dd083c6052, StatelessResetToken: 0xcb7fc22aa78a30a6397eb8a7ce28c657} 2025/09/12 02:43:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7a39da516f8781d5, StatelessResetToken: 0xf9a4578c8caf7ba4ad3d400a0c434b09} 2025/09/12 02:43:24 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 84.528ms} 2025/09/12 02:43:24 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:24 server <- Reading packet 4 (55 bytes) for connection 1de4a225, 1-RTT 2025/09/12 02:43:24 server Short Header{DestConnectionID: 1de4a225, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:24 server -> Sending packet 4 (40 bytes) for connection b2776536ae609db9, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:24 server Short Header{DestConnectionID: 187793c6d0a122b0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:24 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 147.469782ms, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:24 Received request: GET /fmkmhsvuhn 2025/09/12 02:43:24 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:24 server -> Sending packet 5 (1053 bytes) for connection b2776536ae609db9, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:24 server Short Header{DestConnectionID: 187793c6d0a122b0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:24 server <- Reading packet 5 (55 bytes) for connection 1de4a225, 1-RTT 2025/09/12 02:43:24 server Short Header{DestConnectionID: 1de4a225, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:24 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 112µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:24 server <- Reading packet 6 (37 bytes) for connection 1de4a225, 1-RTT 2025/09/12 02:43:24 server Short Header{DestConnectionID: 1de4a225, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:24 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 104µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:24 server newly acked packets (2): [3 5] 2025/09/12 02:43:24 server updated RTT: 31.198ms (σ: 11.853ms) 2025/09/12 02:43:24 server ECN capability confirmed. 2025/09/12 02:43:24 server setting loss timer for packet 4 (1-RTT) to 35.84801ms (in 2025-09-12 02:43:24.406754127 +0000 UTC m=+20.594904762) 2025/09/12 02:43:24 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:24 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:24 Replacing connection for connection IDs [1de4a225 04dca2d2 9f1cf63e 3bdc8afa be9698cc 2d1968f4 b2776536ae609db9] with a closed connection. 2025/09/12 02:43:24 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:24 server Connection b2776536ae609db9 closed. 2025/09/12 02:43:24 Removing connection IDs [1de4a225 04dca2d2 9f1cf63e 3bdc8afa be9698cc 2d1968f4 b2776536ae609db9] for a closed connection after it has been retired. 2025/09/12 02:43:24 server <- Received Initial packet. 2025/09/12 02:43:24 Created qlog file: /logs/qlog/34045223ddacdd68.sqlog 2025/09/12 02:43:24 server Changing connection ID to 389ef973. 2025/09/12 02:43:24 Adding connection IDs 34045223ddacdd68 and 389ef973 for a new connection. 2025/09/12 02:43:24 server <- Reading packet 89387 (1252 bytes) for connection 34045223ddacdd68, Initial 2025/09/12 02:43:24 server Long Header{Type: Initial, DestConnectionID: 34045223ddacdd68, SrcConnectionID: 4c637bb6d7ea29c1, Token: 0xe2dfcdf0cb4c38a9ec075421bc63604a2d3466cef3a888642bfdb22dd050e0e151031ad562ad634c45f80728cf35b379ae96f87bf5ef22057984006a6a123fd4e211934ec7d8959217f12152ff6be2d70182495f1ba314343b66, PacketNumber: 89387, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:24 server <- &wire.PingFrame{} 2025/09/12 02:43:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:24 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:24 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:24 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:24 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 4c637bb6d7ea29c1, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:24 Adding connection ID 33574d50. 2025/09/12 02:43:24 Adding connection ID 3a93fe17. 2025/09/12 02:43:24 Adding connection ID d64a68ba. 2025/09/12 02:43:24 Adding connection ID a7465ad0. 2025/09/12 02:43:24 Adding connection ID 35c3e0ab. 2025/09/12 02:43:24 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 34045223ddacdd68 2025/09/12 02:43:24 server Long Header{Type: Initial, DestConnectionID: 4c637bb6d7ea29c1, SrcConnectionID: 389ef973, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 912, Version: v1} 2025/09/12 02:43:24 server -> &wire.AckFrame{LargestAcked: 89387, LowestAcked: 89387, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:24 server Long Header{Type: Handshake, DestConnectionID: 4c637bb6d7ea29c1, SrcConnectionID: 389ef973, PacketNumber: 0, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:24 server Short Header{DestConnectionID: 4c637bb6d7ea29c1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d64a68ba, StatelessResetToken: 0x3dae898be92b80d21b95c559d7a28f10} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 33574d50, StatelessResetToken: 0x57593d6e3a4ab0e15edd93997af966cb} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 35c3e0ab, StatelessResetToken: 0x3e4bda5b1693ccfe9e252cc7748f968c} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3a93fe17, StatelessResetToken: 0x890858ad4ffbc17a7bd47b0d0b5e594f} 2025/09/12 02:43:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a7465ad0, StatelessResetToken: 0x793bee1a5f9d38681a7db93222f73a53} 2025/09/12 02:43:24 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:24 server -> Sending packet 1 (1280 bytes) for connection 34045223ddacdd68, Initial 2025/09/12 02:43:24 server Long Header{Type: Initial, DestConnectionID: 4c637bb6d7ea29c1, SrcConnectionID: 389ef973, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:24 server -> Sending packet 2 (1280 bytes) for connection 34045223ddacdd68, Initial 2025/09/12 02:43:24 server Long Header{Type: Initial, DestConnectionID: 4c637bb6d7ea29c1, SrcConnectionID: 389ef973, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:24 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:24 server -> Sending packet 1 (199 bytes) for connection 34045223ddacdd68, Handshake 2025/09/12 02:43:24 server Long Header{Type: Handshake, DestConnectionID: 4c637bb6d7ea29c1, SrcConnectionID: 389ef973, PacketNumber: 1, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:24 server -> Sending packet 2 (199 bytes) for connection 34045223ddacdd68, Handshake 2025/09/12 02:43:24 server Long Header{Type: Handshake, DestConnectionID: 4c637bb6d7ea29c1, SrcConnectionID: 389ef973, PacketNumber: 2, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:24 server <- Reading packet 0 (42 bytes) for connection 389ef973, Handshake 2025/09/12 02:43:24 server Long Header{Type: Handshake, DestConnectionID: 389ef973, SrcConnectionID: 4c637bb6d7ea29c1, PacketNumber: 0, PacketNumberLen: 4, Length: 21, Version: v1} 2025/09/12 02:43:24 server Dropping Initial keys. 2025/09/12 02:43:24 server <- &wire.PingFrame{} 2025/09/12 02:43:24 server -> Sending packet 3 (47 bytes) for connection 34045223ddacdd68, Handshake 2025/09/12 02:43:24 server Long Header{Type: Handshake, DestConnectionID: 4c637bb6d7ea29c1, SrcConnectionID: 389ef973, PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 02:43:24 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:24 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:24 server <- Reading packet 1 (85 bytes) for connection 389ef973, Handshake 2025/09/12 02:43:24 server Long Header{Type: Handshake, DestConnectionID: 389ef973, SrcConnectionID: 4c637bb6d7ea29c1, PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:24 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 32µs} 2025/09/12 02:43:24 server newly acked packets (1): [2] 2025/09/12 02:43:24 server updated RTT: 31.275051ms (σ: 15.637525ms) 2025/09/12 02:43:24 server Canceling loss detection timer. 2025/09/12 02:43:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:24 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:24 server Dropping Handshake keys. 2025/09/12 02:43:24 server <- Reading packet 0 (183 bytes) for connection 389ef973, 1-RTT 2025/09/12 02:43:24 server Short Header{DestConnectionID: 389ef973, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 27cf915fb730202b, StatelessResetToken: 0x52728b01199ec3ae605ee5daf402b936} 2025/09/12 02:43:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 50eb6344f9bd3ea0, StatelessResetToken: 0xdd55011311422315e8bdf6e536a47225} 2025/09/12 02:43:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb2a04e83f61df74, StatelessResetToken: 0xda0bca8b6648d5275f36844debe1bb2d} 2025/09/12 02:43:24 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:24 server -> Sending packet 1 (305 bytes) for connection 34045223ddacdd68, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:24 server Short Header{DestConnectionID: 27cf915fb730202b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:24 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280.747µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:24 server -> &wire.NewTokenFrame{Token: 0x131a6659615a1860ef3c101283f7e9441a3e93921d0237a539515bb971fcb887a2e9cec4ee40e2ae270753716f97d2e1c52a5ac4403a7cc6b942c9d62cd6bad26c359fae2cf4203243aa8f2ee5a4da568ed5256741961eb07146} 2025/09/12 02:43:24 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:24 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:24 server <- Reading packet 1 (55 bytes) for connection 389ef973, 1-RTT 2025/09/12 02:43:24 server Short Header{DestConnectionID: 389ef973, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:24 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:24 Received request: GET /auucgyperq 2025/09/12 02:43:24 server -> Sending packet 2 (1061 bytes) for connection 34045223ddacdd68, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:24 server Short Header{DestConnectionID: 27cf915fb730202b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:24 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 412.7µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:24 server <- Reading packet 3 (33 bytes) for connection 389ef973, 1-RTT 2025/09/12 02:43:24 server Short Header{DestConnectionID: 389ef973, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:24 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 112µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:24 server newly acked packets (2): [1 2] 2025/09/12 02:43:24 server updated RTT: 31.304ms (σ: 11.787ms) 2025/09/12 02:43:24 server ECN capability confirmed. 2025/09/12 02:43:24 server lost packet 0 (time threshold) 2025/09/12 02:43:24 server Canceling loss detection timer. 2025/09/12 02:43:24 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:24 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:24 Replacing connection for connection IDs [33574d50 3a93fe17 d64a68ba a7465ad0 35c3e0ab 389ef973 34045223ddacdd68] with a closed connection. 2025/09/12 02:43:24 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:24 server Connection 34045223ddacdd68 closed. 2025/09/12 02:43:25 Removing connection IDs [33574d50 3a93fe17 d64a68ba a7465ad0 35c3e0ab 389ef973 34045223ddacdd68] for a closed connection after it has been retired. 2025/09/12 02:43:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:43:25 server -> Sending packet 21 (416 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:25 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1f22be29, StatelessResetToken: 0x528760f6b2968c56e8d17ad0a6e169fd} 2025/09/12 02:43:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 722589e0, StatelessResetToken: 0xfd32ae2e9c06e805a0a31952b05b4316} 2025/09/12 02:43:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5912d500, StatelessResetToken: 0x8e0b201920f61cfe15f04309b5ebc959} 2025/09/12 02:43:25 server -> &wire.NewTokenFrame{Token: 0x78690347c39cb3e587d1037d1f4c7089916648d2ab7d9fafe25d3fba6e54b585a6de99b5fdfec21c1f4308b919af9eb8fe10ba2265f43547f4e41aefc08c1ca17a54ce684132ef7ed83c53a5c16a4e1131caa1f2780c39e6a4dfae} 2025/09/12 02:43:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec7b6309, StatelessResetToken: 0xea66ecd1b9111acaf6b6f3006d905506} 2025/09/12 02:43:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:25 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f60a412, StatelessResetToken: 0x04f6bc58a448ffed78114caa0f8dabea} 2025/09/12 02:43:25 server Skipping packet number 20 2025/09/12 02:43:25 server -> Sending packet 22 (1053 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:25 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/09/12 02:43:25 server -> Sending packet 24 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:25 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:25 server -> Sending packet 25 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:25 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:25 server <- Received Initial packet. 2025/09/12 02:43:25 Created qlog file: /logs/qlog/855164e4bf502080.sqlog 2025/09/12 02:43:25 server Changing connection ID to c4554382. 2025/09/12 02:43:25 Adding connection IDs 855164e4bf502080 and c4554382 for a new connection. 2025/09/12 02:43:25 server <- Reading packet 81053 (1252 bytes) for connection 855164e4bf502080, Initial 2025/09/12 02:43:25 server Long Header{Type: Initial, DestConnectionID: 855164e4bf502080, SrcConnectionID: 45689d16ccc36b61, Token: 0x131a6659615a1860ef3c101283f7e9441a3e93921d0237a539515bb971fcb887a2e9cec4ee40e2ae270753716f97d2e1c52a5ac4403a7cc6b942c9d62cd6bad26c359fae2cf4203243aa8f2ee5a4da568ed5256741961eb07146, PacketNumber: 81053, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:25 server <- &wire.PingFrame{} 2025/09/12 02:43:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:25 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:25 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:25 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:25 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 45689d16ccc36b61, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:25 Adding connection ID effc943e. 2025/09/12 02:43:25 Adding connection ID b8710046. 2025/09/12 02:43:25 Adding connection ID f6f57c84. 2025/09/12 02:43:25 Adding connection ID 08b2d186. 2025/09/12 02:43:25 Adding connection ID 4b813532. 2025/09/12 02:43:25 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 855164e4bf502080 2025/09/12 02:43:25 server Long Header{Type: Initial, DestConnectionID: 45689d16ccc36b61, SrcConnectionID: c4554382, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 916, Version: v1} 2025/09/12 02:43:25 server -> &wire.AckFrame{LargestAcked: 81053, LowestAcked: 81053, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:25 server Long Header{Type: Handshake, DestConnectionID: 45689d16ccc36b61, SrcConnectionID: c4554382, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/09/12 02:43:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/09/12 02:43:25 server Short Header{DestConnectionID: 45689d16ccc36b61, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: effc943e, StatelessResetToken: 0xde1a1451d17c2eb2d358e7a7d988f1dc} 2025/09/12 02:43:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8710046, StatelessResetToken: 0xedaf3e1f6ee78c355d30091a44b0ccc4} 2025/09/12 02:43:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f6f57c84, StatelessResetToken: 0x1dfa2914616833d18d327f79323af331} 2025/09/12 02:43:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 08b2d186, StatelessResetToken: 0x3c23aef3a6d97c64d80a05e697cfb18e} 2025/09/12 02:43:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4b813532, StatelessResetToken: 0xf6eaf6546f3d0ad500fe4b976dab1e72} 2025/09/12 02:43:25 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:25 server <- Reading packet 0 (85 bytes) for connection c4554382, Handshake 2025/09/12 02:43:25 server Long Header{Type: Handshake, DestConnectionID: c4554382, SrcConnectionID: 45689d16ccc36b61, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:25 server Dropping Initial keys. 2025/09/12 02:43:25 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 424µs} 2025/09/12 02:43:25 server newly acked packets (1): [0] 2025/09/12 02:43:25 server updated RTT: 32.480744ms (σ: 16.240372ms) 2025/09/12 02:43:25 server Canceling loss detection timer. 2025/09/12 02:43:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:25 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:25 server Dropping Handshake keys. 2025/09/12 02:43:25 server <- Reading packet 0 (183 bytes) for connection c4554382, 1-RTT 2025/09/12 02:43:25 server Short Header{DestConnectionID: c4554382, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ad46a97039a1c7c3, StatelessResetToken: 0x2c700fddf3f94837c6a00817d0e19336} 2025/09/12 02:43:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b1f3d06786059e2c, StatelessResetToken: 0xd27d233638adc02ab72aa92cc7d340c3} 2025/09/12 02:43:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5913c540d93516cf, StatelessResetToken: 0xc4c59e3fe8d715fc04a123766743c486} 2025/09/12 02:43:25 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:25 server -> Sending packet 1 (305 bytes) for connection 855164e4bf502080, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:25 server Short Header{DestConnectionID: ad46a97039a1c7c3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:25 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 212.499µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:25 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:25 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:25 server -> &wire.NewTokenFrame{Token: 0xd50adde95caadb60e783c2f970e88b2b0d1d7d33fd20df9bb99b7f95ad68ef926e01232dac13f8be012b248b8f055b6af7390ccad4fc25944a50a05853a598996ddedbac9aa969bc4ca20ec16f39aef0749d6c9ef06daa8feab0} 2025/09/12 02:43:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:25 server <- Reading packet 1 (55 bytes) for connection c4554382, 1-RTT 2025/09/12 02:43:25 server Short Header{DestConnectionID: c4554382, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:25 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:25 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:25 server <- Reading packet 2 (55 bytes) for connection c4554382, 1-RTT 2025/09/12 02:43:25 server Short Header{DestConnectionID: c4554382, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:25 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:25 server newly acked packets (1): [0] 2025/09/12 02:43:25 server updated RTT: 32.511ms (σ: 12.243ms) 2025/09/12 02:43:25 Received request: GET /rgfqrcovqw 2025/09/12 02:43:25 server -> Sending packet 2 (1061 bytes) for connection 855164e4bf502080, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:25 server Short Header{DestConnectionID: ad46a97039a1c7c3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:25 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 197.424µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:25 server <- Reading packet 3 (55 bytes) for connection c4554382, 1-RTT 2025/09/12 02:43:25 server Short Header{DestConnectionID: c4554382, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ac8d699392e6f3fc, StatelessResetToken: 0x6c08ffec7d7d60ac39810df36b98ef9c} 2025/09/12 02:43:25 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:25 server <- Reading packet 4 (33 bytes) for connection c4554382, 1-RTT 2025/09/12 02:43:25 server Short Header{DestConnectionID: c4554382, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:25 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 120µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:25 server newly acked packets (2): [1 2] 2025/09/12 02:43:25 server updated RTT: 32.401ms (σ: 9.402ms) 2025/09/12 02:43:25 server ECN capability confirmed. 2025/09/12 02:43:25 server Canceling loss detection timer. 2025/09/12 02:43:25 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:25 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:25 Replacing connection for connection IDs [c4554382 effc943e b8710046 f6f57c84 08b2d186 4b813532 855164e4bf502080] with a closed connection. 2025/09/12 02:43:25 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:25 server Connection 855164e4bf502080 closed. 2025/09/12 02:43:26 Removing connection IDs [c4554382 effc943e b8710046 f6f57c84 08b2d186 4b813532 855164e4bf502080] for a closed connection after it has been retired. 2025/09/12 02:43:26 server <- Received Initial packet. 2025/09/12 02:43:26 Created qlog file: /logs/qlog/14319c59d1640d27.sqlog 2025/09/12 02:43:26 server Changing connection ID to 12bf365e. 2025/09/12 02:43:26 Adding connection IDs 14319c59d1640d27 and 12bf365e for a new connection. 2025/09/12 02:43:26 server <- Reading packet 128782 (1252 bytes) for connection 14319c59d1640d27, Initial 2025/09/12 02:43:26 server Long Header{Type: Initial, DestConnectionID: 14319c59d1640d27, SrcConnectionID: 645abb5475fd6339, Token: 0xd50adde95caadb60e783c2f970e88b2b0d1d7d33fd20df9bb99b7f95ad68ef926e01232dac13f8be012b248b8f055b6af7390ccad4fc25944a50a05853a598996ddedbac9aa969bc4ca20ec16f39aef0749d6c9ef06daa8feab0, PacketNumber: 128782, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:26 server <- &wire.PingFrame{} 2025/09/12 02:43:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 645abb5475fd6339, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:26 Adding connection ID 8c02ac05. 2025/09/12 02:43:26 Adding connection ID aa6440f5. 2025/09/12 02:43:26 Adding connection ID 023ba484. 2025/09/12 02:43:26 Adding connection ID bc4bc767. 2025/09/12 02:43:26 Adding connection ID 0df778bd. 2025/09/12 02:43:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 14319c59d1640d27 2025/09/12 02:43:26 server Long Header{Type: Initial, DestConnectionID: 645abb5475fd6339, SrcConnectionID: 12bf365e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 906, Version: v1} 2025/09/12 02:43:26 server -> &wire.AckFrame{LargestAcked: 128782, LowestAcked: 128782, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:26 server Long Header{Type: Handshake, DestConnectionID: 645abb5475fd6339, SrcConnectionID: 12bf365e, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/09/12 02:43:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/09/12 02:43:26 server Short Header{DestConnectionID: 645abb5475fd6339, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 0df778bd, StatelessResetToken: 0x5abb68c356e4be363978689415f736ae} 2025/09/12 02:43:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 023ba484, StatelessResetToken: 0x6c5fed80db7aec6d7338ff147390dc7f} 2025/09/12 02:43:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aa6440f5, StatelessResetToken: 0xef5d34501adf47402c7552ec956391ec} 2025/09/12 02:43:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bc4bc767, StatelessResetToken: 0xab35fc60da024d86a117bc6114188796} 2025/09/12 02:43:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8c02ac05, StatelessResetToken: 0x4ab773cc1c51aa7bdbf5064f76757fc1} 2025/09/12 02:43:26 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:26 server <- Reading packet 0 (85 bytes) for connection 12bf365e, Handshake 2025/09/12 02:43:26 server Long Header{Type: Handshake, DestConnectionID: 12bf365e, SrcConnectionID: 645abb5475fd6339, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:26 server Dropping Initial keys. 2025/09/12 02:43:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 384µs} 2025/09/12 02:43:26 server newly acked packets (1): [0] 2025/09/12 02:43:26 server updated RTT: 32.343481ms (σ: 16.17174ms) 2025/09/12 02:43:26 server Canceling loss detection timer. 2025/09/12 02:43:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:26 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:26 server Dropping Handshake keys. 2025/09/12 02:43:26 server <- Reading packet 0 (183 bytes) for connection 12bf365e, 1-RTT 2025/09/12 02:43:26 server Short Header{DestConnectionID: 12bf365e, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:26 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0e651c723f8439ab, StatelessResetToken: 0x3f46f724977cb74dfc866e820508c4c2} 2025/09/12 02:43:26 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c3ebd8532030a054, StatelessResetToken: 0xc5eb6b36479c0772b2bce52109ae3a5e} 2025/09/12 02:43:26 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f61f40068834e47d, StatelessResetToken: 0x588059c28fff21e7c666c1e04c599b28} 2025/09/12 02:43:26 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:26 server -> Sending packet 1 (305 bytes) for connection 14319c59d1640d27, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:26 server Short Header{DestConnectionID: 0e651c723f8439ab, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 346.641µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:26 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:26 server -> &wire.NewTokenFrame{Token: 0xb3e2871bd5824f170b1606eabe0faa90c84e618ca5c6e2b5b1bea7f9387e946ec144dbbbd24bcc57b3f4ae12460b64c560038463b0c4d6cc8a035979aa6e5eee7ee64fab435b02cf0c046447ac85eeaba2940bdc7e9fd96acb84} 2025/09/12 02:43:26 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:26 server <- Reading packet 1 (55 bytes) for connection 12bf365e, 1-RTT 2025/09/12 02:43:26 server Short Header{DestConnectionID: 12bf365e, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:26 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:26 server <- Reading packet 2 (55 bytes) for connection 12bf365e, 1-RTT 2025/09/12 02:43:26 server Short Header{DestConnectionID: 12bf365e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:26 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:26 server newly acked packets (1): [0] 2025/09/12 02:43:26 server updated RTT: 32.403ms (σ: 12.248ms) 2025/09/12 02:43:26 Received request: GET /iqynbphteg 2025/09/12 02:43:26 server -> Sending packet 2 (1061 bytes) for connection 14319c59d1640d27, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:26 server Short Header{DestConnectionID: 0e651c723f8439ab, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:26 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 122.259µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:27 server <- Reading packet 3 (35 bytes) for connection 12bf365e, 1-RTT 2025/09/12 02:43:27 server Short Header{DestConnectionID: 12bf365e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:27 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 136µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:27 server newly acked packets (1): [2] 2025/09/12 02:43:27 server updated RTT: 32.313ms (σ: 9.365ms) 2025/09/12 02:43:27 server ECN capability confirmed. 2025/09/12 02:43:27 server setting loss timer for packet 1 (1-RTT) to 36.352125ms (in 2025-09-12 02:43:27.012997208 +0000 UTC m=+23.201147852) 2025/09/12 02:43:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:27 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:27 Replacing connection for connection IDs [0df778bd 12bf365e 8c02ac05 aa6440f5 023ba484 bc4bc767 14319c59d1640d27] with a closed connection. 2025/09/12 02:43:27 server Connection 14319c59d1640d27 closed. 2025/09/12 02:43:27 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:27 Removing connection IDs [0df778bd 12bf365e 8c02ac05 aa6440f5 023ba484 bc4bc767 14319c59d1640d27] for a closed connection after it has been retired. 2025/09/12 02:43:27 server <- Received Initial packet. 2025/09/12 02:43:27 Created qlog file: /logs/qlog/f8fcaab7983abb5a.sqlog 2025/09/12 02:43:27 server Changing connection ID to f2e3ac34. 2025/09/12 02:43:27 Adding connection IDs f8fcaab7983abb5a and f2e3ac34 for a new connection. 2025/09/12 02:43:27 server <- Reading packet 115647 (1252 bytes) for connection f8fcaab7983abb5a, Initial 2025/09/12 02:43:27 server Long Header{Type: Initial, DestConnectionID: f8fcaab7983abb5a, SrcConnectionID: 702c7b705997c764, Token: (empty), PacketNumber: 115647, PacketNumberLen: 4, Length: 1226, Version: v1} 2025/09/12 02:43:27 server <- &wire.PingFrame{} 2025/09/12 02:43:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 702c7b705997c764, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:27 Adding connection ID 8f73b607. 2025/09/12 02:43:27 Adding connection ID d7542fb5. 2025/09/12 02:43:27 Adding connection ID ec7d2591. 2025/09/12 02:43:27 Adding connection ID f91f525d. 2025/09/12 02:43:27 Adding connection ID b0b0ad8a. 2025/09/12 02:43:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f8fcaab7983abb5a 2025/09/12 02:43:27 server Long Header{Type: Initial, DestConnectionID: 702c7b705997c764, SrcConnectionID: f2e3ac34, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 919, Version: v1} 2025/09/12 02:43:27 server -> &wire.AckFrame{LargestAcked: 115647, LowestAcked: 115647, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:27 server Long Header{Type: Handshake, DestConnectionID: 702c7b705997c764, SrcConnectionID: f2e3ac34, PacketNumber: 0, PacketNumberLen: 2, Length: 171, Version: v1} 2025/09/12 02:43:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/09/12 02:43:27 server Short Header{DestConnectionID: 702c7b705997c764, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d7542fb5, StatelessResetToken: 0x4d8f26396f89881f5b9e8c7b37b7bb84} 2025/09/12 02:43:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f91f525d, StatelessResetToken: 0x3c3fcd640a3f438794746aeb2891b705} 2025/09/12 02:43:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec7d2591, StatelessResetToken: 0x16990c1f02a1cf0873fcdb60d55c7e10} 2025/09/12 02:43:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8f73b607, StatelessResetToken: 0x09521f1d18206200229c3cbb421110a3} 2025/09/12 02:43:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b0b0ad8a, StatelessResetToken: 0xd482985ffadca91d267cd73891038232} 2025/09/12 02:43:27 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:27 server <- Reading packet 0 (85 bytes) for connection f2e3ac34, Handshake 2025/09/12 02:43:27 server Long Header{Type: Handshake, DestConnectionID: f2e3ac34, SrcConnectionID: 702c7b705997c764, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:27 server Dropping Initial keys. 2025/09/12 02:43:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416µs} 2025/09/12 02:43:27 server newly acked packets (1): [0] 2025/09/12 02:43:27 server updated RTT: 32.432263ms (σ: 16.216131ms) 2025/09/12 02:43:27 server Canceling loss detection timer. 2025/09/12 02:43:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:27 server Dropping Handshake keys. 2025/09/12 02:43:27 server <- Reading packet 0 (183 bytes) for connection f2e3ac34, 1-RTT 2025/09/12 02:43:27 server Short Header{DestConnectionID: f2e3ac34, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 17fc915d22a13243, StatelessResetToken: 0x20be4393ca1f4c27e523bfa1888dcbe1} 2025/09/12 02:43:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 18a86c5622b3389f, StatelessResetToken: 0x4d9b13c6c63850d2d2f0d676215b9354} 2025/09/12 02:43:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 336fc179f24bb798, StatelessResetToken: 0x8bae7ff86a7fb7e8f1fa84f59f417548} 2025/09/12 02:43:27 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:27 server -> Sending packet 1 (305 bytes) for connection f8fcaab7983abb5a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:27 server Short Header{DestConnectionID: 17fc915d22a13243, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 259.337µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:27 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:27 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:27 server -> &wire.NewTokenFrame{Token: 0x8a64dee7d82a0ed078785a51402414fa9db0859f74719dbad28d62c909057354426c826b0b1c0e5a8dd693812d1594f57537741f8ff0eea6ad0a798532e7b25125d1865cc244638b5869f45de22befd425c0a368520c87657d31} 2025/09/12 02:43:27 server <- Reading packet 3 (55 bytes) for connection f2e3ac34, 1-RTT 2025/09/12 02:43:27 server Short Header{DestConnectionID: f2e3ac34, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 202a3f3558d9e68b, StatelessResetToken: 0x45eab15fd67dfb2a9fee8cdf210e49cb} 2025/09/12 02:43:27 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:27 server -> Sending packet 2 (37 bytes) for connection f8fcaab7983abb5a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:27 server Short Header{DestConnectionID: 17fc915d22a13243, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:27 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 90.009µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:27 server <- Reading packet 5 (55 bytes) for connection f2e3ac34, 1-RTT 2025/09/12 02:43:27 server Short Header{DestConnectionID: f2e3ac34, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:27 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:27 server -> Sending packet 3 (39 bytes) for connection f8fcaab7983abb5a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:27 server Short Header{DestConnectionID: 17fc915d22a13243, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:27 Received request: GET /gukpctlxam 2025/09/12 02:43:27 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 102.533µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:27 server -> Sending packet 4 (1053 bytes) for connection f8fcaab7983abb5a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:27 server Short Header{DestConnectionID: 17fc915d22a13243, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:27 server <- Reading packet 6 (35 bytes) for connection f2e3ac34, 1-RTT 2025/09/12 02:43:27 server Short Header{DestConnectionID: f2e3ac34, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:27 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 136µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:27 server newly acked packets (3): [0 1 4] 2025/09/12 02:43:27 server updated RTT: 32.316ms (σ: 12.392ms) 2025/09/12 02:43:27 server ECN capability confirmed. 2025/09/12 02:43:27 server Canceling loss detection timer. 2025/09/12 02:43:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:27 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:27 Replacing connection for connection IDs [f91f525d b0b0ad8a f2e3ac34 8f73b607 d7542fb5 ec7d2591 f8fcaab7983abb5a] with a closed connection. 2025/09/12 02:43:27 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:27 server Connection f8fcaab7983abb5a closed. 2025/09/12 02:43:27 Removing connection IDs [f91f525d b0b0ad8a f2e3ac34 8f73b607 d7542fb5 ec7d2591 f8fcaab7983abb5a] for a closed connection after it has been retired. 2025/09/12 02:43:28 server <- Received Initial packet. 2025/09/12 02:43:28 Created qlog file: /logs/qlog/6055c021a0f6bd10.sqlog 2025/09/12 02:43:28 server Changing connection ID to ad481cae. 2025/09/12 02:43:28 Adding connection IDs 6055c021a0f6bd10 and ad481cae for a new connection. 2025/09/12 02:43:28 server <- Reading packet 103838 (1252 bytes) for connection 6055c021a0f6bd10, Initial 2025/09/12 02:43:28 server Long Header{Type: Initial, DestConnectionID: 6055c021a0f6bd10, SrcConnectionID: b9d211e9f0707cc3, Token: 0x8a64dee7d82a0ed078785a51402414fa9db0859f74719dbad28d62c909057354426c826b0b1c0e5a8dd693812d1594f57537741f8ff0eea6ad0a798532e7b25125d1865cc244638b5869f45de22befd425c0a368520c87657d31, PacketNumber: 103838, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:28 server <- &wire.PingFrame{} 2025/09/12 02:43:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: b9d211e9f0707cc3, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:28 Adding connection ID 7b86534c. 2025/09/12 02:43:28 Adding connection ID e8858ec4. 2025/09/12 02:43:28 Adding connection ID c77a979f. 2025/09/12 02:43:28 Adding connection ID f99ae158. 2025/09/12 02:43:28 Adding connection ID f4fa179e. 2025/09/12 02:43:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6055c021a0f6bd10 2025/09/12 02:43:28 server Long Header{Type: Initial, DestConnectionID: b9d211e9f0707cc3, SrcConnectionID: ad481cae, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 906, Version: v1} 2025/09/12 02:43:28 server -> &wire.AckFrame{LargestAcked: 103838, LowestAcked: 103838, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:28 server Long Header{Type: Handshake, DestConnectionID: b9d211e9f0707cc3, SrcConnectionID: ad481cae, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/09/12 02:43:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/09/12 02:43:28 server Short Header{DestConnectionID: b9d211e9f0707cc3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f4fa179e, StatelessResetToken: 0xa194635590e4f9c21f222c55a5eb419a} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c77a979f, StatelessResetToken: 0xd4083dabe1830b800030186a1fb61910} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f99ae158, StatelessResetToken: 0x051914de4b2f20e341475ca3685a6837} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e8858ec4, StatelessResetToken: 0x67031782586f201ce4cb1d9f7be6ca92} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b86534c, StatelessResetToken: 0x0c96bb575dbf079280ada8536cad4290} 2025/09/12 02:43:28 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:28 server -> Sending packet 1 (1280 bytes) for connection 6055c021a0f6bd10, Initial 2025/09/12 02:43:28 server Long Header{Type: Initial, DestConnectionID: b9d211e9f0707cc3, SrcConnectionID: ad481cae, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:28 server -> Sending packet 2 (1280 bytes) for connection 6055c021a0f6bd10, Initial 2025/09/12 02:43:28 server Long Header{Type: Initial, DestConnectionID: b9d211e9f0707cc3, SrcConnectionID: ad481cae, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:28 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:28 server -> Sending packet 1 (205 bytes) for connection 6055c021a0f6bd10, Handshake 2025/09/12 02:43:28 server Long Header{Type: Handshake, DestConnectionID: b9d211e9f0707cc3, SrcConnectionID: ad481cae, PacketNumber: 1, PacketNumberLen: 2, Length: 184, Version: v1} 2025/09/12 02:43:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/09/12 02:43:28 server -> Sending packet 2 (205 bytes) for connection 6055c021a0f6bd10, Handshake 2025/09/12 02:43:28 server Long Header{Type: Handshake, DestConnectionID: b9d211e9f0707cc3, SrcConnectionID: ad481cae, PacketNumber: 2, PacketNumberLen: 2, Length: 184, Version: v1} 2025/09/12 02:43:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/09/12 02:43:28 server <- Reading packet 0 (42 bytes) for connection ad481cae, Handshake 2025/09/12 02:43:28 server Long Header{Type: Handshake, DestConnectionID: ad481cae, SrcConnectionID: b9d211e9f0707cc3, PacketNumber: 0, PacketNumberLen: 4, Length: 21, Version: v1} 2025/09/12 02:43:28 server Dropping Initial keys. 2025/09/12 02:43:28 server <- &wire.PingFrame{} 2025/09/12 02:43:28 server -> Sending packet 3 (47 bytes) for connection 6055c021a0f6bd10, Handshake 2025/09/12 02:43:28 server Long Header{Type: Handshake, DestConnectionID: b9d211e9f0707cc3, SrcConnectionID: ad481cae, PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 02:43:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:28 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:28 server <- Reading packet 1 (85 bytes) for connection ad481cae, Handshake 2025/09/12 02:43:28 server Long Header{Type: Handshake, DestConnectionID: ad481cae, SrcConnectionID: b9d211e9f0707cc3, PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:28 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 168µs} 2025/09/12 02:43:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:28 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:28 server Dropping Handshake keys. 2025/09/12 02:43:28 server <- Reading packet 0 (183 bytes) for connection ad481cae, 1-RTT 2025/09/12 02:43:28 server Short Header{DestConnectionID: ad481cae, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:28 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c013b84994845e31, StatelessResetToken: 0x5a11eebcbdd46fc3410df6e9f4af828c} 2025/09/12 02:43:28 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3c450ec6468817e0, StatelessResetToken: 0x63e68e71ba49e36c340addb21d6709a9} 2025/09/12 02:43:28 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a7196915ecec9333, StatelessResetToken: 0xfadf514ad41f300ccc6940df45d511a7} 2025/09/12 02:43:28 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:28 server -> Sending packet 2 (425 bytes) for connection 6055c021a0f6bd10, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:28 server Short Header{DestConnectionID: c013b84994845e31, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 189.827µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:28 server -> &wire.NewTokenFrame{Token: 0x56a0a78b53ab45b74c9a11442d87e5f94d2b9d0fb88ac64f0eaa9cd037aff6905b4693fd6cf851c520c3dca2b1844a192801376250f39592e38de531c801f1d8e438216adeca13144d4446b2bf79bbabf87c90ee6e0a9c4db950} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c77a979f, StatelessResetToken: 0xd4083dabe1830b800030186a1fb61910} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f4fa179e, StatelessResetToken: 0xa194635590e4f9c21f222c55a5eb419a} 2025/09/12 02:43:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f99ae158, StatelessResetToken: 0x051914de4b2f20e341475ca3685a6837} 2025/09/12 02:43:28 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b86534c, StatelessResetToken: 0x0c96bb575dbf079280ada8536cad4290} 2025/09/12 02:43:28 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e8858ec4, StatelessResetToken: 0x67031782586f201ce4cb1d9f7be6ca92} 2025/09/12 02:43:28 server -> Sending packet 3 (417 bytes) for connection 6055c021a0f6bd10, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:28 server Short Header{DestConnectionID: c013b84994845e31, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:28 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e8858ec4, StatelessResetToken: 0x67031782586f201ce4cb1d9f7be6ca92} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f99ae158, StatelessResetToken: 0x051914de4b2f20e341475ca3685a6837} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f4fa179e, StatelessResetToken: 0xa194635590e4f9c21f222c55a5eb419a} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c77a979f, StatelessResetToken: 0xd4083dabe1830b800030186a1fb61910} 2025/09/12 02:43:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b86534c, StatelessResetToken: 0x0c96bb575dbf079280ada8536cad4290} 2025/09/12 02:43:28 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:28 server -> &wire.NewTokenFrame{Token: 0x56a0a78b53ab45b74c9a11442d87e5f94d2b9d0fb88ac64f0eaa9cd037aff6905b4693fd6cf851c520c3dca2b1844a192801376250f39592e38de531c801f1d8e438216adeca13144d4446b2bf79bbabf87c90ee6e0a9c4db950} 2025/09/12 02:43:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:28 server <- Reading packet 3 (55 bytes) for connection ad481cae, 1-RTT 2025/09/12 02:43:28 server Short Header{DestConnectionID: ad481cae, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:28 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 3.856ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:28 server newly acked packets (1): [3] 2025/09/12 02:43:28 server updated RTT: 35.166772ms (σ: 17.583386ms) 2025/09/12 02:43:28 server ECN capability confirmed. 2025/09/12 02:43:28 server Canceling loss detection timer. 2025/09/12 02:43:28 Removing connection ID 6055c021a0f6bd10. 2025/09/12 02:43:28 server <- Reading packet 4 (55 bytes) for connection ad481cae, 1-RTT 2025/09/12 02:43:28 server Short Header{DestConnectionID: ad481cae, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:28 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:28 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:28 server -> Sending packet 4 (37 bytes) for connection 6055c021a0f6bd10, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:28 server Short Header{DestConnectionID: c013b84994845e31, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:28 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 110.098µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:28 Received request: GET /xctfzsveep 2025/09/12 02:43:28 server -> Sending packet 5 (1053 bytes) for connection 6055c021a0f6bd10, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:28 server Short Header{DestConnectionID: c013b84994845e31, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:28 server <- Reading packet 5 (55 bytes) for connection ad481cae, 1-RTT 2025/09/12 02:43:28 server Short Header{DestConnectionID: ad481cae, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:28 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7adbaaa14959d974, StatelessResetToken: 0x29adef69b89e0653e9ceaf0387cc5105} 2025/09/12 02:43:28 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:28 server -> Sending packet 6 (1360 bytes) for connection 6055c021a0f6bd10, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:28 server Short Header{DestConnectionID: c013b84994845e31, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:28 server -> &wire.PingFrame{} 2025/09/12 02:43:28 server Sending ACK because the ACK timer expired. 2025/09/12 02:43:28 server -> Sending packet 7 (38 bytes) for connection 6055c021a0f6bd10, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:28 server Short Header{DestConnectionID: c013b84994845e31, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:28 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.277313ms, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:28 server <- Reading packet 7 (25 bytes) for connection ad481cae, 1-RTT 2025/09/12 02:43:28 server Short Header{DestConnectionID: ad481cae, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:28 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:28 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:28 Replacing connection for connection IDs [ad481cae 7b86534c e8858ec4 c77a979f f99ae158 f4fa179e] with a closed connection. 2025/09/12 02:43:28 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:28 server Connection 6055c021a0f6bd10 closed. 2025/09/12 02:43:29 server <- Received Initial packet. 2025/09/12 02:43:29 Created qlog file: /logs/qlog/2d15099723c3423d.sqlog 2025/09/12 02:43:29 server Changing connection ID to da39fd25. 2025/09/12 02:43:29 Adding connection IDs 2d15099723c3423d and da39fd25 for a new connection. 2025/09/12 02:43:29 server <- Reading packet 113080 (1252 bytes) for connection 2d15099723c3423d, Initial 2025/09/12 02:43:29 server Long Header{Type: Initial, DestConnectionID: 2d15099723c3423d, SrcConnectionID: ca0be0cb481ea03e, Token: 0x56a0a78b53ab45b74c9a11442d87e5f94d2b9d0fb88ac64f0eaa9cd037aff6905b4693fd6cf851c520c3dca2b1844a192801376250f39592e38de531c801f1d8e438216adeca13144d4446b2bf79bbabf87c90ee6e0a9c4db950, PacketNumber: 113080, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:29 server <- &wire.PingFrame{} 2025/09/12 02:43:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:29 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:29 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:29 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:29 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: ca0be0cb481ea03e, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:29 Adding connection ID 975dc31f. 2025/09/12 02:43:29 Adding connection ID b6b3cebd. 2025/09/12 02:43:29 Adding connection ID 423a0832. 2025/09/12 02:43:29 Adding connection ID e6adbe4d. 2025/09/12 02:43:29 Adding connection ID eb4a2cdc. 2025/09/12 02:43:29 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2d15099723c3423d 2025/09/12 02:43:29 server Long Header{Type: Initial, DestConnectionID: ca0be0cb481ea03e, SrcConnectionID: da39fd25, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 912, Version: v1} 2025/09/12 02:43:29 server -> &wire.AckFrame{LargestAcked: 113080, LowestAcked: 113080, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:29 server Long Header{Type: Handshake, DestConnectionID: ca0be0cb481ea03e, SrcConnectionID: da39fd25, PacketNumber: 0, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:29 server Short Header{DestConnectionID: ca0be0cb481ea03e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 423a0832, StatelessResetToken: 0x6134ce39eb3c6b6fe9d86b640ab0cad4} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e6adbe4d, StatelessResetToken: 0x7d2fa430deedc57f6c711409927e68c8} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: eb4a2cdc, StatelessResetToken: 0xf22f572f76a192befc7acdb35ebd4c12} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6b3cebd, StatelessResetToken: 0x4082c4713d2e92ee8bd0af872bc60a8c} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 975dc31f, StatelessResetToken: 0x34efbcc3a1b32e1a15679a4b3d8f3a35} 2025/09/12 02:43:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/09/12 02:43:29 server -> Sending packet 23 (297 bytes) for connection eacee66e59396015, 1-RTT (ECN: Not-ECT) 2025/09/12 02:43:29 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:29 server -> &wire.NewTokenFrame{Token: 0x630f84fc82d7f08738a6bd58713f3770ae01b68b0f870adb1f83f8700c2f9df2c3dbe23e3c97e3821b9fe554435d3f5101629158d5fdad5c6a734f7606dd47c2bd76d0f88a8001e38be090cf52b14c6a79c71343f8d3e51aa95d} 2025/09/12 02:43:29 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:29 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:29 server Skipping packet number 22 2025/09/12 02:43:29 server -> Sending packet 24 (1053 bytes) for connection eacee66e59396015, 1-RTT (ECN: Not-ECT) 2025/09/12 02:43:29 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:29 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:29 server -> Sending packet 1 (1280 bytes) for connection 2d15099723c3423d, Initial 2025/09/12 02:43:29 server Long Header{Type: Initial, DestConnectionID: ca0be0cb481ea03e, SrcConnectionID: da39fd25, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:29 server -> Sending packet 2 (1280 bytes) for connection 2d15099723c3423d, Initial 2025/09/12 02:43:29 server Long Header{Type: Initial, DestConnectionID: ca0be0cb481ea03e, SrcConnectionID: da39fd25, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:29 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:29 server -> Sending packet 1 (199 bytes) for connection 2d15099723c3423d, Handshake 2025/09/12 02:43:29 server Long Header{Type: Handshake, DestConnectionID: ca0be0cb481ea03e, SrcConnectionID: da39fd25, PacketNumber: 1, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:29 server -> Sending packet 2 (199 bytes) for connection 2d15099723c3423d, Handshake 2025/09/12 02:43:29 server Long Header{Type: Handshake, DestConnectionID: ca0be0cb481ea03e, SrcConnectionID: da39fd25, PacketNumber: 2, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:29 server <- Reading packet 0 (42 bytes) for connection da39fd25, Handshake 2025/09/12 02:43:29 server Long Header{Type: Handshake, DestConnectionID: da39fd25, SrcConnectionID: ca0be0cb481ea03e, PacketNumber: 0, PacketNumberLen: 4, Length: 21, Version: v1} 2025/09/12 02:43:29 server Dropping Initial keys. 2025/09/12 02:43:29 server <- &wire.PingFrame{} 2025/09/12 02:43:29 server -> Sending packet 3 (47 bytes) for connection 2d15099723c3423d, Handshake 2025/09/12 02:43:29 server Long Header{Type: Handshake, DestConnectionID: ca0be0cb481ea03e, SrcConnectionID: da39fd25, PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 02:43:29 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:29 Removing connection IDs [ad481cae 7b86534c e8858ec4 c77a979f f99ae158 f4fa179e] for a closed connection after it has been retired. 2025/09/12 02:43:29 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:29 server <- Reading packet 1 (85 bytes) for connection da39fd25, Handshake 2025/09/12 02:43:29 server Long Header{Type: Handshake, DestConnectionID: da39fd25, SrcConnectionID: ca0be0cb481ea03e, PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:29 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 128µs} 2025/09/12 02:43:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:29 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:29 server Dropping Handshake keys. 2025/09/12 02:43:29 server <- Reading packet 0 (183 bytes) for connection da39fd25, 1-RTT 2025/09/12 02:43:29 server Short Header{DestConnectionID: da39fd25, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:29 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ba0cb6e3ff2c53bd, StatelessResetToken: 0x73533a63e1a3f3d79099fe22d22a31a6} 2025/09/12 02:43:29 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5abce97b5e4f97ee, StatelessResetToken: 0x9fc4936a950478c056c8e966309f27b5} 2025/09/12 02:43:29 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3be575632d1e13e5, StatelessResetToken: 0x6827f2fd94e48dc432afd29bdecc7426} 2025/09/12 02:43:29 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:29 server Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 55 bytes. 2025/09/12 02:43:29 server Dropping %!s(logging.PacketType=1) packet (55 bytes) because we already dropped the keys. 2025/09/12 02:43:29 server <- Reading packet 1 (55 bytes) for connection da39fd25, 1-RTT 2025/09/12 02:43:29 server Short Header{DestConnectionID: da39fd25, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:29 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:29 server -> Sending packet 2 (425 bytes) for connection 2d15099723c3423d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:29 Received request: GET /fhrttzaxio 2025/09/12 02:43:29 server Short Header{DestConnectionID: ba0cb6e3ff2c53bd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 289.725µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:29 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e6adbe4d, StatelessResetToken: 0x7d2fa430deedc57f6c711409927e68c8} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: eb4a2cdc, StatelessResetToken: 0xf22f572f76a192befc7acdb35ebd4c12} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 975dc31f, StatelessResetToken: 0x34efbcc3a1b32e1a15679a4b3d8f3a35} 2025/09/12 02:43:29 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:29 server -> &wire.NewTokenFrame{Token: 0xedf381f48cb30b54e429f23dabaef3580eea488629b838b6b649e288067f260fcbcd36677ada2f8016c68372d246646c08dbdfb31fe052df119eb681a8ed81b7ff86635e9edaad2d60eaef2e816c061edc1abe1f1da3771b6307} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 423a0832, StatelessResetToken: 0x6134ce39eb3c6b6fe9d86b640ab0cad4} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6b3cebd, StatelessResetToken: 0x4082c4713d2e92ee8bd0af872bc60a8c} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:29 server -> Sending packet 3 (1280 bytes) for connection 2d15099723c3423d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:29 server Short Header{DestConnectionID: ba0cb6e3ff2c53bd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:29 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 423a0832, StatelessResetToken: 0x6134ce39eb3c6b6fe9d86b640ab0cad4} 2025/09/12 02:43:29 server -> &wire.NewTokenFrame{Token: 0xedf381f48cb30b54e429f23dabaef3580eea488629b838b6b649e288067f260fcbcd36677ada2f8016c68372d246646c08dbdfb31fe052df119eb681a8ed81b7ff86635e9edaad2d60eaef2e816c061edc1abe1f1da3771b6307} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e6adbe4d, StatelessResetToken: 0x7d2fa430deedc57f6c711409927e68c8} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 975dc31f, StatelessResetToken: 0x34efbcc3a1b32e1a15679a4b3d8f3a35} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: eb4a2cdc, StatelessResetToken: 0xf22f572f76a192befc7acdb35ebd4c12} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6b3cebd, StatelessResetToken: 0x4082c4713d2e92ee8bd0af872bc60a8c} 2025/09/12 02:43:29 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 861, Offset + Data length: 861} 2025/09/12 02:43:29 server -> Sending packet 4 (194 bytes) for connection 2d15099723c3423d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:29 server Short Header{DestConnectionID: ba0cb6e3ff2c53bd, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 861, Data length: 163, Offset + Data length: 1024} 2025/09/12 02:43:29 server <- Reading packet 2 (183 bytes) for connection da39fd25, 1-RTT 2025/09/12 02:43:29 server Short Header{DestConnectionID: da39fd25, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:29 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 96µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:29 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 15d2f7f91922a929, StatelessResetToken: 0xfc8e95336c97b8cfabe06184071b9482} 2025/09/12 02:43:29 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:29 server <- Reading packet 3 (55 bytes) for connection da39fd25, 1-RTT 2025/09/12 02:43:29 server Short Header{DestConnectionID: da39fd25, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:29 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 3.888ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:29 server newly acked packets (1): [3] 2025/09/12 02:43:29 server updated RTT: 35.99724ms (σ: 17.99862ms) 2025/09/12 02:43:29 server ECN capability confirmed. 2025/09/12 02:43:29 server Sending ACK because the ACK timer expired. 2025/09/12 02:43:29 server -> Sending packet 5 (36 bytes) for connection 2d15099723c3423d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:29 server Short Header{DestConnectionID: ba0cb6e3ff2c53bd, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 20.256615ms, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:29 Removing connection ID 2d15099723c3423d. 2025/09/12 02:43:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:29 server -> Sending packet 7 (194 bytes) for connection 2d15099723c3423d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:29 server Short Header{DestConnectionID: ba0cb6e3ff2c53bd, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 861, Data length: 163, Offset + Data length: 1024} 2025/09/12 02:43:29 server -> Sending packet 8 (194 bytes) for connection 2d15099723c3423d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:29 server Short Header{DestConnectionID: ba0cb6e3ff2c53bd, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 861, Data length: 163, Offset + Data length: 1024} 2025/09/12 02:43:29 server <- Reading packet 4 (37 bytes) for connection da39fd25, 1-RTT 2025/09/12 02:43:29 server Short Header{DestConnectionID: da39fd25, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:29 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 88µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:43:29 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:29 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:29 Replacing connection for connection IDs [e6adbe4d eb4a2cdc da39fd25 975dc31f b6b3cebd 423a0832] with a closed connection. 2025/09/12 02:43:29 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:29 server Connection 2d15099723c3423d closed. 2025/09/12 02:43:29 server <- Received Initial packet. 2025/09/12 02:43:29 Created qlog file: /logs/qlog/d2ba6951814379ea.sqlog 2025/09/12 02:43:29 server Changing connection ID to 5ba1a7af. 2025/09/12 02:43:29 Adding connection IDs d2ba6951814379ea and 5ba1a7af for a new connection. 2025/09/12 02:43:29 server <- Reading packet 97645 (1252 bytes) for connection d2ba6951814379ea, Initial 2025/09/12 02:43:29 server Long Header{Type: Initial, DestConnectionID: d2ba6951814379ea, SrcConnectionID: d3a7b9da333bfbe4, Token: 0xedf381f48cb30b54e429f23dabaef3580eea488629b838b6b649e288067f260fcbcd36677ada2f8016c68372d246646c08dbdfb31fe052df119eb681a8ed81b7ff86635e9edaad2d60eaef2e816c061edc1abe1f1da3771b6307, PacketNumber: 97645, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:29 server <- &wire.PingFrame{} 2025/09/12 02:43:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:29 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:29 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:29 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:29 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d3a7b9da333bfbe4, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:29 Adding connection ID d3ed9177. 2025/09/12 02:43:29 Adding connection ID e65e914f. 2025/09/12 02:43:29 Adding connection ID 6cc325ca. 2025/09/12 02:43:29 Adding connection ID 8e0769b3. 2025/09/12 02:43:29 Adding connection ID f1077d12. 2025/09/12 02:43:29 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d2ba6951814379ea 2025/09/12 02:43:29 server Long Header{Type: Initial, DestConnectionID: d3a7b9da333bfbe4, SrcConnectionID: 5ba1a7af, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 910, Version: v1} 2025/09/12 02:43:29 server -> &wire.AckFrame{LargestAcked: 97645, LowestAcked: 97645, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:29 server Long Header{Type: Handshake, DestConnectionID: d3a7b9da333bfbe4, SrcConnectionID: 5ba1a7af, PacketNumber: 0, PacketNumberLen: 2, Length: 180, Version: v1} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/09/12 02:43:29 server Short Header{DestConnectionID: d3a7b9da333bfbe4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6cc325ca, StatelessResetToken: 0xafd035e41d9cafcc797bae2516ff9e04} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e65e914f, StatelessResetToken: 0xe48a17436c9e874bc5ed40dd4fbdf30f} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8e0769b3, StatelessResetToken: 0x5550a9f67fe1b23f9682d14ba20e8a9a} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f1077d12, StatelessResetToken: 0x2b2d92f8eed5280481616ab293dfe6cf} 2025/09/12 02:43:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d3ed9177, StatelessResetToken: 0x9445e4f0ae02c3aed6ba085202e056b6} 2025/09/12 02:43:29 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:29 server <- Reading packet 0 (85 bytes) for connection 5ba1a7af, Handshake 2025/09/12 02:43:29 server Long Header{Type: Handshake, DestConnectionID: 5ba1a7af, SrcConnectionID: d3a7b9da333bfbe4, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:29 server Dropping Initial keys. 2025/09/12 02:43:29 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 424µs} 2025/09/12 02:43:29 server newly acked packets (1): [0] 2025/09/12 02:43:29 server updated RTT: 32.327979ms (σ: 16.163989ms) 2025/09/12 02:43:29 server Canceling loss detection timer. 2025/09/12 02:43:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:29 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:29 server Dropping Handshake keys. 2025/09/12 02:43:29 server <- Reading packet 0 (183 bytes) for connection 5ba1a7af, 1-RTT 2025/09/12 02:43:29 server Short Header{DestConnectionID: 5ba1a7af, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:29 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e487a63fa460aa65, StatelessResetToken: 0x5211b06b0e27b15aacf88aa44410ff27} 2025/09/12 02:43:29 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e72dbcbc22ccdc32, StatelessResetToken: 0x65f401f794bb18e93c6e1039a0fde213} 2025/09/12 02:43:29 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6005e4f121927c6b, StatelessResetToken: 0x78f4b1b42bf33499ce7b7111069ab484} 2025/09/12 02:43:29 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:29 server -> Sending packet 1 (305 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:29 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 253.145µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:29 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:29 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:29 server -> &wire.NewTokenFrame{Token: 0x29f433bfba9e62e09fa760b7233c46636deece2249b3b611f497b9963ebe1ee6461274bc2bca751a6ea0abde6c63f4820168070ebcf7671807bd305a93ef17a5d2535fac89b573d67bfca3756f1660e953183fad9d3b8dc8a06f} 2025/09/12 02:43:29 server <- Reading packet 2 (55 bytes) for connection 5ba1a7af, 1-RTT 2025/09/12 02:43:29 server Short Header{DestConnectionID: 5ba1a7af, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:29 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.072ms} 2025/09/12 02:43:29 server newly acked packets (1): [0] 2025/09/12 02:43:29 server updated RTT: 32.378ms (σ: 12.224ms) 2025/09/12 02:43:29 Removing connection IDs [e6adbe4d eb4a2cdc da39fd25 975dc31f b6b3cebd 423a0832] for a closed connection after it has been retired. 2025/09/12 02:43:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:29 server -> Sending packet 3 (297 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:29 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:29 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:29 server -> &wire.NewTokenFrame{Token: 0x29f433bfba9e62e09fa760b7233c46636deece2249b3b611f497b9963ebe1ee6461274bc2bca751a6ea0abde6c63f4820168070ebcf7671807bd305a93ef17a5d2535fac89b573d67bfca3756f1660e953183fad9d3b8dc8a06f} 2025/09/12 02:43:29 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:29 server -> Sending packet 4 (297 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:29 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.NewTokenFrame{Token: 0x29f433bfba9e62e09fa760b7233c46636deece2249b3b611f497b9963ebe1ee6461274bc2bca751a6ea0abde6c63f4820168070ebcf7671807bd305a93ef17a5d2535fac89b573d67bfca3756f1660e953183fad9d3b8dc8a06f} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:29 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:29 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:43:29 server -> Sending packet 6 (297 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:29 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:29 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:29 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:29 server -> &wire.NewTokenFrame{Token: 0x29f433bfba9e62e09fa760b7233c46636deece2249b3b611f497b9963ebe1ee6461274bc2bca751a6ea0abde6c63f4820168070ebcf7671807bd305a93ef17a5d2535fac89b573d67bfca3756f1660e953183fad9d3b8dc8a06f} 2025/09/12 02:43:29 server -> Sending packet 7 (297 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:29 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:29 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:29 server -> &wire.NewTokenFrame{Token: 0x29f433bfba9e62e09fa760b7233c46636deece2249b3b611f497b9963ebe1ee6461274bc2bca751a6ea0abde6c63f4820168070ebcf7671807bd305a93ef17a5d2535fac89b573d67bfca3756f1660e953183fad9d3b8dc8a06f} 2025/09/12 02:43:29 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:29 server -> Sending packet 8 (1360 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:29 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:29 server -> &wire.PingFrame{} 2025/09/12 02:43:29 Removing connection ID d2ba6951814379ea. 2025/09/12 02:43:29 server <- Reading packet 5 (55 bytes) for connection 5ba1a7af, 1-RTT 2025/09/12 02:43:29 server Short Header{DestConnectionID: 5ba1a7af, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:29 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:43:30 server -> Sending packet 10 (297 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:30 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:30 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:30 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:30 server -> &wire.NewTokenFrame{Token: 0x29f433bfba9e62e09fa760b7233c46636deece2249b3b611f497b9963ebe1ee6461274bc2bca751a6ea0abde6c63f4820168070ebcf7671807bd305a93ef17a5d2535fac89b573d67bfca3756f1660e953183fad9d3b8dc8a06f} 2025/09/12 02:43:30 server -> Sending packet 11 (297 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:30 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:30 server -> &wire.NewTokenFrame{Token: 0x29f433bfba9e62e09fa760b7233c46636deece2249b3b611f497b9963ebe1ee6461274bc2bca751a6ea0abde6c63f4820168070ebcf7671807bd305a93ef17a5d2535fac89b573d67bfca3756f1660e953183fad9d3b8dc8a06f} 2025/09/12 02:43:30 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:30 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:30 server <- Reading packet 7 (55 bytes) for connection 5ba1a7af, 1-RTT 2025/09/12 02:43:30 server Short Header{DestConnectionID: 5ba1a7af, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:30 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:30 server -> Sending packet 12 (41 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:30 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:30 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 197.202µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:30 Received request: GET /qcqerlbuxn 2025/09/12 02:43:30 server -> Sending packet 13 (1053 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:30 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:30 server <- Reading packet 8 (55 bytes) for connection 5ba1a7af, 1-RTT 2025/09/12 02:43:30 server Short Header{DestConnectionID: 5ba1a7af, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:30 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 56µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 02:43:30 server newly acked packets (1): [8] 2025/09/12 02:43:30 server ECN capability confirmed. 2025/09/12 02:43:30 server -> Sending packet 14 (1400 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:30 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:30 server -> &wire.PingFrame{} 2025/09/12 02:43:30 server <- Reading packet 9 (183 bytes) for connection 5ba1a7af, 1-RTT 2025/09/12 02:43:30 server Short Header{DestConnectionID: 5ba1a7af, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:30 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 6, AckRanges: {{Largest: 12, Smallest: 10}, {Largest: 8, Smallest: 6}}, DelayTime: 48µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 02:43:30 server newly acked packets (1): [11] 2025/09/12 02:43:30 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 50463f6cf4b9ac81, StatelessResetToken: 0x8f620dbaabdd6298a0482bde6652a10e} 2025/09/12 02:43:30 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:30 server Sending ACK because the ACK timer expired. 2025/09/12 02:43:30 server -> Sending packet 15 (42 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:30 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:30 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.245837ms, ECT0: 0, ECT1: 6, CE: 0} 2025/09/12 02:43:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:30 server -> Sending packet 17 (1053 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:30 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:30 server -> Sending packet 18 (1053 bytes) for connection d2ba6951814379ea, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:30 server Short Header{DestConnectionID: e487a63fa460aa65, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:30 server <- Reading packet 11 (35 bytes) for connection 5ba1a7af, 1-RTT 2025/09/12 02:43:30 server Short Header{DestConnectionID: 5ba1a7af, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:30 server <- &wire.AckFrame{LargestAcked: 17, LowestAcked: 14, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 14}}, DelayTime: 112µs, ECT0: 10, ECT1: 0, CE: 0} 2025/09/12 02:43:30 server newly acked packets (1): [14] 2025/09/12 02:43:30 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:30 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:30 Replacing connection for connection IDs [f1077d12 5ba1a7af d3ed9177 e65e914f 6cc325ca 8e0769b3] with a closed connection. 2025/09/12 02:43:30 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:30 server Connection d2ba6951814379ea closed. 2025/09/12 02:43:30 Removing connection IDs [f1077d12 5ba1a7af d3ed9177 e65e914f 6cc325ca 8e0769b3] for a closed connection after it has been retired. 2025/09/12 02:43:30 server <- Received Initial packet. 2025/09/12 02:43:30 Created qlog file: /logs/qlog/b858bb492e9320dd.sqlog 2025/09/12 02:43:30 server Changing connection ID to 1da931e4. 2025/09/12 02:43:30 Adding connection IDs b858bb492e9320dd and 1da931e4 for a new connection. 2025/09/12 02:43:30 server <- Reading packet 125965 (1252 bytes) for connection b858bb492e9320dd, Initial 2025/09/12 02:43:30 server Long Header{Type: Initial, DestConnectionID: b858bb492e9320dd, SrcConnectionID: ddf055dfa2971745, Token: 0x29f433bfba9e62e09fa760b7233c46636deece2249b3b611f497b9963ebe1ee6461274bc2bca751a6ea0abde6c63f4820168070ebcf7671807bd305a93ef17a5d2535fac89b573d67bfca3756f1660e953183fad9d3b8dc8a06f, PacketNumber: 125965, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:30 server <- &wire.PingFrame{} 2025/09/12 02:43:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:30 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:30 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:30 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:30 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: ddf055dfa2971745, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:30 Adding connection ID 240dbaec. 2025/09/12 02:43:30 Adding connection ID fcc23e30. 2025/09/12 02:43:30 Adding connection ID 5395339b. 2025/09/12 02:43:30 Adding connection ID 655bcdb9. 2025/09/12 02:43:30 Adding connection ID 4be9898b. 2025/09/12 02:43:30 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b858bb492e9320dd 2025/09/12 02:43:30 server Long Header{Type: Initial, DestConnectionID: ddf055dfa2971745, SrcConnectionID: 1da931e4, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 916, Version: v1} 2025/09/12 02:43:30 server -> &wire.AckFrame{LargestAcked: 125965, LowestAcked: 125965, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:30 server Long Header{Type: Handshake, DestConnectionID: ddf055dfa2971745, SrcConnectionID: 1da931e4, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/09/12 02:43:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/09/12 02:43:30 server Short Header{DestConnectionID: ddf055dfa2971745, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5395339b, StatelessResetToken: 0xfc067bca29535067ad404ec519001ca3} 2025/09/12 02:43:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4be9898b, StatelessResetToken: 0x80fe4e0dc769c754122e32d1f7830d39} 2025/09/12 02:43:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 655bcdb9, StatelessResetToken: 0x21f5e146d79dfadceba96d3456234f54} 2025/09/12 02:43:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 240dbaec, StatelessResetToken: 0x9f6eca0aaf22a865737d73dfd9a2aad1} 2025/09/12 02:43:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fcc23e30, StatelessResetToken: 0x23ef23b78f145d33c9a197b4276c088e} 2025/09/12 02:43:30 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:30 server -> Sending packet 1 (1280 bytes) for connection b858bb492e9320dd, Initial 2025/09/12 02:43:30 server Long Header{Type: Initial, DestConnectionID: ddf055dfa2971745, SrcConnectionID: 1da931e4, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:30 server -> Sending packet 2 (1280 bytes) for connection b858bb492e9320dd, Initial 2025/09/12 02:43:30 server Long Header{Type: Initial, DestConnectionID: ddf055dfa2971745, SrcConnectionID: 1da931e4, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:30 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:30 server -> Sending packet 1 (195 bytes) for connection b858bb492e9320dd, Handshake 2025/09/12 02:43:30 server Long Header{Type: Handshake, DestConnectionID: ddf055dfa2971745, SrcConnectionID: 1da931e4, PacketNumber: 1, PacketNumberLen: 2, Length: 174, Version: v1} 2025/09/12 02:43:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/09/12 02:43:30 server -> Sending packet 2 (195 bytes) for connection b858bb492e9320dd, Handshake 2025/09/12 02:43:30 server Long Header{Type: Handshake, DestConnectionID: ddf055dfa2971745, SrcConnectionID: 1da931e4, PacketNumber: 2, PacketNumberLen: 2, Length: 174, Version: v1} 2025/09/12 02:43:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/09/12 02:43:30 server Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 55 bytes. 2025/09/12 02:43:30 server <- Reading packet 2 (55 bytes) for connection 1da931e4, Handshake 2025/09/12 02:43:30 server Long Header{Type: Handshake, DestConnectionID: 1da931e4, SrcConnectionID: ddf055dfa2971745, PacketNumber: 2, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:30 server Dropping Initial keys. 2025/09/12 02:43:30 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 32µs} 2025/09/12 02:43:30 server newly acked packets (1): [2] 2025/09/12 02:43:30 server updated RTT: 31.465038ms (σ: 15.732519ms) 2025/09/12 02:43:30 server Canceling loss detection timer. 2025/09/12 02:43:30 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:31 server <- Reading packet 3 (55 bytes) for connection 1da931e4, Handshake 2025/09/12 02:43:31 server Long Header{Type: Handshake, DestConnectionID: 1da931e4, SrcConnectionID: ddf055dfa2971745, PacketNumber: 3, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:31 server <- &wire.PingFrame{} 2025/09/12 02:43:31 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 250.336ms} 2025/09/12 02:43:31 server -> Sending packet 3 (47 bytes) for connection b858bb492e9320dd, Handshake 2025/09/12 02:43:31 server Long Header{Type: Handshake, DestConnectionID: ddf055dfa2971745, SrcConnectionID: 1da931e4, PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 02:43:31 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:31 server Parsed a coalesced packet. Part 1: 183 bytes. Remaining: 183 bytes. 2025/09/12 02:43:31 server <- Reading packet 4 (183 bytes) for connection 1da931e4, Handshake 2025/09/12 02:43:31 server Long Header{Type: Handshake, DestConnectionID: 1da931e4, SrcConnectionID: ddf055dfa2971745, PacketNumber: 4, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:31 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:31 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 96µs} 2025/09/12 02:43:31 server Dropping Handshake keys. 2025/09/12 02:43:31 server <- Reading packet 2 (183 bytes) for connection 1da931e4, 1-RTT 2025/09/12 02:43:31 server Short Header{DestConnectionID: 1da931e4, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:31 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6c2b7eb6312729b9, StatelessResetToken: 0x82694f8c3b10f5423c50c6ca0883c130} 2025/09/12 02:43:31 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e9e7a3d4b35a8b35, StatelessResetToken: 0x4536ed28f608607f60bfb959c7c62411} 2025/09/12 02:43:31 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ccad17ceb6214340, StatelessResetToken: 0x49a5ad7f98eeb3598d400ea8506488c3} 2025/09/12 02:43:31 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:31 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:31 server -> Sending packet 2 (425 bytes) for connection b858bb492e9320dd, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:31 server Short Header{DestConnectionID: 6c2b7eb6312729b9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:31 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 218.023µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 240dbaec, StatelessResetToken: 0x9f6eca0aaf22a865737d73dfd9a2aad1} 2025/09/12 02:43:31 server -> &wire.NewTokenFrame{Token: 0xb5af9e0f323592f5651bb2424176e2c4e770627475cd96e934828991ef9d64e25b89ea7e0ce8a17ffe38be2e6ccd73f705dea18fa752f4bc4575d3ab481ce7117470549d30f070a9a88a3b32c252bab1ac2a28c865b192773892} 2025/09/12 02:43:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5395339b, StatelessResetToken: 0xfc067bca29535067ad404ec519001ca3} 2025/09/12 02:43:31 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 655bcdb9, StatelessResetToken: 0x21f5e146d79dfadceba96d3456234f54} 2025/09/12 02:43:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fcc23e30, StatelessResetToken: 0x23ef23b78f145d33c9a197b4276c088e} 2025/09/12 02:43:31 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4be9898b, StatelessResetToken: 0x80fe4e0dc769c754122e32d1f7830d39} 2025/09/12 02:43:31 server -> Sending packet 3 (417 bytes) for connection b858bb492e9320dd, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:31 server Short Header{DestConnectionID: 6c2b7eb6312729b9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fcc23e30, StatelessResetToken: 0x23ef23b78f145d33c9a197b4276c088e} 2025/09/12 02:43:31 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:31 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 655bcdb9, StatelessResetToken: 0x21f5e146d79dfadceba96d3456234f54} 2025/09/12 02:43:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 240dbaec, StatelessResetToken: 0x9f6eca0aaf22a865737d73dfd9a2aad1} 2025/09/12 02:43:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4be9898b, StatelessResetToken: 0x80fe4e0dc769c754122e32d1f7830d39} 2025/09/12 02:43:31 server -> &wire.NewTokenFrame{Token: 0xb5af9e0f323592f5651bb2424176e2c4e770627475cd96e934828991ef9d64e25b89ea7e0ce8a17ffe38be2e6ccd73f705dea18fa752f4bc4575d3ab481ce7117470549d30f070a9a88a3b32c252bab1ac2a28c865b192773892} 2025/09/12 02:43:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5395339b, StatelessResetToken: 0xfc067bca29535067ad404ec519001ca3} 2025/09/12 02:43:31 server <- Reading packet 1 (55 bytes) for connection 1da931e4, 1-RTT 2025/09/12 02:43:31 server Short Header{DestConnectionID: 1da931e4, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:31 server Queueing ACK because packet 1 was missing before. 2025/09/12 02:43:31 server <- Reading packet 3 (55 bytes) for connection 1da931e4, 1-RTT 2025/09/12 02:43:31 server Short Header{DestConnectionID: 1da931e4, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:31 server -> Sending packet 4 (35 bytes) for connection b858bb492e9320dd, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:31 server Short Header{DestConnectionID: 6c2b7eb6312729b9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:31 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 326.717µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:31 Received request: GET /eoytumntmt 2025/09/12 02:43:31 server -> Sending packet 5 (1053 bytes) for connection b858bb492e9320dd, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:31 server Short Header{DestConnectionID: 6c2b7eb6312729b9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:31 server <- Reading packet 4 (183 bytes) for connection 1da931e4, 1-RTT 2025/09/12 02:43:31 server Short Header{DestConnectionID: 1da931e4, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:31 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 96µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:31 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 37b246a959b0ce97, StatelessResetToken: 0x1d91ee3d5633877f913e55d5a802e7b9} 2025/09/12 02:43:31 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:31 server <- Reading packet 5 (35 bytes) for connection 1da931e4, 1-RTT 2025/09/12 02:43:31 server Short Header{DestConnectionID: 1da931e4, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:31 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 136µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:31 server newly acked packets (1): [5] 2025/09/12 02:43:31 server updated RTT: 31.528ms (σ: 11.925ms) 2025/09/12 02:43:31 server ECN capability confirmed. 2025/09/12 02:43:31 server setting loss timer for packet 3 (1-RTT) to 35.965679ms (in 2025-09-12 02:43:31.140206948 +0000 UTC m=+27.328357594) 2025/09/12 02:43:31 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:31 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:31 Replacing connection for connection IDs [4be9898b 1da931e4 240dbaec fcc23e30 5395339b 655bcdb9 b858bb492e9320dd] with a closed connection. 2025/09/12 02:43:31 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:31 server Connection b858bb492e9320dd closed. 2025/09/12 02:43:31 Removing connection IDs [4be9898b 1da931e4 240dbaec fcc23e30 5395339b 655bcdb9 b858bb492e9320dd] for a closed connection after it has been retired. 2025/09/12 02:43:32 server <- Received Initial packet. 2025/09/12 02:43:32 Created qlog file: /logs/qlog/ccff2cee93719515.sqlog 2025/09/12 02:43:32 server Changing connection ID to ae76d881. 2025/09/12 02:43:32 Adding connection IDs ccff2cee93719515 and ae76d881 for a new connection. 2025/09/12 02:43:32 server <- Reading packet 125807 (1252 bytes) for connection ccff2cee93719515, Initial 2025/09/12 02:43:32 server Long Header{Type: Initial, DestConnectionID: ccff2cee93719515, SrcConnectionID: c80a5828ba1bf279, Token: 0xb5af9e0f323592f5651bb2424176e2c4e770627475cd96e934828991ef9d64e25b89ea7e0ce8a17ffe38be2e6ccd73f705dea18fa752f4bc4575d3ab481ce7117470549d30f070a9a88a3b32c252bab1ac2a28c865b192773892, PacketNumber: 125807, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:32 server <- &wire.PingFrame{} 2025/09/12 02:43:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:32 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:32 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:32 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:32 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c80a5828ba1bf279, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:32 Adding connection ID 3db0c87e. 2025/09/12 02:43:32 Adding connection ID 4ed1fe48. 2025/09/12 02:43:32 Adding connection ID cb976417. 2025/09/12 02:43:32 Adding connection ID 4199f96a. 2025/09/12 02:43:32 Adding connection ID 4bdfcce4. 2025/09/12 02:43:32 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ccff2cee93719515 2025/09/12 02:43:32 server Long Header{Type: Initial, DestConnectionID: c80a5828ba1bf279, SrcConnectionID: ae76d881, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 913, Version: v1} 2025/09/12 02:43:32 server -> &wire.AckFrame{LargestAcked: 125807, LowestAcked: 125807, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:32 server Long Header{Type: Handshake, DestConnectionID: c80a5828ba1bf279, SrcConnectionID: ae76d881, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:32 server Short Header{DestConnectionID: c80a5828ba1bf279, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4ed1fe48, StatelessResetToken: 0xcac2fcc820951615ba7bfa23fd4a3838} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4199f96a, StatelessResetToken: 0x7c1254a390d0718e971820022c19d6a1} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3db0c87e, StatelessResetToken: 0x3eabeb628a4b04f92a7fefcd3a19fa19} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4bdfcce4, StatelessResetToken: 0x182b4176ffdcdf64efbbadd549bd165f} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb976417, StatelessResetToken: 0xe26550458c367abe7e6a3a6f56af4ba8} 2025/09/12 02:43:32 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:32 server -> Sending packet 1 (1280 bytes) for connection ccff2cee93719515, Initial 2025/09/12 02:43:32 server Long Header{Type: Initial, DestConnectionID: c80a5828ba1bf279, SrcConnectionID: ae76d881, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:32 server -> Sending packet 2 (1280 bytes) for connection ccff2cee93719515, Initial 2025/09/12 02:43:32 server Long Header{Type: Initial, DestConnectionID: c80a5828ba1bf279, SrcConnectionID: ae76d881, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:32 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:32 server -> Sending packet 1 (198 bytes) for connection ccff2cee93719515, Handshake 2025/09/12 02:43:32 server Long Header{Type: Handshake, DestConnectionID: c80a5828ba1bf279, SrcConnectionID: ae76d881, PacketNumber: 1, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:32 server -> Sending packet 2 (198 bytes) for connection ccff2cee93719515, Handshake 2025/09/12 02:43:32 server Long Header{Type: Handshake, DestConnectionID: c80a5828ba1bf279, SrcConnectionID: ae76d881, PacketNumber: 2, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:32 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 02:43:32 server -> Sending packet 3 (1280 bytes) for connection ccff2cee93719515, Initial 2025/09/12 02:43:32 server Long Header{Type: Initial, DestConnectionID: c80a5828ba1bf279, SrcConnectionID: ae76d881, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:32 server -> Sending packet 4 (1280 bytes) for connection ccff2cee93719515, Initial 2025/09/12 02:43:32 server Long Header{Type: Initial, DestConnectionID: c80a5828ba1bf279, SrcConnectionID: ae76d881, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:32 server <- Reading packet 1 (42 bytes) for connection ae76d881, Handshake 2025/09/12 02:43:32 server Long Header{Type: Handshake, DestConnectionID: ae76d881, SrcConnectionID: c80a5828ba1bf279, PacketNumber: 1, PacketNumberLen: 4, Length: 21, Version: v1} 2025/09/12 02:43:32 server Dropping Initial keys. 2025/09/12 02:43:32 server <- &wire.PingFrame{} 2025/09/12 02:43:32 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:43:32 server -> Sending packet 3 (206 bytes) for connection ccff2cee93719515, Handshake 2025/09/12 02:43:32 server Long Header{Type: Handshake, DestConnectionID: c80a5828ba1bf279, SrcConnectionID: ae76d881, PacketNumber: 3, PacketNumberLen: 2, Length: 185, Version: v1} 2025/09/12 02:43:32 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:32 server -> Sending packet 4 (198 bytes) for connection ccff2cee93719515, Handshake 2025/09/12 02:43:32 server Long Header{Type: Handshake, DestConnectionID: c80a5828ba1bf279, SrcConnectionID: ae76d881, PacketNumber: 4, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:32 server Parsed a coalesced packet. Part 1: 86 bytes. Remaining: 238 bytes. 2025/09/12 02:43:32 server <- Reading packet 2 (86 bytes) for connection ae76d881, Handshake 2025/09/12 02:43:32 server Long Header{Type: Handshake, DestConnectionID: ae76d881, SrcConnectionID: c80a5828ba1bf279, PacketNumber: 2, PacketNumberLen: 4, Length: 65, Version: v1} 2025/09/12 02:43:32 server <- &wire.PingFrame{} 2025/09/12 02:43:32 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 128µs} 2025/09/12 02:43:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:32 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:32 server Dropping Handshake keys. 2025/09/12 02:43:32 server Parsed a coalesced packet. Part 2: 55 bytes. Remaining: 183 bytes. 2025/09/12 02:43:32 server Dropping %!s(logging.PacketType=1) packet (55 bytes) because we already dropped the keys. 2025/09/12 02:43:32 server <- Reading packet 0 (183 bytes) for connection ae76d881, 1-RTT 2025/09/12 02:43:32 server Short Header{DestConnectionID: ae76d881, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:32 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a9cea567aa81a3b7, StatelessResetToken: 0x5492f1a89a0b498e619d010daefaf003} 2025/09/12 02:43:32 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b2c86c327cda2ca5, StatelessResetToken: 0x7c806ba9f74b12a1cd16d853b6cdcc79} 2025/09/12 02:43:32 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 15993d50f8bd357d, StatelessResetToken: 0xc8a1434fb8f232c72e095f17f4a600f5} 2025/09/12 02:43:32 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:32 server -> Sending packet 2 (425 bytes) for connection ccff2cee93719515, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:32 server Short Header{DestConnectionID: a9cea567aa81a3b7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:32 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 263.598µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:32 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3db0c87e, StatelessResetToken: 0x3eabeb628a4b04f92a7fefcd3a19fa19} 2025/09/12 02:43:32 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4ed1fe48, StatelessResetToken: 0xcac2fcc820951615ba7bfa23fd4a3838} 2025/09/12 02:43:32 server -> &wire.NewTokenFrame{Token: 0x6ad5a5d33f36b62643d7a16f1f3d8ce540968b367c9a1dabe9d484c2bf767ad9a77e98af4cbe22fec3d12c69c5dd0806b96a0f2ec5171c6aecdac8557be83f186228ce79344ee3cea5e9abeccb38f8f02f8e7c3a74207c258ffc} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4199f96a, StatelessResetToken: 0x7c1254a390d0718e971820022c19d6a1} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb976417, StatelessResetToken: 0xe26550458c367abe7e6a3a6f56af4ba8} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4bdfcce4, StatelessResetToken: 0x182b4176ffdcdf64efbbadd549bd165f} 2025/09/12 02:43:32 server -> Sending packet 3 (417 bytes) for connection ccff2cee93719515, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:32 server Short Header{DestConnectionID: a9cea567aa81a3b7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:32 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb976417, StatelessResetToken: 0xe26550458c367abe7e6a3a6f56af4ba8} 2025/09/12 02:43:32 server -> &wire.NewTokenFrame{Token: 0x6ad5a5d33f36b62643d7a16f1f3d8ce540968b367c9a1dabe9d484c2bf767ad9a77e98af4cbe22fec3d12c69c5dd0806b96a0f2ec5171c6aecdac8557be83f186228ce79344ee3cea5e9abeccb38f8f02f8e7c3a74207c258ffc} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3db0c87e, StatelessResetToken: 0x3eabeb628a4b04f92a7fefcd3a19fa19} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4ed1fe48, StatelessResetToken: 0xcac2fcc820951615ba7bfa23fd4a3838} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 4bdfcce4, StatelessResetToken: 0x182b4176ffdcdf64efbbadd549bd165f} 2025/09/12 02:43:32 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4199f96a, StatelessResetToken: 0x7c1254a390d0718e971820022c19d6a1} 2025/09/12 02:43:32 server Parsed a coalesced packet. Part 1: 55 bytes. Remaining: 55 bytes. 2025/09/12 02:43:32 server Dropping %!s(logging.PacketType=1) packet (55 bytes) because we already dropped the keys. 2025/09/12 02:43:32 server <- Reading packet 1 (55 bytes) for connection ae76d881, 1-RTT 2025/09/12 02:43:32 server Short Header{DestConnectionID: ae76d881, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:32 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:32 Received request: GET /twmqemyuez 2025/09/12 02:43:32 server -> Sending packet 4 (1061 bytes) for connection ccff2cee93719515, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:32 server Short Header{DestConnectionID: a9cea567aa81a3b7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:32 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 496.453µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:32 server <- Reading packet 2 (183 bytes) for connection ae76d881, 1-RTT 2025/09/12 02:43:32 server Short Header{DestConnectionID: ae76d881, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:32 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 104µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:32 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9770b81c2753bd60, StatelessResetToken: 0x24b89441039ffeb9549c652e402f3ba2} 2025/09/12 02:43:32 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:32 server <- Reading packet 3 (35 bytes) for connection ae76d881, 1-RTT 2025/09/12 02:43:32 server Short Header{DestConnectionID: ae76d881, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:32 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 128µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:32 server newly acked packets (1): [4] 2025/09/12 02:43:32 server updated RTT: 31.980804ms (σ: 15.990402ms) 2025/09/12 02:43:32 server ECN capability confirmed. 2025/09/12 02:43:32 server setting loss timer for packet 3 (1-RTT) to 35.978404ms (in 2025-09-12 02:43:32.423074013 +0000 UTC m=+28.611224658) 2025/09/12 02:43:32 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:32 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:32 Replacing connection for connection IDs [ae76d881 3db0c87e 4ed1fe48 cb976417 4199f96a 4bdfcce4 ccff2cee93719515] with a closed connection. 2025/09/12 02:43:32 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:32 server Connection ccff2cee93719515 closed. 2025/09/12 02:43:32 server <- Received Initial packet. 2025/09/12 02:43:32 Created qlog file: /logs/qlog/0801b17aa4fb66b0.sqlog 2025/09/12 02:43:32 server Changing connection ID to f91ef847. 2025/09/12 02:43:32 Adding connection IDs 0801b17aa4fb66b0 and f91ef847 for a new connection. 2025/09/12 02:43:32 server <- Reading packet 70612 (1252 bytes) for connection 0801b17aa4fb66b0, Initial 2025/09/12 02:43:32 server Long Header{Type: Initial, DestConnectionID: 0801b17aa4fb66b0, SrcConnectionID: 1d4140265718acd8, Token: 0x6ad5a5d33f36b62643d7a16f1f3d8ce540968b367c9a1dabe9d484c2bf767ad9a77e98af4cbe22fec3d12c69c5dd0806b96a0f2ec5171c6aecdac8557be83f186228ce79344ee3cea5e9abeccb38f8f02f8e7c3a74207c258ffc, PacketNumber: 70612, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:32 server <- &wire.PingFrame{} 2025/09/12 02:43:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:32 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:32 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:32 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:32 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 1d4140265718acd8, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:32 Adding connection ID fb398d12. 2025/09/12 02:43:32 Adding connection ID 9b3cc19c. 2025/09/12 02:43:32 Adding connection ID 23a3c6f0. 2025/09/12 02:43:32 Adding connection ID 4ce47d8d. 2025/09/12 02:43:32 Adding connection ID a4587aec. 2025/09/12 02:43:32 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0801b17aa4fb66b0 2025/09/12 02:43:32 server Long Header{Type: Initial, DestConnectionID: 1d4140265718acd8, SrcConnectionID: f91ef847, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 907, Version: v1} 2025/09/12 02:43:32 server -> &wire.AckFrame{LargestAcked: 70612, LowestAcked: 70612, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:32 server Long Header{Type: Handshake, DestConnectionID: 1d4140265718acd8, SrcConnectionID: f91ef847, PacketNumber: 0, PacketNumberLen: 2, Length: 183, Version: v1} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/09/12 02:43:32 server Short Header{DestConnectionID: 1d4140265718acd8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 23a3c6f0, StatelessResetToken: 0xcb0aed1fe0e166d37397ec454eccf91b} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fb398d12, StatelessResetToken: 0x8616eef0d58797bf324a8ec1dc53a695} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4ce47d8d, StatelessResetToken: 0xb775789f84928633009d757c5659e48b} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a4587aec, StatelessResetToken: 0xc06821b58e1599a61a5b19ca7ee9d2b5} 2025/09/12 02:43:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9b3cc19c, StatelessResetToken: 0x1e9ad0bc4023c3a87c5eb9c46b577b0f} 2025/09/12 02:43:32 Removing connection IDs [ae76d881 3db0c87e 4ed1fe48 cb976417 4199f96a 4bdfcce4 ccff2cee93719515] for a closed connection after it has been retired. 2025/09/12 02:43:32 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:32 server <- Reading packet 0 (85 bytes) for connection f91ef847, Handshake 2025/09/12 02:43:32 server Long Header{Type: Handshake, DestConnectionID: f91ef847, SrcConnectionID: 1d4140265718acd8, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:32 server Dropping Initial keys. 2025/09/12 02:43:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368µs} 2025/09/12 02:43:32 server newly acked packets (1): [0] 2025/09/12 02:43:32 server updated RTT: 32.26373ms (σ: 16.131865ms) 2025/09/12 02:43:32 server Canceling loss detection timer. 2025/09/12 02:43:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:32 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:32 server Dropping Handshake keys. 2025/09/12 02:43:32 server <- Reading packet 0 (183 bytes) for connection f91ef847, 1-RTT 2025/09/12 02:43:32 server Short Header{DestConnectionID: f91ef847, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:32 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d19ebf2b665281de, StatelessResetToken: 0x4ccaaadc6a48384423ffd93a50810298} 2025/09/12 02:43:32 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e70307f2db121a05, StatelessResetToken: 0x2404bcdc413de29de0c20c72acb8c1f4} 2025/09/12 02:43:32 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cc801561bf8db3ff, StatelessResetToken: 0x46f563d42e88889ea11cd6d41cf10356} 2025/09/12 02:43:32 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:32 server -> Sending packet 1 (305 bytes) for connection 0801b17aa4fb66b0, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:32 server Short Header{DestConnectionID: d19ebf2b665281de, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:32 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 207.95µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:32 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:32 server -> &wire.NewTokenFrame{Token: 0x6b4d30e5bec8e087f6552790883f17eb9a4e921f6ff7c00745757b2055329d78883b23682ec5efad7f5d6a1114015bbedf60668fbc63c887a49a1b955234867c711d72872c08b3d9d1a5b7d69476793ddbe9a41682479eb807ca} 2025/09/12 02:43:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:32 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:32 server <- Reading packet 3 (55 bytes) for connection f91ef847, 1-RTT 2025/09/12 02:43:32 server Short Header{DestConnectionID: f91ef847, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:32 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 03a0d10b902231ee, StatelessResetToken: 0x25a4dc7e1635098fb00fc759787dc1b2} 2025/09/12 02:43:32 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:32 server -> Sending packet 2 (37 bytes) for connection 0801b17aa4fb66b0, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:32 server Short Header{DestConnectionID: d19ebf2b665281de, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:32 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 80.902µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:32 server <- Reading packet 4 (55 bytes) for connection f91ef847, 1-RTT 2025/09/12 02:43:32 server Short Header{DestConnectionID: f91ef847, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:32 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 4.216ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:32 server newly acked packets (2): [0 1] 2025/09/12 02:43:32 server updated RTT: 32.614ms (σ: 12.801ms) 2025/09/12 02:43:32 server ECN capability confirmed. 2025/09/12 02:43:32 server Canceling loss detection timer. 2025/09/12 02:43:32 server Ignoring all packets below 1. 2025/09/12 02:43:32 server <- Reading packet 6 (55 bytes) for connection f91ef847, 1-RTT 2025/09/12 02:43:32 server Short Header{DestConnectionID: f91ef847, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:32 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:32 server -> Sending packet 3 (37 bytes) for connection 0801b17aa4fb66b0, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:32 server Short Header{DestConnectionID: d19ebf2b665281de, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:32 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 81.743µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:32 Received request: GET /hnfovvxycc 2025/09/12 02:43:32 server -> Sending packet 4 (1053 bytes) for connection 0801b17aa4fb66b0, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:32 server Short Header{DestConnectionID: d19ebf2b665281de, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:32 server <- Reading packet 7 (33 bytes) for connection f91ef847, 1-RTT 2025/09/12 02:43:32 server Short Header{DestConnectionID: f91ef847, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:32 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 112µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:43:32 server newly acked packets (1): [4] 2025/09/12 02:43:32 server updated RTT: 32.477ms (σ: 9.874ms) 2025/09/12 02:43:32 server Canceling loss detection timer. 2025/09/12 02:43:32 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:32 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:32 Replacing connection for connection IDs [9b3cc19c 23a3c6f0 4ce47d8d a4587aec f91ef847 fb398d12 0801b17aa4fb66b0] with a closed connection. 2025/09/12 02:43:32 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:32 server Connection 0801b17aa4fb66b0 closed. 2025/09/12 02:43:33 Removing connection IDs [9b3cc19c 23a3c6f0 4ce47d8d a4587aec f91ef847 fb398d12 0801b17aa4fb66b0] for a closed connection after it has been retired. 2025/09/12 02:43:33 server <- Received Initial packet. 2025/09/12 02:43:33 Created qlog file: /logs/qlog/e03c42c7f6e71b2a.sqlog 2025/09/12 02:43:33 server Changing connection ID to dedcf7b5. 2025/09/12 02:43:33 Adding connection IDs e03c42c7f6e71b2a and dedcf7b5 for a new connection. 2025/09/12 02:43:33 server <- Reading packet 100485 (1252 bytes) for connection e03c42c7f6e71b2a, Initial 2025/09/12 02:43:33 server Long Header{Type: Initial, DestConnectionID: e03c42c7f6e71b2a, SrcConnectionID: 13c3bbb053a55ce9, Token: 0x6b4d30e5bec8e087f6552790883f17eb9a4e921f6ff7c00745757b2055329d78883b23682ec5efad7f5d6a1114015bbedf60668fbc63c887a49a1b955234867c711d72872c08b3d9d1a5b7d69476793ddbe9a41682479eb807ca, PacketNumber: 100485, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:33 server <- &wire.PingFrame{} 2025/09/12 02:43:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:33 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:33 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:33 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:33 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 13c3bbb053a55ce9, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:33 Adding connection ID 88bbbf2a. 2025/09/12 02:43:33 Adding connection ID 6b31b9be. 2025/09/12 02:43:33 Adding connection ID c3d8b8ef. 2025/09/12 02:43:33 Adding connection ID 13c5ef47. 2025/09/12 02:43:33 Adding connection ID 8e859aa1. 2025/09/12 02:43:33 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e03c42c7f6e71b2a 2025/09/12 02:43:33 server Long Header{Type: Initial, DestConnectionID: 13c3bbb053a55ce9, SrcConnectionID: dedcf7b5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 905, Version: v1} 2025/09/12 02:43:33 server -> &wire.AckFrame{LargestAcked: 100485, LowestAcked: 100485, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:33 server Long Header{Type: Handshake, DestConnectionID: 13c3bbb053a55ce9, SrcConnectionID: dedcf7b5, PacketNumber: 0, PacketNumberLen: 2, Length: 185, Version: v1} 2025/09/12 02:43:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/09/12 02:43:33 server Short Header{DestConnectionID: 13c3bbb053a55ce9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6b31b9be, StatelessResetToken: 0x8baa0342509e514b4276045eb2ed5ec2} 2025/09/12 02:43:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c3d8b8ef, StatelessResetToken: 0xf39c007394b63bfd34e16a22954ef7cc} 2025/09/12 02:43:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 88bbbf2a, StatelessResetToken: 0xee3f10ea7506e7e06a0f258ea8fbf574} 2025/09/12 02:43:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 8e859aa1, StatelessResetToken: 0xa623766fbaef113bce5bdd1a08a6d763} 2025/09/12 02:43:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 13c5ef47, StatelessResetToken: 0x4dccfcf1917ab543f41c8b719ac2613b} 2025/09/12 02:43:33 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:33 server <- Reading packet 0 (85 bytes) for connection dedcf7b5, Handshake 2025/09/12 02:43:33 server Long Header{Type: Handshake, DestConnectionID: dedcf7b5, SrcConnectionID: 13c3bbb053a55ce9, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:33 server Dropping Initial keys. 2025/09/12 02:43:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368µs} 2025/09/12 02:43:33 server newly acked packets (1): [0] 2025/09/12 02:43:33 server updated RTT: 32.310334ms (σ: 16.155167ms) 2025/09/12 02:43:33 server Canceling loss detection timer. 2025/09/12 02:43:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:33 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:33 server Dropping Handshake keys. 2025/09/12 02:43:33 server <- Reading packet 0 (183 bytes) for connection dedcf7b5, 1-RTT 2025/09/12 02:43:33 server Short Header{DestConnectionID: dedcf7b5, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:33 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8b0509d52c23ae83, StatelessResetToken: 0x73d74f083e222095f0d17140f893f84a} 2025/09/12 02:43:33 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4b4da770319435dc, StatelessResetToken: 0x22c4682edc204ea06f17145e494a6785} 2025/09/12 02:43:33 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8a5c380fd33e6bb7, StatelessResetToken: 0xe7631cc40d16fe8e6e6bdfdb6beeb4de} 2025/09/12 02:43:33 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:33 server -> Sending packet 1 (305 bytes) for connection e03c42c7f6e71b2a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:33 server Short Header{DestConnectionID: 8b0509d52c23ae83, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:33 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 291.417µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:33 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:33 server -> &wire.NewTokenFrame{Token: 0x5652675421a0a21a416b6abab6a1635bc5a0daf467761e3d6b75d709fac3248e3134fa9684a18b10a45309725eb8cc3ffa0777db5d44b2a198331620a46c32ba6bbd0f31e259cd6cddc631759ba7edf619eea3fbc3cc4923fe6b} 2025/09/12 02:43:33 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:33 server <- Reading packet 1 (55 bytes) for connection dedcf7b5, 1-RTT 2025/09/12 02:43:33 server Short Header{DestConnectionID: dedcf7b5, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:33 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:33 server <- Reading packet 2 (55 bytes) for connection dedcf7b5, 1-RTT 2025/09/12 02:43:33 server Short Header{DestConnectionID: dedcf7b5, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:33 Received request: GET /obhhgecsoy 2025/09/12 02:43:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:33 server newly acked packets (1): [0] 2025/09/12 02:43:33 server updated RTT: 32.362ms (σ: 12.22ms) 2025/09/12 02:43:33 server -> Sending packet 2 (1061 bytes) for connection e03c42c7f6e71b2a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:33 server Short Header{DestConnectionID: 8b0509d52c23ae83, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:33 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 81.289µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:33 server <- Reading packet 3 (35 bytes) for connection dedcf7b5, 1-RTT 2025/09/12 02:43:33 server Short Header{DestConnectionID: dedcf7b5, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:33 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 144µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:33 server newly acked packets (1): [2] 2025/09/12 02:43:33 server updated RTT: 32.277ms (σ: 9.333ms) 2025/09/12 02:43:33 server ECN capability confirmed. 2025/09/12 02:43:33 server setting loss timer for packet 1 (1-RTT) to 36.311625ms (in 2025-09-12 02:43:33.277302278 +0000 UTC m=+29.465452933) 2025/09/12 02:43:33 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:33 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:33 Replacing connection for connection IDs [8e859aa1 dedcf7b5 88bbbf2a 6b31b9be c3d8b8ef 13c5ef47 e03c42c7f6e71b2a] with a closed connection. 2025/09/12 02:43:33 server Connection e03c42c7f6e71b2a closed. 2025/09/12 02:43:33 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:33 Removing connection IDs [8e859aa1 dedcf7b5 88bbbf2a 6b31b9be c3d8b8ef 13c5ef47 e03c42c7f6e71b2a] for a closed connection after it has been retired. 2025/09/12 02:43:33 server <- Received Initial packet. 2025/09/12 02:43:33 Created qlog file: /logs/qlog/1ed72c58c8002faa.sqlog 2025/09/12 02:43:33 server Changing connection ID to fa207d37. 2025/09/12 02:43:33 Adding connection IDs 1ed72c58c8002faa and fa207d37 for a new connection. 2025/09/12 02:43:33 server <- Reading packet 79099 (1252 bytes) for connection 1ed72c58c8002faa, Initial 2025/09/12 02:43:33 server Long Header{Type: Initial, DestConnectionID: 1ed72c58c8002faa, SrcConnectionID: 7c4fe5f44134240a, Token: (empty), PacketNumber: 79099, PacketNumberLen: 4, Length: 1226, Version: v1} 2025/09/12 02:43:33 server <- &wire.PingFrame{} 2025/09/12 02:43:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:33 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:33 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:33 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:33 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7c4fe5f44134240a, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:33 Adding connection ID 8198b2af. 2025/09/12 02:43:33 Adding connection ID 092d7c5f. 2025/09/12 02:43:33 Adding connection ID deab5ba5. 2025/09/12 02:43:33 Adding connection ID 17f7d4f7. 2025/09/12 02:43:33 Adding connection ID 04198be3. 2025/09/12 02:43:33 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1ed72c58c8002faa 2025/09/12 02:43:33 server Long Header{Type: Initial, DestConnectionID: 7c4fe5f44134240a, SrcConnectionID: fa207d37, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 906, Version: v1} 2025/09/12 02:43:33 server -> &wire.AckFrame{LargestAcked: 79099, LowestAcked: 79099, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:33 server Long Header{Type: Handshake, DestConnectionID: 7c4fe5f44134240a, SrcConnectionID: fa207d37, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/09/12 02:43:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/09/12 02:43:33 server Short Header{DestConnectionID: 7c4fe5f44134240a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 092d7c5f, StatelessResetToken: 0x2aad0ffea88e7ad5f106dfdb2f13002c} 2025/09/12 02:43:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 17f7d4f7, StatelessResetToken: 0x433446979235646ee584c3f5707b4119} 2025/09/12 02:43:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8198b2af, StatelessResetToken: 0xfec09c40a527594e6b45af1a3a82cfc1} 2025/09/12 02:43:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: deab5ba5, StatelessResetToken: 0x30cbdd3de267b17e9f0a706ae3b349c5} 2025/09/12 02:43:33 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 04198be3, StatelessResetToken: 0x06e853645786082d19be7e3eb0801c6b} 2025/09/12 02:43:33 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:33 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:33 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:33 server -> Sending packet 1 (1280 bytes) for connection 1ed72c58c8002faa, Initial 2025/09/12 02:43:33 server Long Header{Type: Initial, DestConnectionID: 7c4fe5f44134240a, SrcConnectionID: fa207d37, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:33 server -> Sending packet 2 (1280 bytes) for connection 1ed72c58c8002faa, Initial 2025/09/12 02:43:33 server Long Header{Type: Initial, DestConnectionID: 7c4fe5f44134240a, SrcConnectionID: fa207d37, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:33 server Queueing packet (183 bytes) for later decryption 2025/09/12 02:43:33 server <- Reading packet 2 (183 bytes) for connection fa207d37, Handshake 2025/09/12 02:43:33 server Long Header{Type: Handshake, DestConnectionID: fa207d37, SrcConnectionID: 7c4fe5f44134240a, PacketNumber: 2, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:33 server Dropping Initial keys. 2025/09/12 02:43:33 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:33 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 251.168ms} 2025/09/12 02:43:33 server newly acked packets (1): [0] 2025/09/12 02:43:33 server updated RTT: 283.09991ms (σ: 141.549955ms) 2025/09/12 02:43:33 server Canceling loss detection timer. 2025/09/12 02:43:33 server Dropping Handshake keys. 2025/09/12 02:43:33 server -> Sending packet 1 (296 bytes) for connection 1ed72c58c8002faa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:33 server Short Header{DestConnectionID: 7c4fe5f44134240a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:33 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:33 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:33 server -> &wire.NewTokenFrame{Token: 0x914e1de2ebc3da9da09017299f0681e05fa88c365e6b2e9966bc13c7ac0ebe35be89efa6c90cf414cbed20f349d33a3849acb9e56cb5cf3aaca42fff116813b194eba04f6c18ce8509e31881067b7199f8656ae8ac7f8b37bb871f} 2025/09/12 02:43:33 server <- Reading packet 1 (55 bytes) for connection fa207d37, 1-RTT 2025/09/12 02:43:33 server Short Header{DestConnectionID: fa207d37, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:33 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:33 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:33 server <- Reading packet 2 (55 bytes) for connection fa207d37, 1-RTT 2025/09/12 02:43:33 server Short Header{DestConnectionID: fa207d37, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.056ms} 2025/09/12 02:43:33 server newly acked packets (1): [0] 2025/09/12 02:43:33 server updated RTT: 251.806ms (σ: 168.746ms) 2025/09/12 02:43:33 server <- Reading packet 3 (183 bytes) for connection fa207d37, 1-RTT 2025/09/12 02:43:33 server Short Header{DestConnectionID: fa207d37, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:33 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 15b6a37d2bf27727, StatelessResetToken: 0xb680d335e734a2d77a79be30918a8d04} 2025/09/12 02:43:33 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d260abdd00fad84f, StatelessResetToken: 0xf5a79ddba466b2fbfcc096e456d7185f} 2025/09/12 02:43:33 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e08b670ebbf91337, StatelessResetToken: 0x9e275cb22bd96736cfdc2759a8fd866d} 2025/09/12 02:43:33 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 168.248ms} 2025/09/12 02:43:33 server -> Sending packet 2 (38 bytes) for connection 1ed72c58c8002faa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:33 Received request: GET /gadblwcccn 2025/09/12 02:43:33 server Short Header{DestConnectionID: 15b6a37d2bf27727, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:33 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 83.364622ms, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:33 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:33 server -> Sending packet 3 (1053 bytes) for connection 1ed72c58c8002faa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:33 server Short Header{DestConnectionID: 15b6a37d2bf27727, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:33 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:33 server <- Reading packet 4 (183 bytes) for connection fa207d37, 1-RTT 2025/09/12 02:43:33 server Short Header{DestConnectionID: fa207d37, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:33 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 40µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:33 server newly acked packets (2): [1 2] 2025/09/12 02:43:33 server updated RTT: 224.21ms (σ: 181.75ms) 2025/09/12 02:43:33 server ECN capability confirmed. 2025/09/12 02:43:33 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4bd983feedcaad72, StatelessResetToken: 0x303c5fb4d92e06963f3d242397d60898} 2025/09/12 02:43:33 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:33 server Ignoring all packets below 4. 2025/09/12 02:43:33 server <- Reading packet 5 (33 bytes) for connection fa207d37, 1-RTT 2025/09/12 02:43:33 server Short Header{DestConnectionID: fa207d37, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:33 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 112µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:33 server newly acked packets (1): [3] 2025/09/12 02:43:33 server updated RTT: 200.127ms (σ: 184.478ms) 2025/09/12 02:43:33 server Canceling loss detection timer. 2025/09/12 02:43:33 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:33 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:33 Replacing connection for connection IDs [8198b2af 092d7c5f deab5ba5 17f7d4f7 04198be3 fa207d37 1ed72c58c8002faa] with a closed connection. 2025/09/12 02:43:33 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:33 server Connection 1ed72c58c8002faa closed. 2025/09/12 02:43:34 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:43:34 server -> Sending packet 24 (416 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:34 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f60a412, StatelessResetToken: 0x04f6bc58a448ffed78114caa0f8dabea} 2025/09/12 02:43:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1f22be29, StatelessResetToken: 0x528760f6b2968c56e8d17ad0a6e169fd} 2025/09/12 02:43:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 722589e0, StatelessResetToken: 0xfd32ae2e9c06e805a0a31952b05b4316} 2025/09/12 02:43:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec7b6309, StatelessResetToken: 0xea66ecd1b9111acaf6b6f3006d905506} 2025/09/12 02:43:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5912d500, StatelessResetToken: 0x8e0b201920f61cfe15f04309b5ebc959} 2025/09/12 02:43:34 server -> &wire.NewTokenFrame{Token: 0x78690347c39cb3e587d1037d1f4c7089916648d2ab7d9fafe25d3fba6e54b585a6de99b5fdfec21c1f4308b919af9eb8fe10ba2265f43547f4e41aefc08c1ca17a54ce684132ef7ed83c53a5c16a4e1131caa1f2780c39e6a4dfae} 2025/09/12 02:43:34 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:34 server Skipping packet number 23 2025/09/12 02:43:34 server -> Sending packet 25 (1053 bytes) for connection d2b2a664b6d79ddc, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:34 server Short Header{DestConnectionID: 1a8c7c852bc77114, PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:34 server <- Received Initial packet. 2025/09/12 02:43:34 Created qlog file: /logs/qlog/7527fecf1cbb6195.sqlog 2025/09/12 02:43:34 server Changing connection ID to e1c5d23b. 2025/09/12 02:43:34 Adding connection IDs 7527fecf1cbb6195 and e1c5d23b for a new connection. 2025/09/12 02:43:34 server <- Reading packet 90500 (1252 bytes) for connection 7527fecf1cbb6195, Initial 2025/09/12 02:43:34 server Long Header{Type: Initial, DestConnectionID: 7527fecf1cbb6195, SrcConnectionID: 1a491d3fadba225e, Token: 0x914e1de2ebc3da9da09017299f0681e05fa88c365e6b2e9966bc13c7ac0ebe35be89efa6c90cf414cbed20f349d33a3849acb9e56cb5cf3aaca42fff116813b194eba04f6c18ce8509e31881067b7199f8656ae8ac7f8b37bb871f, PacketNumber: 90500, PacketNumberLen: 4, Length: 1134, Version: v1} 2025/09/12 02:43:34 server <- &wire.PingFrame{} 2025/09/12 02:43:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:34 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:34 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:34 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:34 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 1a491d3fadba225e, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:34 Adding connection ID c9e327ae. 2025/09/12 02:43:34 Adding connection ID a194da14. 2025/09/12 02:43:34 Adding connection ID 50e3bf6d. 2025/09/12 02:43:34 Adding connection ID 8f9b6348. 2025/09/12 02:43:34 Adding connection ID 0c051b4b. 2025/09/12 02:43:34 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7527fecf1cbb6195 2025/09/12 02:43:34 server Long Header{Type: Initial, DestConnectionID: 1a491d3fadba225e, SrcConnectionID: e1c5d23b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 908, Version: v1} 2025/09/12 02:43:34 server -> &wire.AckFrame{LargestAcked: 90500, LowestAcked: 90500, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:34 server Long Header{Type: Handshake, DestConnectionID: 1a491d3fadba225e, SrcConnectionID: e1c5d23b, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/09/12 02:43:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/09/12 02:43:34 server Short Header{DestConnectionID: 1a491d3fadba225e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 50e3bf6d, StatelessResetToken: 0x907987d4218479d3743486b42415a3d7} 2025/09/12 02:43:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a194da14, StatelessResetToken: 0x839590beb7673b7034b482ebd0e63d7c} 2025/09/12 02:43:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c9e327ae, StatelessResetToken: 0x949b3990755f94215056136629fde4ec} 2025/09/12 02:43:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 0c051b4b, StatelessResetToken: 0x22b0cdc34c7318c2732b0eda467aa03c} 2025/09/12 02:43:34 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8f9b6348, StatelessResetToken: 0xcd5178811903e9a626b5f623fb3c54d7} 2025/09/12 02:43:34 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:34 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:34 server Queueing packet (183 bytes) for later decryption 2025/09/12 02:43:34 server <- Reading packet 2 (183 bytes) for connection e1c5d23b, Handshake 2025/09/12 02:43:34 server Long Header{Type: Handshake, DestConnectionID: e1c5d23b, SrcConnectionID: 1a491d3fadba225e, PacketNumber: 2, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:34 server Dropping Initial keys. 2025/09/12 02:43:34 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:34 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:34 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 251.312ms} 2025/09/12 02:43:34 server newly acked packets (1): [0] 2025/09/12 02:43:34 server updated RTT: 283.165706ms (σ: 141.582853ms) 2025/09/12 02:43:34 server Canceling loss detection timer. 2025/09/12 02:43:34 server Dropping Handshake keys. 2025/09/12 02:43:34 server -> Sending packet 1 (296 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:34 server Short Header{DestConnectionID: 1a491d3fadba225e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:34 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:34 server -> &wire.NewTokenFrame{Token: 0x3af77ec960847c6b4142a8489d5a58a161d36fef4ceda2d550170ab7e4b5f9a0c8f50fc19510bb936505e1935c6c457b3ee9f03680cf25490aee07f5356b953f1726e2999ccda4f4b7efa53ab791d32f2cb1ce064e790d2d30cbf5} 2025/09/12 02:43:34 server <- Reading packet 1 (55 bytes) for connection e1c5d23b, 1-RTT 2025/09/12 02:43:34 server Short Header{DestConnectionID: e1c5d23b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:34 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:34 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:34 server <- Reading packet 2 (55 bytes) for connection e1c5d23b, 1-RTT 2025/09/12 02:43:34 server Short Header{DestConnectionID: e1c5d23b, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:34 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.056ms} 2025/09/12 02:43:34 server newly acked packets (1): [0] 2025/09/12 02:43:34 server updated RTT: 251.858ms (σ: 168.799ms) 2025/09/12 02:43:34 server <- Reading packet 3 (183 bytes) for connection e1c5d23b, 1-RTT 2025/09/12 02:43:34 server Short Header{DestConnectionID: e1c5d23b, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:34 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 999d465d3770fca2, StatelessResetToken: 0x5d8b7ba5d4b62f201fa6a920ae1f4857} 2025/09/12 02:43:34 Received request: GET /coogfqvaea 2025/09/12 02:43:34 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a67649742c82109a, StatelessResetToken: 0x99d0a71edfcb906594cbc227a324c622} 2025/09/12 02:43:34 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0f73e1f9d1ae484b, StatelessResetToken: 0x3da5d9fe57318bd826d5c6633b511956} 2025/09/12 02:43:34 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 168.28ms} 2025/09/12 02:43:34 server -> Sending packet 2 (38 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:34 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:34 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 83.438482ms, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:34 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:34 server -> Sending packet 3 (1053 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:34 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:34 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:34 server <- Reading packet 4 (183 bytes) for connection e1c5d23b, 1-RTT 2025/09/12 02:43:34 server Short Header{DestConnectionID: e1c5d23b, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:34 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:34 server newly acked packets (1): [2] 2025/09/12 02:43:34 server updated RTT: 224.226ms (σ: 181.863ms) 2025/09/12 02:43:34 server ECN capability confirmed. 2025/09/12 02:43:34 server setting loss timer for packet 1 (1-RTT) to 252.25425ms (in 2025-09-12 02:43:34.914368243 +0000 UTC m=+31.102518888) 2025/09/12 02:43:34 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 537eecb51081c98b, StatelessResetToken: 0x2615374fc5e86eaf3033e15574958051} 2025/09/12 02:43:34 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:34 server Ignoring all packets below 4. 2025/09/12 02:43:34 server Sending ACK because the ACK timer expired. 2025/09/12 02:43:34 server -> Sending packet 4 (36 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:34 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:34 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 25.329501ms, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:34 server Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 02:43:34.914368243 +0000 UTC m=+31.102518888 2025/09/12 02:43:34 server lost packet 1 (time threshold) 2025/09/12 02:43:34 server -> Sending packet 5 (296 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:34 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:34 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:34 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:34 server -> &wire.NewTokenFrame{Token: 0x3af77ec960847c6b4142a8489d5a58a161d36fef4ceda2d550170ab7e4b5f9a0c8f50fc19510bb936505e1935c6c457b3ee9f03680cf25490aee07f5356b953f1726e2999ccda4f4b7efa53ab791d32f2cb1ce064e790d2d30cbf5} 2025/09/12 02:43:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:35 server -> Sending packet 7 (1053 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:35 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:35 server Skipping packet number 6 2025/09/12 02:43:35 server -> Sending packet 8 (296 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:35 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:35 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:35 server -> &wire.NewTokenFrame{Token: 0x3af77ec960847c6b4142a8489d5a58a161d36fef4ceda2d550170ab7e4b5f9a0c8f50fc19510bb936505e1935c6c457b3ee9f03680cf25490aee07f5356b953f1726e2999ccda4f4b7efa53ab791d32f2cb1ce064e790d2d30cbf5} 2025/09/12 02:43:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:35 server -> Sending packet 9 (1360 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:35 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:35 server -> &wire.PingFrame{} 2025/09/12 02:43:36 server <- Received Initial packet. 2025/09/12 02:43:36 Created qlog file: /logs/qlog/4f9ab974eb3a3043.sqlog 2025/09/12 02:43:36 server Changing connection ID to 32191f59. 2025/09/12 02:43:36 Adding connection IDs 4f9ab974eb3a3043 and 32191f59 for a new connection. 2025/09/12 02:43:36 server <- Reading packet 69313 (1252 bytes) for connection 4f9ab974eb3a3043, Initial 2025/09/12 02:43:36 server Long Header{Type: Initial, DestConnectionID: 4f9ab974eb3a3043, SrcConnectionID: c9778b4d0545bfbe, Token: 0x3af77ec960847c6b4142a8489d5a58a161d36fef4ceda2d550170ab7e4b5f9a0c8f50fc19510bb936505e1935c6c457b3ee9f03680cf25490aee07f5356b953f1726e2999ccda4f4b7efa53ab791d32f2cb1ce064e790d2d30cbf5, PacketNumber: 69313, PacketNumberLen: 4, Length: 1134, Version: v1} 2025/09/12 02:43:36 server <- &wire.PingFrame{} 2025/09/12 02:43:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:36 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:36 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:36 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:36 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c9778b4d0545bfbe, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:36 Adding connection ID 30c50aae. 2025/09/12 02:43:36 Adding connection ID 99202ec9. 2025/09/12 02:43:36 Adding connection ID e80e2c9d. 2025/09/12 02:43:36 Adding connection ID e87384f8. 2025/09/12 02:43:36 Adding connection ID 658bd165. 2025/09/12 02:43:36 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4f9ab974eb3a3043 2025/09/12 02:43:36 server Long Header{Type: Initial, DestConnectionID: c9778b4d0545bfbe, SrcConnectionID: 32191f59, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 916, Version: v1} 2025/09/12 02:43:36 server -> &wire.AckFrame{LargestAcked: 69313, LowestAcked: 69313, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:36 server Long Header{Type: Handshake, DestConnectionID: c9778b4d0545bfbe, SrcConnectionID: 32191f59, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/09/12 02:43:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/09/12 02:43:36 server Short Header{DestConnectionID: c9778b4d0545bfbe, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 99202ec9, StatelessResetToken: 0x12b383725803351fc59d584ad3eafcee} 2025/09/12 02:43:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e80e2c9d, StatelessResetToken: 0x31a117b280b1855537afcbed4092ceae} 2025/09/12 02:43:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e87384f8, StatelessResetToken: 0xc8de571f88ab580f553add1def0592a0} 2025/09/12 02:43:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 658bd165, StatelessResetToken: 0xd40863ef10ab2d4b455cc51fe0b0a349} 2025/09/12 02:43:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 30c50aae, StatelessResetToken: 0x111050b78b819086ffeaa2ba9476dec9} 2025/09/12 02:43:36 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:36 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:36 server <- Reading packet 1 (183 bytes) for connection 32191f59, Handshake 2025/09/12 02:43:36 server Long Header{Type: Handshake, DestConnectionID: 32191f59, SrcConnectionID: c9778b4d0545bfbe, PacketNumber: 1, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:36 server Dropping Initial keys. 2025/09/12 02:43:36 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:36 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:36 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 84.096ms} 2025/09/12 02:43:36 server newly acked packets (1): [0] 2025/09/12 02:43:36 server updated RTT: 116.028091ms (σ: 58.014045ms) 2025/09/12 02:43:36 server Canceling loss detection timer. 2025/09/12 02:43:36 server Dropping Handshake keys. 2025/09/12 02:43:36 server -> Sending packet 1 (296 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:36 server Short Header{DestConnectionID: c9778b4d0545bfbe, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:36 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:36 server -> &wire.NewTokenFrame{Token: 0x0479e42343b24fc688533d44f8759e3c27a5a052d898232d8625a00d3aaeadb344bc06a7c9be257002ad41fe99133bd54f1a38b04ba3585733bc6ea92a5a984a80553af3d5548de732fd42da3e7edf842fdc115d6f9c6b4a43629e} 2025/09/12 02:43:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:36 server <- Reading packet 1 (55 bytes) for connection 32191f59, 1-RTT 2025/09/12 02:43:36 server Short Header{DestConnectionID: 32191f59, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:36 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:36 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:36 server <- Reading packet 2 (55 bytes) for connection 32191f59, 1-RTT 2025/09/12 02:43:36 server Short Header{DestConnectionID: 32191f59, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:36 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.072ms} 2025/09/12 02:43:36 server newly acked packets (1): [0] 2025/09/12 02:43:36 Received request: GET /qvpvwbwoni 2025/09/12 02:43:36 server updated RTT: 105.617ms (σ: 64.332ms) 2025/09/12 02:43:36 server -> Sending packet 2 (36 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:36 server Short Header{DestConnectionID: c9778b4d0545bfbe, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:36 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 83.662664ms, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:36 server -> Sending packet 3 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:36 server Short Header{DestConnectionID: c9778b4d0545bfbe, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:36 Removing connection IDs [8198b2af 092d7c5f deab5ba5 17f7d4f7 04198be3 fa207d37 1ed72c58c8002faa] for a closed connection after it has been retired. 2025/09/12 02:43:36 server <- Reading packet 3 (55 bytes) for connection 32191f59, 1-RTT 2025/09/12 02:43:36 server Short Header{DestConnectionID: 32191f59, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:36 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 40µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:36 server newly acked packets (1): [1] 2025/09/12 02:43:36 server ECN capability confirmed. 2025/09/12 02:43:36 server <- Reading packet 5 (183 bytes) for connection 32191f59, 1-RTT 2025/09/12 02:43:36 server Short Header{DestConnectionID: 32191f59, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:36 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 07f848ed7788d5d0, StatelessResetToken: 0x75e4c309050b400732ec835473e4a376} 2025/09/12 02:43:36 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9b70607e9823eacc, StatelessResetToken: 0x1ae1104774651b0c26caa3aba4d9a6e2} 2025/09/12 02:43:36 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d9d6bc98f5d85a75, StatelessResetToken: 0x9f2e81d055f5ef96c2a317ee2f32dbf2} 2025/09/12 02:43:36 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 189.76ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:36 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:36 server -> Sending packet 4 (39 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:36 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:36 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 118.603µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:36 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:37 server <- Reading packet 7 (183 bytes) for connection 32191f59, 1-RTT 2025/09/12 02:43:37 server Short Header{DestConnectionID: 32191f59, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 91c8e0d6077be9f1, StatelessResetToken: 0x29eafee39f1f3c95e2414aeda6a62ecc} 2025/09/12 02:43:37 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 143.744ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:37 server newly acked packets (1): [4] 2025/09/12 02:43:37 server updated RTT: 112.993ms (σ: 63.001ms) 2025/09/12 02:43:37 server lost packet 3 (time threshold) 2025/09/12 02:43:37 server Canceling loss detection timer. 2025/09/12 02:43:37 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:37 server Ignoring all packets below 6. 2025/09/12 02:43:37 server -> Sending packet 5 (1061 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 162.856µs, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 02:43:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:37 Removing connection ID 7527fecf1cbb6195. 2025/09/12 02:43:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:37 server -> Sending packet 7 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:37 server -> Sending packet 8 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:37 server -> Sending packet 9 (1360 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.PingFrame{} 2025/09/12 02:43:37 server <- Received Initial packet. 2025/09/12 02:43:37 Created qlog file: /logs/qlog/fe69b6e13c9cb30d.sqlog 2025/09/12 02:43:37 server Changing connection ID to bbd1984a. 2025/09/12 02:43:37 Adding connection IDs fe69b6e13c9cb30d and bbd1984a for a new connection. 2025/09/12 02:43:37 server <- Reading packet 76289 (1252 bytes) for connection fe69b6e13c9cb30d, Initial 2025/09/12 02:43:37 server Long Header{Type: Initial, DestConnectionID: fe69b6e13c9cb30d, SrcConnectionID: a8febf9a9d6a4cf0, Token: 0x0479e42343b24fc688533d44f8759e3c27a5a052d898232d8625a00d3aaeadb344bc06a7c9be257002ad41fe99133bd54f1a38b04ba3585733bc6ea92a5a984a80553af3d5548de732fd42da3e7edf842fdc115d6f9c6b4a43629e, PacketNumber: 76289, PacketNumberLen: 4, Length: 1134, Version: v1} 2025/09/12 02:43:37 server <- &wire.PingFrame{} 2025/09/12 02:43:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a8febf9a9d6a4cf0, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:37 Adding connection ID 0f621dc3. 2025/09/12 02:43:37 Adding connection ID ff3431f2. 2025/09/12 02:43:37 Adding connection ID e6c7ad02. 2025/09/12 02:43:37 Adding connection ID 1382b80b. 2025/09/12 02:43:37 Adding connection ID fde64afe. 2025/09/12 02:43:37 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection fe69b6e13c9cb30d 2025/09/12 02:43:37 server Long Header{Type: Initial, DestConnectionID: a8febf9a9d6a4cf0, SrcConnectionID: bbd1984a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 909, Version: v1} 2025/09/12 02:43:37 server -> &wire.AckFrame{LargestAcked: 76289, LowestAcked: 76289, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:37 server Long Header{Type: Handshake, DestConnectionID: a8febf9a9d6a4cf0, SrcConnectionID: bbd1984a, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/09/12 02:43:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/09/12 02:43:37 server Short Header{DestConnectionID: a8febf9a9d6a4cf0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: fde64afe, StatelessResetToken: 0x6d5556b966c7f8935eda6987117a0bf4} 2025/09/12 02:43:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0f621dc3, StatelessResetToken: 0x1da1341ed332fac041522c684806ea78} 2025/09/12 02:43:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1382b80b, StatelessResetToken: 0x6e1074a8164c097c27fd5e78af4cc994} 2025/09/12 02:43:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e6c7ad02, StatelessResetToken: 0x4a50c0a50f1e6aec335b899da864f9f8} 2025/09/12 02:43:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ff3431f2, StatelessResetToken: 0x556468854a96acef97e244633e7ef751} 2025/09/12 02:43:37 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:37 server <- Reading packet 0 (85 bytes) for connection bbd1984a, Handshake 2025/09/12 02:43:37 server Long Header{Type: Handshake, DestConnectionID: bbd1984a, SrcConnectionID: a8febf9a9d6a4cf0, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:37 server Dropping Initial keys. 2025/09/12 02:43:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416µs} 2025/09/12 02:43:37 server newly acked packets (1): [0] 2025/09/12 02:43:37 server updated RTT: 32.405454ms (σ: 16.202727ms) 2025/09/12 02:43:37 server Canceling loss detection timer. 2025/09/12 02:43:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:37 server Dropping Handshake keys. 2025/09/12 02:43:37 server <- Reading packet 0 (183 bytes) for connection bbd1984a, 1-RTT 2025/09/12 02:43:37 server Short Header{DestConnectionID: bbd1984a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fce996cd10c48018, StatelessResetToken: 0xe5b0b93d8e17793887dfc531073a90af} 2025/09/12 02:43:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6d8f26e199d3c316, StatelessResetToken: 0xedddea20ff3455a24adad0f6261fa497} 2025/09/12 02:43:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 49c2e99911ef1a3f, StatelessResetToken: 0xb08cbbf06e1b11271ba28c98f836cfeb} 2025/09/12 02:43:37 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:37 server -> Sending packet 1 (305 bytes) for connection fe69b6e13c9cb30d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: fce996cd10c48018, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 254.927µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:37 server -> &wire.NewTokenFrame{Token: 0x7c54f438ae06d95e317de7d7b3e45e2a21d91dd7b66930968d6b941818dc4f78c0793f3845465e34ea8dbe1535aa5907da7ae818dc99f63c95bf88f7b0fd8273709336ab91a3baddd4a8e9e40a244318a4eb32b815b67977a619} 2025/09/12 02:43:37 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:37 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:37 server <- Reading packet 1 (55 bytes) for connection bbd1984a, 1-RTT 2025/09/12 02:43:37 server Short Header{DestConnectionID: bbd1984a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:37 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:37 Received request: GET /jowhqhqhag 2025/09/12 02:43:37 server -> Sending packet 2 (1061 bytes) for connection fe69b6e13c9cb30d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: fce996cd10c48018, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 438.198µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:37 server <- Reading packet 3 (55 bytes) for connection bbd1984a, 1-RTT 2025/09/12 02:43:37 server Short Header{DestConnectionID: bbd1984a, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 49aed0c8c882c871, StatelessResetToken: 0x62ec04eaa1e1f2732e910af9e0333510} 2025/09/12 02:43:37 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:37 server -> Sending packet 3 (37 bytes) for connection fe69b6e13c9cb30d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: fce996cd10c48018, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 99.607µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:37 server <- Reading packet 4 (33 bytes) for connection bbd1984a, 1-RTT 2025/09/12 02:43:37 server Short Header{DestConnectionID: bbd1984a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:37 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 120µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:37 server newly acked packets (3): [0 1 2] 2025/09/12 02:43:37 server updated RTT: 32.307ms (σ: 12.345ms) 2025/09/12 02:43:37 server ECN capability confirmed. 2025/09/12 02:43:37 server Canceling loss detection timer. 2025/09/12 02:43:37 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:37 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:37 Replacing connection for connection IDs [bbd1984a 0f621dc3 ff3431f2 e6c7ad02 1382b80b fde64afe fe69b6e13c9cb30d] with a closed connection. 2025/09/12 02:43:37 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:37 server Connection fe69b6e13c9cb30d closed. 2025/09/12 02:43:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/09/12 02:43:37 server -> Sending packet 27 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:37 server -> Sending packet 28 (1053 bytes) for connection 77bd5bdb6c05d96e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: df2e3ebdc8def841, PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:37 Removing connection ID 4f9ab974eb3a3043. 2025/09/12 02:43:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:43:37 server -> Sending packet 11 (1053 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:37 server Skipping packet number 10 2025/09/12 02:43:37 server -> Sending packet 12 (296 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:37 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:37 server -> &wire.NewTokenFrame{Token: 0x3af77ec960847c6b4142a8489d5a58a161d36fef4ceda2d550170ab7e4b5f9a0c8f50fc19510bb936505e1935c6c457b3ee9f03680cf25490aee07f5356b953f1726e2999ccda4f4b7efa53ab791d32f2cb1ce064e790d2d30cbf5} 2025/09/12 02:43:37 Removing connection IDs [bbd1984a 0f621dc3 ff3431f2 e6c7ad02 1382b80b fde64afe fe69b6e13c9cb30d] for a closed connection after it has been retired. 2025/09/12 02:43:37 server <- Received Initial packet. 2025/09/12 02:43:37 Created qlog file: /logs/qlog/c2531b800a5017f0.sqlog 2025/09/12 02:43:37 server Changing connection ID to a6838a99. 2025/09/12 02:43:37 Adding connection IDs c2531b800a5017f0 and a6838a99 for a new connection. 2025/09/12 02:43:37 server <- Reading packet 73518 (1252 bytes) for connection c2531b800a5017f0, Initial 2025/09/12 02:43:37 server Long Header{Type: Initial, DestConnectionID: c2531b800a5017f0, SrcConnectionID: f8f8cc71a89138f2, Token: 0x7c54f438ae06d95e317de7d7b3e45e2a21d91dd7b66930968d6b941818dc4f78c0793f3845465e34ea8dbe1535aa5907da7ae818dc99f63c95bf88f7b0fd8273709336ab91a3baddd4a8e9e40a244318a4eb32b815b67977a619, PacketNumber: 73518, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:37 server <- &wire.PingFrame{} 2025/09/12 02:43:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f8f8cc71a89138f2, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:37 Adding connection ID 2f24e71e. 2025/09/12 02:43:37 Adding connection ID 7ce6eeb1. 2025/09/12 02:43:37 Adding connection ID 365f91de. 2025/09/12 02:43:37 Adding connection ID ea903e77. 2025/09/12 02:43:37 Adding connection ID 912c2648. 2025/09/12 02:43:37 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c2531b800a5017f0 2025/09/12 02:43:37 server Long Header{Type: Initial, DestConnectionID: f8f8cc71a89138f2, SrcConnectionID: a6838a99, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 916, Version: v1} 2025/09/12 02:43:37 server -> &wire.AckFrame{LargestAcked: 73518, LowestAcked: 73518, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:37 server Long Header{Type: Handshake, DestConnectionID: f8f8cc71a89138f2, SrcConnectionID: a6838a99, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/09/12 02:43:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/09/12 02:43:37 server Short Header{DestConnectionID: f8f8cc71a89138f2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7ce6eeb1, StatelessResetToken: 0x329ed92647b009ba7cc46601c1d32449} 2025/09/12 02:43:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 912c2648, StatelessResetToken: 0x70dd64c8e4514c0656241bf6a5ed8870} 2025/09/12 02:43:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ea903e77, StatelessResetToken: 0x21c7ee572680a3a470c7677d7574ce93} 2025/09/12 02:43:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2f24e71e, StatelessResetToken: 0x1831638aaa533d8ce9283dbd0bc303ec} 2025/09/12 02:43:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 365f91de, StatelessResetToken: 0x1fc35d222659a4d00614f30c71eb9341} 2025/09/12 02:43:37 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:37 server <- Reading packet 0 (85 bytes) for connection a6838a99, Handshake 2025/09/12 02:43:37 server Long Header{Type: Handshake, DestConnectionID: a6838a99, SrcConnectionID: f8f8cc71a89138f2, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:37 server Dropping Initial keys. 2025/09/12 02:43:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 384µs} 2025/09/12 02:43:37 server newly acked packets (1): [0] 2025/09/12 02:43:37 server updated RTT: 32.359503ms (σ: 16.179751ms) 2025/09/12 02:43:37 server Canceling loss detection timer. 2025/09/12 02:43:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:37 server Dropping Handshake keys. 2025/09/12 02:43:37 server <- Reading packet 0 (183 bytes) for connection a6838a99, 1-RTT 2025/09/12 02:43:37 server Short Header{DestConnectionID: a6838a99, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c7d971f3f7889c25, StatelessResetToken: 0x8b5bda961894e6ad67fe6762150f55c4} 2025/09/12 02:43:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f660c1c22a8f2e06, StatelessResetToken: 0x13b243da312af0fa8e6a3e8622a031ed} 2025/09/12 02:43:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b209e42e1407c6d1, StatelessResetToken: 0x43eda19283f0ec5e5f28bdcc5a327d6f} 2025/09/12 02:43:37 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:37 server <- Reading packet 1 (55 bytes) for connection a6838a99, 1-RTT 2025/09/12 02:43:37 server Short Header{DestConnectionID: a6838a99, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:37 server -> Sending packet 1 (305 bytes) for connection c2531b800a5017f0, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: c7d971f3f7889c25, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 374.089µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:37 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:37 server -> &wire.NewTokenFrame{Token: 0xfc765630b804d8f69c962a567c4b50e4f423ab6e8887d834c8e475eccda48f86490f27c6e52931299da63178f551c2feff9599ec23fb4aac7bb86d6c832fb5964bd5c8de8f5c3ffc059d84504b3b726070bb21b4bfa2a0a14bf8} 2025/09/12 02:43:37 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:37 Received request: GET /jhkyyppxtd 2025/09/12 02:43:37 server -> Sending packet 2 (1053 bytes) for connection c2531b800a5017f0, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: c7d971f3f7889c25, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:37 server <- Reading packet 3 (55 bytes) for connection a6838a99, 1-RTT 2025/09/12 02:43:37 server Short Header{DestConnectionID: a6838a99, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ac80a46675fa2515, StatelessResetToken: 0x617fd3b99f630fefd83081a8d3e412a5} 2025/09/12 02:43:37 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:37 server -> Sending packet 3 (37 bytes) for connection c2531b800a5017f0, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:37 server Short Header{DestConnectionID: c7d971f3f7889c25, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:37 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 76.193µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:37 server <- Reading packet 4 (55 bytes) for connection a6838a99, 1-RTT 2025/09/12 02:43:37 server Short Header{DestConnectionID: a6838a99, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:37 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 3.992ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:37 server newly acked packets (2): [0 1] 2025/09/12 02:43:37 server updated RTT: 32.676ms (σ: 12.768ms) 2025/09/12 02:43:37 server ECN capability confirmed. 2025/09/12 02:43:37 server Ignoring all packets below 2. 2025/09/12 02:43:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:38 server -> Sending packet 5 (1053 bytes) for connection c2531b800a5017f0, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:38 server Short Header{DestConnectionID: c7d971f3f7889c25, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:38 server -> Sending packet 6 (1053 bytes) for connection c2531b800a5017f0, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:38 server Short Header{DestConnectionID: c7d971f3f7889c25, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:38 server <- Reading packet 5 (37 bytes) for connection a6838a99, 1-RTT 2025/09/12 02:43:38 server Short Header{DestConnectionID: a6838a99, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:38 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 112µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:38 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:38 Replacing connection for connection IDs [365f91de ea903e77 912c2648 a6838a99 2f24e71e 7ce6eeb1 c2531b800a5017f0] with a closed connection. 2025/09/12 02:43:38 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:38 server Connection c2531b800a5017f0 closed. 2025/09/12 02:43:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:43:38 server -> Sending packet 11 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:38 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:38 server -> Sending packet 12 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:38 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:38 Removing connection IDs [365f91de ea903e77 912c2648 a6838a99 2f24e71e 7ce6eeb1 c2531b800a5017f0] for a closed connection after it has been retired. 2025/09/12 02:43:39 server <- Received Initial packet. 2025/09/12 02:43:39 Created qlog file: /logs/qlog/9b31eb417f62872d.sqlog 2025/09/12 02:43:39 server Changing connection ID to 27e28c4b. 2025/09/12 02:43:39 Adding connection IDs 9b31eb417f62872d and 27e28c4b for a new connection. 2025/09/12 02:43:39 server <- Reading packet 115804 (1252 bytes) for connection 9b31eb417f62872d, Initial 2025/09/12 02:43:39 server Long Header{Type: Initial, DestConnectionID: 9b31eb417f62872d, SrcConnectionID: 37a71fd767910792, Token: 0xfc765630b804d8f69c962a567c4b50e4f423ab6e8887d834c8e475eccda48f86490f27c6e52931299da63178f551c2feff9599ec23fb4aac7bb86d6c832fb5964bd5c8de8f5c3ffc059d84504b3b726070bb21b4bfa2a0a14bf8, PacketNumber: 115804, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:39 server <- &wire.PingFrame{} 2025/09/12 02:43:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 37a71fd767910792, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:39 Adding connection ID 08b88d48. 2025/09/12 02:43:39 Adding connection ID 65c3ead9. 2025/09/12 02:43:39 Adding connection ID 22c0953e. 2025/09/12 02:43:39 Adding connection ID 932e0616. 2025/09/12 02:43:39 Adding connection ID 7660eac7. 2025/09/12 02:43:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9b31eb417f62872d 2025/09/12 02:43:39 server Long Header{Type: Initial, DestConnectionID: 37a71fd767910792, SrcConnectionID: 27e28c4b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 917, Version: v1} 2025/09/12 02:43:39 server -> &wire.AckFrame{LargestAcked: 115804, LowestAcked: 115804, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:39 server Long Header{Type: Handshake, DestConnectionID: 37a71fd767910792, SrcConnectionID: 27e28c4b, PacketNumber: 0, PacketNumberLen: 2, Length: 173, Version: v1} 2025/09/12 02:43:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/09/12 02:43:39 server Short Header{DestConnectionID: 37a71fd767910792, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 65c3ead9, StatelessResetToken: 0x011f1b295705a1cef7f0e32480419b87} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22c0953e, StatelessResetToken: 0xe4220adadf897508b1c35dfbaca106a1} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 932e0616, StatelessResetToken: 0xa92afbc2ac68863bea1231ebcde0456f} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 7660eac7, StatelessResetToken: 0xda4f4e508bb196dab623e72e91bcf5e5} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 08b88d48, StatelessResetToken: 0xc5fb9ca0c2c064dd9440e69a23266c00} 2025/09/12 02:43:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:39 server -> Sending packet 1 (1280 bytes) for connection 9b31eb417f62872d, Initial 2025/09/12 02:43:39 server Long Header{Type: Initial, DestConnectionID: 37a71fd767910792, SrcConnectionID: 27e28c4b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:39 server -> Sending packet 2 (1280 bytes) for connection 9b31eb417f62872d, Initial 2025/09/12 02:43:39 server Long Header{Type: Initial, DestConnectionID: 37a71fd767910792, SrcConnectionID: 27e28c4b, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:39 server -> Sending packet 1 (194 bytes) for connection 9b31eb417f62872d, Handshake 2025/09/12 02:43:39 server Long Header{Type: Handshake, DestConnectionID: 37a71fd767910792, SrcConnectionID: 27e28c4b, PacketNumber: 1, PacketNumberLen: 2, Length: 173, Version: v1} 2025/09/12 02:43:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/09/12 02:43:39 server -> Sending packet 2 (194 bytes) for connection 9b31eb417f62872d, Handshake 2025/09/12 02:43:39 server Long Header{Type: Handshake, DestConnectionID: 37a71fd767910792, SrcConnectionID: 27e28c4b, PacketNumber: 2, PacketNumberLen: 2, Length: 173, Version: v1} 2025/09/12 02:43:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/09/12 02:43:39 server <- Reading packet 0 (42 bytes) for connection 27e28c4b, Handshake 2025/09/12 02:43:39 server Long Header{Type: Handshake, DestConnectionID: 27e28c4b, SrcConnectionID: 37a71fd767910792, PacketNumber: 0, PacketNumberLen: 4, Length: 21, Version: v1} 2025/09/12 02:43:39 server Dropping Initial keys. 2025/09/12 02:43:39 server <- &wire.PingFrame{} 2025/09/12 02:43:39 server -> Sending packet 3 (47 bytes) for connection 9b31eb417f62872d, Handshake 2025/09/12 02:43:39 server Long Header{Type: Handshake, DestConnectionID: 37a71fd767910792, SrcConnectionID: 27e28c4b, PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 02:43:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:39 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:43:39 server -> Sending packet 4 (194 bytes) for connection 9b31eb417f62872d, Handshake 2025/09/12 02:43:39 server Long Header{Type: Handshake, DestConnectionID: 37a71fd767910792, SrcConnectionID: 27e28c4b, PacketNumber: 4, PacketNumberLen: 2, Length: 173, Version: v1} 2025/09/12 02:43:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/09/12 02:43:39 server -> Sending packet 5 (194 bytes) for connection 9b31eb417f62872d, Handshake 2025/09/12 02:43:39 server Long Header{Type: Handshake, DestConnectionID: 37a71fd767910792, SrcConnectionID: 27e28c4b, PacketNumber: 5, PacketNumberLen: 2, Length: 173, Version: v1} 2025/09/12 02:43:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/09/12 02:43:39 server <- Reading packet 2 (55 bytes) for connection 27e28c4b, Handshake 2025/09/12 02:43:39 server Long Header{Type: Handshake, DestConnectionID: 27e28c4b, SrcConnectionID: 37a71fd767910792, PacketNumber: 2, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:39 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 48µs} 2025/09/12 02:43:39 server newly acked packets (1): [5] 2025/09/12 02:43:39 server updated RTT: 31.065009ms (σ: 15.532504ms) 2025/09/12 02:43:39 server Canceling loss detection timer. 2025/09/12 02:43:39 server <- Reading packet 3 (183 bytes) for connection 27e28c4b, Handshake 2025/09/12 02:43:39 server Long Header{Type: Handshake, DestConnectionID: 27e28c4b, SrcConnectionID: 37a71fd767910792, PacketNumber: 3, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:39 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 206.288ms} 2025/09/12 02:43:39 server Dropping Handshake keys. 2025/09/12 02:43:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:39 server -> Sending packet 2 (415 bytes) for connection 9b31eb417f62872d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:39 server Short Header{DestConnectionID: 37a71fd767910792, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 08b88d48, StatelessResetToken: 0xc5fb9ca0c2c064dd9440e69a23266c00} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22c0953e, StatelessResetToken: 0xe4220adadf897508b1c35dfbaca106a1} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 65c3ead9, StatelessResetToken: 0x011f1b295705a1cef7f0e32480419b87} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 7660eac7, StatelessResetToken: 0xda4f4e508bb196dab623e72e91bcf5e5} 2025/09/12 02:43:39 server -> &wire.NewTokenFrame{Token: 0xca3e45795ecd3ba5d2b9ad13d8bc3558e3c9ca3a626c106748bb53ef995a95a42dd4e8798b98192c22714605f6246893de15f7111c860db6e8d302ae7b77fd3a9bdf42f3f9587b1d8158571b6f5aae7673706625ae3e12b1ffb6} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 932e0616, StatelessResetToken: 0xa92afbc2ac68863bea1231ebcde0456f} 2025/09/12 02:43:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:39 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:39 server -> Sending packet 3 (415 bytes) for connection 9b31eb417f62872d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:39 server Short Header{DestConnectionID: 37a71fd767910792, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:39 server -> &wire.NewTokenFrame{Token: 0xca3e45795ecd3ba5d2b9ad13d8bc3558e3c9ca3a626c106748bb53ef995a95a42dd4e8798b98192c22714605f6246893de15f7111c860db6e8d302ae7b77fd3a9bdf42f3f9587b1d8158571b6f5aae7673706625ae3e12b1ffb6} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 08b88d48, StatelessResetToken: 0xc5fb9ca0c2c064dd9440e69a23266c00} 2025/09/12 02:43:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:39 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 65c3ead9, StatelessResetToken: 0x011f1b295705a1cef7f0e32480419b87} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 7660eac7, StatelessResetToken: 0xda4f4e508bb196dab623e72e91bcf5e5} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 932e0616, StatelessResetToken: 0xa92afbc2ac68863bea1231ebcde0456f} 2025/09/12 02:43:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22c0953e, StatelessResetToken: 0xe4220adadf897508b1c35dfbaca106a1} 2025/09/12 02:43:39 server <- Reading packet 1 (55 bytes) for connection 27e28c4b, 1-RTT 2025/09/12 02:43:39 server Short Header{DestConnectionID: 27e28c4b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:39 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:39 server -> Sending packet 4 (38 bytes) for connection 9b31eb417f62872d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:39 server Short Header{DestConnectionID: 37a71fd767910792, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 240.031679ms, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:39 Received request: GET /hkqkpyvppb 2025/09/12 02:43:39 server -> Sending packet 5 (1053 bytes) for connection 9b31eb417f62872d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:39 server Short Header{DestConnectionID: 37a71fd767910792, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:39 server <- Reading packet 3 (55 bytes) for connection 27e28c4b, 1-RTT 2025/09/12 02:43:39 server Short Header{DestConnectionID: 27e28c4b, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:39 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 104µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:39 server <- Reading packet 4 (55 bytes) for connection 27e28c4b, 1-RTT 2025/09/12 02:43:39 server Short Header{DestConnectionID: 27e28c4b, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 32µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:39 server newly acked packets (1): [3] 2025/09/12 02:43:39 server ECN capability confirmed. 2025/09/12 02:43:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:39 server -> Sending packet 7 (1053 bytes) for connection 9b31eb417f62872d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:39 server Short Header{DestConnectionID: 37a71fd767910792, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:39 server -> Sending packet 8 (1053 bytes) for connection 9b31eb417f62872d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:39 server Short Header{DestConnectionID: 37a71fd767910792, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:39 server <- Reading packet 6 (25 bytes) for connection 27e28c4b, 1-RTT 2025/09/12 02:43:39 server Short Header{DestConnectionID: 27e28c4b, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:39 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:39 Replacing connection for connection IDs [7660eac7 27e28c4b 08b88d48 65c3ead9 22c0953e 932e0616 9b31eb417f62872d] with a closed connection. 2025/09/12 02:43:39 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:39 server Connection 9b31eb417f62872d closed. 2025/09/12 02:43:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:43:39 server -> Sending packet 14 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:39 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:39 server -> Sending packet 15 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:39 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:39 Removing connection IDs [7660eac7 27e28c4b 08b88d48 65c3ead9 22c0953e 932e0616 9b31eb417f62872d] for a closed connection after it has been retired. 2025/09/12 02:43:40 server <- Received Initial packet. 2025/09/12 02:43:40 Created qlog file: /logs/qlog/d86f9b5763277192.sqlog 2025/09/12 02:43:40 server Changing connection ID to e47e552a. 2025/09/12 02:43:40 Adding connection IDs d86f9b5763277192 and e47e552a for a new connection. 2025/09/12 02:43:40 server <- Reading packet 81728 (1252 bytes) for connection d86f9b5763277192, Initial 2025/09/12 02:43:40 server Long Header{Type: Initial, DestConnectionID: d86f9b5763277192, SrcConnectionID: d4c3708c9ec8abb5, Token: 0xca3e45795ecd3ba5d2b9ad13d8bc3558e3c9ca3a626c106748bb53ef995a95a42dd4e8798b98192c22714605f6246893de15f7111c860db6e8d302ae7b77fd3a9bdf42f3f9587b1d8158571b6f5aae7673706625ae3e12b1ffb6, PacketNumber: 81728, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:40 server <- &wire.PingFrame{} 2025/09/12 02:43:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d4c3708c9ec8abb5, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:40 Adding connection ID 5fc7ef49. 2025/09/12 02:43:40 Adding connection ID f4c30693. 2025/09/12 02:43:40 Adding connection ID d210200e. 2025/09/12 02:43:40 Adding connection ID 4c7eb90d. 2025/09/12 02:43:40 Adding connection ID 2f02feb7. 2025/09/12 02:43:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d86f9b5763277192 2025/09/12 02:43:40 server Long Header{Type: Initial, DestConnectionID: d4c3708c9ec8abb5, SrcConnectionID: e47e552a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 913, Version: v1} 2025/09/12 02:43:40 server -> &wire.AckFrame{LargestAcked: 81728, LowestAcked: 81728, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:40 server Long Header{Type: Handshake, DestConnectionID: d4c3708c9ec8abb5, SrcConnectionID: e47e552a, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:40 server Short Header{DestConnectionID: d4c3708c9ec8abb5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 2f02feb7, StatelessResetToken: 0xa8c263f77d9c76793c04d2d505c12e97} 2025/09/12 02:43:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f4c30693, StatelessResetToken: 0xeffd90cd93a913d58afb4281cbf29663} 2025/09/12 02:43:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5fc7ef49, StatelessResetToken: 0x3776a53efc23268992efe04c4414b1ce} 2025/09/12 02:43:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d210200e, StatelessResetToken: 0x36f8d08f254394e2455dc24871487e6f} 2025/09/12 02:43:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4c7eb90d, StatelessResetToken: 0xe232538fde24a391d811715efef917fd} 2025/09/12 02:43:40 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:40 server <- Reading packet 0 (85 bytes) for connection e47e552a, Handshake 2025/09/12 02:43:40 server Long Header{Type: Handshake, DestConnectionID: e47e552a, SrcConnectionID: d4c3708c9ec8abb5, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:40 server Dropping Initial keys. 2025/09/12 02:43:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 392µs} 2025/09/12 02:43:40 server newly acked packets (1): [0] 2025/09/12 02:43:40 server updated RTT: 32.340346ms (σ: 16.170173ms) 2025/09/12 02:43:40 server Canceling loss detection timer. 2025/09/12 02:43:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:40 server Dropping Handshake keys. 2025/09/12 02:43:40 server <- Reading packet 0 (183 bytes) for connection e47e552a, 1-RTT 2025/09/12 02:43:40 server Short Header{DestConnectionID: e47e552a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f3d5e21bcd38a954, StatelessResetToken: 0x8b10866ca10b7abfec43f90516ab30dd} 2025/09/12 02:43:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2e788b6d095f3d5b, StatelessResetToken: 0x96f2e6a96f19fdf39f674e90c8ed2205} 2025/09/12 02:43:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0f6fe995c0d58cc9, StatelessResetToken: 0x3f780d17f32fd9fbdf722979f0566bbe} 2025/09/12 02:43:40 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:40 server -> Sending packet 1 (305 bytes) for connection d86f9b5763277192, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:40 server Short Header{DestConnectionID: f3d5e21bcd38a954, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 276.358µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:40 server -> &wire.NewTokenFrame{Token: 0x2969386edf4f3ab4ee3ddf248f85ff6b73bbbb1e64aeec1c8c1e7f5dec8ddc9563aae54d634069f8b369dda92495132e4ee7fe515b5882d3cd01f9bec6743f17664d4aa03db16a61f7765884567c154925d052f8ff46ba64a10f} 2025/09/12 02:43:40 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:40 server <- Reading packet 1 (55 bytes) for connection e47e552a, 1-RTT 2025/09/12 02:43:40 server Short Header{DestConnectionID: e47e552a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:40 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:40 Received request: GET /vzfgomfzkh 2025/09/12 02:43:40 server -> Sending packet 2 (1061 bytes) for connection d86f9b5763277192, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:40 server Short Header{DestConnectionID: f3d5e21bcd38a954, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:40 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 399.386µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:40 server <- Reading packet 4 (55 bytes) for connection e47e552a, 1-RTT 2025/09/12 02:43:40 server Short Header{DestConnectionID: e47e552a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:40 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 4.264ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:40 server newly acked packets (2): [0 1] 2025/09/12 02:43:40 server updated RTT: 32.689ms (σ: 12.825ms) 2025/09/12 02:43:40 server ECN capability confirmed. 2025/09/12 02:43:40 server Ignoring all packets below 1. 2025/09/12 02:43:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:40 server -> Sending packet 4 (1053 bytes) for connection d86f9b5763277192, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:40 server Short Header{DestConnectionID: f3d5e21bcd38a954, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:40 server -> Sending packet 5 (1053 bytes) for connection d86f9b5763277192, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:40 server Short Header{DestConnectionID: f3d5e21bcd38a954, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:40 server <- Reading packet 6 (35 bytes) for connection e47e552a, 1-RTT 2025/09/12 02:43:40 server Short Header{DestConnectionID: e47e552a, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:40 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 160µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:40 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:40 Replacing connection for connection IDs [2f02feb7 e47e552a 5fc7ef49 f4c30693 d210200e 4c7eb90d d86f9b5763277192] with a closed connection. 2025/09/12 02:43:40 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:40 server Connection d86f9b5763277192 closed. 2025/09/12 02:43:40 Removing connection IDs [2f02feb7 e47e552a 5fc7ef49 f4c30693 d210200e 4c7eb90d d86f9b5763277192] for a closed connection after it has been retired. 2025/09/12 02:43:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/09/12 02:43:40 server -> Sending packet 26 (297 bytes) for connection eacee66e59396015, 1-RTT (ECN: Not-ECT) 2025/09/12 02:43:40 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:40 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:40 server -> &wire.NewTokenFrame{Token: 0x630f84fc82d7f08738a6bd58713f3770ae01b68b0f870adb1f83f8700c2f9df2c3dbe23e3c97e3821b9fe554435d3f5101629158d5fdad5c6a734f7606dd47c2bd76d0f88a8001e38be090cf52b14c6a79c71343f8d3e51aa95d} 2025/09/12 02:43:40 server Skipping packet number 25 2025/09/12 02:43:40 server -> Sending packet 27 (1053 bytes) for connection eacee66e59396015, 1-RTT (ECN: Not-ECT) 2025/09/12 02:43:40 server Short Header{DestConnectionID: 14ce70efc25e676c, PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:41 server <- Received Initial packet. 2025/09/12 02:43:41 Created qlog file: /logs/qlog/29267025cd9d273f.sqlog 2025/09/12 02:43:41 server Changing connection ID to 1a6b97e9. 2025/09/12 02:43:41 Adding connection IDs 29267025cd9d273f and 1a6b97e9 for a new connection. 2025/09/12 02:43:41 server <- Reading packet 99649 (1252 bytes) for connection 29267025cd9d273f, Initial 2025/09/12 02:43:41 server Long Header{Type: Initial, DestConnectionID: 29267025cd9d273f, SrcConnectionID: b5aa8705971b6851, Token: 0x2969386edf4f3ab4ee3ddf248f85ff6b73bbbb1e64aeec1c8c1e7f5dec8ddc9563aae54d634069f8b369dda92495132e4ee7fe515b5882d3cd01f9bec6743f17664d4aa03db16a61f7765884567c154925d052f8ff46ba64a10f, PacketNumber: 99649, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:41 server <- &wire.PingFrame{} 2025/09/12 02:43:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:41 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:41 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:41 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:41 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: b5aa8705971b6851, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:41 Adding connection ID 618f44a4. 2025/09/12 02:43:41 Adding connection ID b8c94b64. 2025/09/12 02:43:41 Adding connection ID 8a2b9371. 2025/09/12 02:43:41 Adding connection ID 3ae8383a. 2025/09/12 02:43:41 Adding connection ID 72d2437f. 2025/09/12 02:43:41 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 29267025cd9d273f 2025/09/12 02:43:41 server Long Header{Type: Initial, DestConnectionID: b5aa8705971b6851, SrcConnectionID: 1a6b97e9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 919, Version: v1} 2025/09/12 02:43:41 server -> &wire.AckFrame{LargestAcked: 99649, LowestAcked: 99649, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:41 server Long Header{Type: Handshake, DestConnectionID: b5aa8705971b6851, SrcConnectionID: 1a6b97e9, PacketNumber: 0, PacketNumberLen: 2, Length: 171, Version: v1} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/09/12 02:43:41 server Short Header{DestConnectionID: b5aa8705971b6851, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 72d2437f, StatelessResetToken: 0x2ce9d472f5d9ddcad8c844f9c09ffef5} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8c94b64, StatelessResetToken: 0x9489fb0569c408cccce2b0272a66fa9a} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8a2b9371, StatelessResetToken: 0x1e902d09ee6a7f36f0ddd761dd3e7f35} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 618f44a4, StatelessResetToken: 0xe0df983575136bdd0dcf3003b896b5b1} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3ae8383a, StatelessResetToken: 0x87e3c1f9dff8334d1ebf0d6144f2afea} 2025/09/12 02:43:41 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:41 server -> Sending packet 1 (1280 bytes) for connection 29267025cd9d273f, Initial 2025/09/12 02:43:41 server Long Header{Type: Initial, DestConnectionID: b5aa8705971b6851, SrcConnectionID: 1a6b97e9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:41 server -> Sending packet 2 (1280 bytes) for connection 29267025cd9d273f, Initial 2025/09/12 02:43:41 server Long Header{Type: Initial, DestConnectionID: b5aa8705971b6851, SrcConnectionID: 1a6b97e9, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:41 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:41 server -> Sending packet 1 (192 bytes) for connection 29267025cd9d273f, Handshake 2025/09/12 02:43:41 server Long Header{Type: Handshake, DestConnectionID: b5aa8705971b6851, SrcConnectionID: 1a6b97e9, PacketNumber: 1, PacketNumberLen: 2, Length: 171, Version: v1} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/09/12 02:43:41 server -> Sending packet 2 (192 bytes) for connection 29267025cd9d273f, Handshake 2025/09/12 02:43:41 server Long Header{Type: Handshake, DestConnectionID: b5aa8705971b6851, SrcConnectionID: 1a6b97e9, PacketNumber: 2, PacketNumberLen: 2, Length: 171, Version: v1} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/09/12 02:43:41 server <- Reading packet 0 (42 bytes) for connection 1a6b97e9, Handshake 2025/09/12 02:43:41 server Long Header{Type: Handshake, DestConnectionID: 1a6b97e9, SrcConnectionID: b5aa8705971b6851, PacketNumber: 0, PacketNumberLen: 4, Length: 21, Version: v1} 2025/09/12 02:43:41 server Dropping Initial keys. 2025/09/12 02:43:41 server <- &wire.PingFrame{} 2025/09/12 02:43:41 server -> Sending packet 3 (47 bytes) for connection 29267025cd9d273f, Handshake 2025/09/12 02:43:41 server Long Header{Type: Handshake, DestConnectionID: b5aa8705971b6851, SrcConnectionID: 1a6b97e9, PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 02:43:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:41 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:41 server <- Reading packet 1 (85 bytes) for connection 1a6b97e9, Handshake 2025/09/12 02:43:41 server Long Header{Type: Handshake, DestConnectionID: 1a6b97e9, SrcConnectionID: b5aa8705971b6851, PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:41 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 216µs} 2025/09/12 02:43:41 server newly acked packets (1): [2] 2025/09/12 02:43:41 server updated RTT: 31.401331ms (σ: 15.700665ms) 2025/09/12 02:43:41 server Canceling loss detection timer. 2025/09/12 02:43:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:41 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:41 server Dropping Handshake keys. 2025/09/12 02:43:41 server <- Reading packet 0 (183 bytes) for connection 1a6b97e9, 1-RTT 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1a6b97e9, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 04d1850f4d60972f, StatelessResetToken: 0x5c3ea22edb913a3e09356f7af4714d61} 2025/09/12 02:43:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 51d8507b0e5cfd28, StatelessResetToken: 0xa3642b57e0507d40511c97986071e021} 2025/09/12 02:43:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e04903f37a94365b, StatelessResetToken: 0xe761e35518e706e40894a898d0f5aa72} 2025/09/12 02:43:41 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:41 server -> Sending packet 1 (305 bytes) for connection 29267025cd9d273f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 04d1850f4d60972f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 250.389µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:41 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:41 server -> &wire.NewTokenFrame{Token: 0xa0ab6dd09df01e96642839310c293890785ae3ea05c56ed0d09ecd6e47545dd8eb46beb40b5561a5ca9bfc2b1edbc88c769e0143c55bb389e60ddf5f7b41eb3ce97f8077d04c5a295628291eb4624cdc27f261932b72cb5da939} 2025/09/12 02:43:41 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:41 server <- Reading packet 2 (55 bytes) for connection 1a6b97e9, 1-RTT 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1a6b97e9, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2682b93636889468, StatelessResetToken: 0xc25ce898b7c73d8ec50e83d71cfe9e84} 2025/09/12 02:43:41 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:41 server -> Sending packet 2 (37 bytes) for connection 29267025cd9d273f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 04d1850f4d60972f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 72.696µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:41 server <- Reading packet 4 (55 bytes) for connection 1a6b97e9, 1-RTT 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1a6b97e9, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:41 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:41 server -> Sending packet 3 (39 bytes) for connection 29267025cd9d273f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 04d1850f4d60972f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 Received request: GET /hrmidgould 2025/09/12 02:43:41 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 95.44µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:41 server -> Sending packet 4 (1053 bytes) for connection 29267025cd9d273f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 04d1850f4d60972f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:41 server <- Reading packet 5 (33 bytes) for connection 1a6b97e9, 1-RTT 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1a6b97e9, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:41 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 120µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:43:41 server newly acked packets (2): [1 4] 2025/09/12 02:43:41 server updated RTT: 31.422ms (σ: 11.818ms) 2025/09/12 02:43:41 server ECN capability confirmed. 2025/09/12 02:43:41 server lost packet 0 (time threshold) 2025/09/12 02:43:41 server Canceling loss detection timer. 2025/09/12 02:43:41 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:41 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:41 Replacing connection for connection IDs [1a6b97e9 618f44a4 b8c94b64 8a2b9371 3ae8383a 72d2437f 29267025cd9d273f] with a closed connection. 2025/09/12 02:43:41 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:41 server Connection 29267025cd9d273f closed. 2025/09/12 02:43:41 Removing connection IDs [1a6b97e9 618f44a4 b8c94b64 8a2b9371 3ae8383a 72d2437f 29267025cd9d273f] for a closed connection after it has been retired. 2025/09/12 02:43:41 server <- Received Initial packet. 2025/09/12 02:43:41 Created qlog file: /logs/qlog/9d8fb4ffa54c4101.sqlog 2025/09/12 02:43:41 server Changing connection ID to fd1b14c3. 2025/09/12 02:43:41 Adding connection IDs 9d8fb4ffa54c4101 and fd1b14c3 for a new connection. 2025/09/12 02:43:41 server <- Reading packet 106050 (1252 bytes) for connection 9d8fb4ffa54c4101, Initial 2025/09/12 02:43:41 server Long Header{Type: Initial, DestConnectionID: 9d8fb4ffa54c4101, SrcConnectionID: b2c28745d7ee8cca, Token: 0xa0ab6dd09df01e96642839310c293890785ae3ea05c56ed0d09ecd6e47545dd8eb46beb40b5561a5ca9bfc2b1edbc88c769e0143c55bb389e60ddf5f7b41eb3ce97f8077d04c5a295628291eb4624cdc27f261932b72cb5da939, PacketNumber: 106050, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:41 server <- &wire.PingFrame{} 2025/09/12 02:43:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:41 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:41 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:41 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:41 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: b2c28745d7ee8cca, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:41 Adding connection ID 0b6ac5b6. 2025/09/12 02:43:41 Adding connection ID 1bf1deb7. 2025/09/12 02:43:41 Adding connection ID d03d645e. 2025/09/12 02:43:41 Adding connection ID d50ffc01. 2025/09/12 02:43:41 Adding connection ID 2303a5d6. 2025/09/12 02:43:41 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9d8fb4ffa54c4101 2025/09/12 02:43:41 server Long Header{Type: Initial, DestConnectionID: b2c28745d7ee8cca, SrcConnectionID: fd1b14c3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 917, Version: v1} 2025/09/12 02:43:41 server -> &wire.AckFrame{LargestAcked: 106050, LowestAcked: 106050, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:41 server Long Header{Type: Handshake, DestConnectionID: b2c28745d7ee8cca, SrcConnectionID: fd1b14c3, PacketNumber: 0, PacketNumberLen: 2, Length: 173, Version: v1} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/09/12 02:43:41 server Short Header{DestConnectionID: b2c28745d7ee8cca, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d50ffc01, StatelessResetToken: 0x75849b42ea4f38ffc51eb122e51f1b30} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0b6ac5b6, StatelessResetToken: 0xb0a0568ceebde2a0cb29fce8c0e7c239} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 2303a5d6, StatelessResetToken: 0x3fa1451ef77114ffcd2e6b2aea2dd904} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03d645e, StatelessResetToken: 0x324e7d7ba1d2046b32df51c6ff80c921} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1bf1deb7, StatelessResetToken: 0x0268bc9aebc96c9171e1284c3704b5b6} 2025/09/12 02:43:41 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:41 server -> Sending packet 1 (1280 bytes) for connection 9d8fb4ffa54c4101, Initial 2025/09/12 02:43:41 server Long Header{Type: Initial, DestConnectionID: b2c28745d7ee8cca, SrcConnectionID: fd1b14c3, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:41 server -> Sending packet 2 (1280 bytes) for connection 9d8fb4ffa54c4101, Initial 2025/09/12 02:43:41 server Long Header{Type: Initial, DestConnectionID: b2c28745d7ee8cca, SrcConnectionID: fd1b14c3, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:41 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:41 server -> Sending packet 1 (194 bytes) for connection 9d8fb4ffa54c4101, Handshake 2025/09/12 02:43:41 server Long Header{Type: Handshake, DestConnectionID: b2c28745d7ee8cca, SrcConnectionID: fd1b14c3, PacketNumber: 1, PacketNumberLen: 2, Length: 173, Version: v1} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/09/12 02:43:41 server -> Sending packet 2 (194 bytes) for connection 9d8fb4ffa54c4101, Handshake 2025/09/12 02:43:41 server Long Header{Type: Handshake, DestConnectionID: b2c28745d7ee8cca, SrcConnectionID: fd1b14c3, PacketNumber: 2, PacketNumberLen: 2, Length: 173, Version: v1} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/09/12 02:43:41 server <- Reading packet 0 (42 bytes) for connection fd1b14c3, Handshake 2025/09/12 02:43:41 server Long Header{Type: Handshake, DestConnectionID: fd1b14c3, SrcConnectionID: b2c28745d7ee8cca, PacketNumber: 0, PacketNumberLen: 4, Length: 21, Version: v1} 2025/09/12 02:43:41 server Dropping Initial keys. 2025/09/12 02:43:41 server <- &wire.PingFrame{} 2025/09/12 02:43:41 server -> Sending packet 3 (47 bytes) for connection 9d8fb4ffa54c4101, Handshake 2025/09/12 02:43:41 server Long Header{Type: Handshake, DestConnectionID: b2c28745d7ee8cca, SrcConnectionID: fd1b14c3, PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/09/12 02:43:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:41 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:41 server <- Reading packet 1 (85 bytes) for connection fd1b14c3, Handshake 2025/09/12 02:43:41 server Long Header{Type: Handshake, DestConnectionID: fd1b14c3, SrcConnectionID: b2c28745d7ee8cca, PacketNumber: 1, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:41 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 184µs} 2025/09/12 02:43:41 server newly acked packets (1): [2] 2025/09/12 02:43:41 server updated RTT: 31.387783ms (σ: 15.693891ms) 2025/09/12 02:43:41 server Canceling loss detection timer. 2025/09/12 02:43:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:41 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:41 server Dropping Handshake keys. 2025/09/12 02:43:41 server <- Reading packet 0 (183 bytes) for connection fd1b14c3, 1-RTT 2025/09/12 02:43:41 server Short Header{DestConnectionID: fd1b14c3, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1c31468c6614f643, StatelessResetToken: 0xd91405ac62b38e206d1e7b6b73eb93dc} 2025/09/12 02:43:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b3e90b14dfba9a76, StatelessResetToken: 0x10190602825a7163aab281615c78a23e} 2025/09/12 02:43:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ac19f98339d170d1, StatelessResetToken: 0xb5775d8db452980f9c19fea5657f68fa} 2025/09/12 02:43:41 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:41 server -> Sending packet 1 (305 bytes) for connection 9d8fb4ffa54c4101, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1c31468c6614f643, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 231.685µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:41 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:41 server -> &wire.NewTokenFrame{Token: 0x5e824b946b9f44f9d42e97d1df2356fdd8177185a8c8d296111cb56d241c922e01f3f1c5db5bf184c59225375af802e13a3ba6262347dd20acf883a6a881f038fe0c5bd5389e6ff660285a10912e01f3364c8e2ecd74a1ef465f} 2025/09/12 02:43:41 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:41 server <- Reading packet 2 (55 bytes) for connection fd1b14c3, 1-RTT 2025/09/12 02:43:41 server Short Header{DestConnectionID: fd1b14c3, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ccabf27d1681056e, StatelessResetToken: 0x1ef4fbaf1d07c3d3812186bd61ebc833} 2025/09/12 02:43:41 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:41 server -> Sending packet 2 (37 bytes) for connection 9d8fb4ffa54c4101, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1c31468c6614f643, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 80.261µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:43:41 server -> Sending packet 14 (1053 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:41 server Skipping packet number 13 2025/09/12 02:43:41 server -> Sending packet 15 (296 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:41 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:41 server -> &wire.NewTokenFrame{Token: 0x3af77ec960847c6b4142a8489d5a58a161d36fef4ceda2d550170ab7e4b5f9a0c8f50fc19510bb936505e1935c6c457b3ee9f03680cf25490aee07f5356b953f1726e2999ccda4f4b7efa53ab791d32f2cb1ce064e790d2d30cbf5} 2025/09/12 02:43:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:41 server -> Sending packet 4 (147 bytes) for connection 9d8fb4ffa54c4101, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1c31468c6614f643, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d03d645e, StatelessResetToken: 0x324e7d7ba1d2046b32df51c6ff80c921} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1bf1deb7, StatelessResetToken: 0x0268bc9aebc96c9171e1284c3704b5b6} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0b6ac5b6, StatelessResetToken: 0xb0a0568ceebde2a0cb29fce8c0e7c239} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 2303a5d6, StatelessResetToken: 0x3fa1451ef77114ffcd2e6b2aea2dd904} 2025/09/12 02:43:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d50ffc01, StatelessResetToken: 0x75849b42ea4f38ffc51eb122e51f1b30} 2025/09/12 02:43:41 server Skipping packet number 3 2025/09/12 02:43:41 server -> Sending packet 5 (297 bytes) for connection 9d8fb4ffa54c4101, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1c31468c6614f643, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:41 server -> &wire.NewTokenFrame{Token: 0x5e824b946b9f44f9d42e97d1df2356fdd8177185a8c8d296111cb56d241c922e01f3f1c5db5bf184c59225375af802e13a3ba6262347dd20acf883a6a881f038fe0c5bd5389e6ff660285a10912e01f3364c8e2ecd74a1ef465f} 2025/09/12 02:43:41 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:41 server <- Reading packet 7 (55 bytes) for connection fd1b14c3, 1-RTT 2025/09/12 02:43:41 server Short Header{DestConnectionID: fd1b14c3, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:41 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 3.912ms, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:43:41 server newly acked packets (2): [4 5] 2025/09/12 02:43:41 server updated RTT: 31.832ms (σ: 12.66ms) 2025/09/12 02:43:41 server ECN capability confirmed. 2025/09/12 02:43:41 server Canceling loss detection timer. 2025/09/12 02:43:41 server <- Reading packet 8 (55 bytes) for connection fd1b14c3, 1-RTT 2025/09/12 02:43:41 server Short Header{DestConnectionID: fd1b14c3, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:41 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:41 server -> Sending packet 6 (1360 bytes) for connection 9d8fb4ffa54c4101, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1c31468c6614f643, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.PingFrame{} 2025/09/12 02:43:41 Received request: GET /axvmnmvjaz 2025/09/12 02:43:41 server -> Sending packet 7 (39 bytes) for connection 9d8fb4ffa54c4101, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1c31468c6614f643, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 119.955µs, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:41 server -> Sending packet 8 (1053 bytes) for connection 9d8fb4ffa54c4101, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1c31468c6614f643, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:41 Removing connection ID 9d8fb4ffa54c4101. 2025/09/12 02:43:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:41 server -> Sending packet 10 (1053 bytes) for connection 9d8fb4ffa54c4101, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1c31468c6614f643, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:41 server -> Sending packet 11 (1053 bytes) for connection 9d8fb4ffa54c4101, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:41 server Short Header{DestConnectionID: 1c31468c6614f643, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:41 server <- Reading packet 10 (25 bytes) for connection fd1b14c3, 1-RTT 2025/09/12 02:43:41 server Short Header{DestConnectionID: fd1b14c3, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:41 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:41 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:41 Replacing connection for connection IDs [fd1b14c3 0b6ac5b6 1bf1deb7 d03d645e d50ffc01 2303a5d6] with a closed connection. 2025/09/12 02:43:41 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:41 server Connection 9d8fb4ffa54c4101 closed. 2025/09/12 02:43:42 server <- Received Initial packet. 2025/09/12 02:43:42 Created qlog file: /logs/qlog/67e7c4d08d89338f.sqlog 2025/09/12 02:43:42 server Changing connection ID to 79b0306a. 2025/09/12 02:43:42 Adding connection IDs 67e7c4d08d89338f and 79b0306a for a new connection. 2025/09/12 02:43:42 server <- Reading packet 80136 (1252 bytes) for connection 67e7c4d08d89338f, Initial 2025/09/12 02:43:42 server Long Header{Type: Initial, DestConnectionID: 67e7c4d08d89338f, SrcConnectionID: f2c571ad60e82e8c, Token: 0x5e824b946b9f44f9d42e97d1df2356fdd8177185a8c8d296111cb56d241c922e01f3f1c5db5bf184c59225375af802e13a3ba6262347dd20acf883a6a881f038fe0c5bd5389e6ff660285a10912e01f3364c8e2ecd74a1ef465f, PacketNumber: 80136, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:42 server <- &wire.PingFrame{} 2025/09/12 02:43:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f2c571ad60e82e8c, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:42 Adding connection ID fbdaadd9. 2025/09/12 02:43:42 Adding connection ID 63175ac6. 2025/09/12 02:43:42 Adding connection ID 8f5cdc1d. 2025/09/12 02:43:42 Adding connection ID 50d57cd0. 2025/09/12 02:43:42 Adding connection ID e5979f74. 2025/09/12 02:43:42 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 67e7c4d08d89338f 2025/09/12 02:43:42 server Long Header{Type: Initial, DestConnectionID: f2c571ad60e82e8c, SrcConnectionID: 79b0306a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 913, Version: v1} 2025/09/12 02:43:42 server -> &wire.AckFrame{LargestAcked: 80136, LowestAcked: 80136, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:42 server Long Header{Type: Handshake, DestConnectionID: f2c571ad60e82e8c, SrcConnectionID: 79b0306a, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:42 server Short Header{DestConnectionID: f2c571ad60e82e8c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fbdaadd9, StatelessResetToken: 0x08af397737e6c5cd8d57b60535e961ac} 2025/09/12 02:43:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 63175ac6, StatelessResetToken: 0xfee3430a6236e91e6bbec01e764a0047} 2025/09/12 02:43:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 50d57cd0, StatelessResetToken: 0x440da34ad3628629cbd5eda00016a958} 2025/09/12 02:43:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8f5cdc1d, StatelessResetToken: 0x3f7ced64bef943b1e398944989bd5002} 2025/09/12 02:43:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e5979f74, StatelessResetToken: 0xef3ec1f918517864fb6c65136956808f} 2025/09/12 02:43:42 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:42 server <- Reading packet 0 (85 bytes) for connection 79b0306a, Handshake 2025/09/12 02:43:42 server Long Header{Type: Handshake, DestConnectionID: 79b0306a, SrcConnectionID: f2c571ad60e82e8c, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:42 server Dropping Initial keys. 2025/09/12 02:43:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 448µs} 2025/09/12 02:43:42 server newly acked packets (1): [0] 2025/09/12 02:43:42 server updated RTT: 32.351139ms (σ: 16.175569ms) 2025/09/12 02:43:42 server Canceling loss detection timer. 2025/09/12 02:43:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:42 server Dropping Handshake keys. 2025/09/12 02:43:42 server <- Reading packet 0 (183 bytes) for connection 79b0306a, 1-RTT 2025/09/12 02:43:42 server Short Header{DestConnectionID: 79b0306a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6673bc2ca8b170e1, StatelessResetToken: 0xc14d5a46067ed2d60a3603e198ae0528} 2025/09/12 02:43:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a8604e6de1790f5, StatelessResetToken: 0x7f93b44da92e30d4ae422b4fe2128d86} 2025/09/12 02:43:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a47e5bc61acdfd2f, StatelessResetToken: 0xfb29e460f3a501e333558fad5371933f} 2025/09/12 02:43:42 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:42 server -> Sending packet 1 (305 bytes) for connection 67e7c4d08d89338f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:42 server Short Header{DestConnectionID: 6673bc2ca8b170e1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.729µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:42 server -> &wire.NewTokenFrame{Token: 0xcd26ec46be9232e6fcc76d6f71d5d54e8fc86f7967a5afbe1f5add4ab9e7560c71174a0cbfc5efdda0a1bce0f81608454ee83bb12f43103b840c1089d9d86dea31f60292dfe3ccbf12ac163af412f5a6719d219397882e2ce39a} 2025/09/12 02:43:42 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:42 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:42 server <- Reading packet 1 (55 bytes) for connection 79b0306a, 1-RTT 2025/09/12 02:43:42 server Short Header{DestConnectionID: 79b0306a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:42 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:42 Received request: GET /nizxxnrbtl 2025/09/12 02:43:42 server -> Sending packet 2 (1061 bytes) for connection 67e7c4d08d89338f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:42 server Short Header{DestConnectionID: 6673bc2ca8b170e1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:42 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 303.833µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:42 Removing connection IDs [fd1b14c3 0b6ac5b6 1bf1deb7 d03d645e d50ffc01 2303a5d6] for a closed connection after it has been retired. 2025/09/12 02:43:42 server <- Reading packet 4 (33 bytes) for connection 79b0306a, 1-RTT 2025/09/12 02:43:42 server Short Header{DestConnectionID: 79b0306a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:42 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 136µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:42 server newly acked packets (3): [0 1 2] 2025/09/12 02:43:42 server updated RTT: 32.268ms (σ: 12.295ms) 2025/09/12 02:43:42 server ECN capability confirmed. 2025/09/12 02:43:42 server Canceling loss detection timer. 2025/09/12 02:43:42 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:42 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:42 Replacing connection for connection IDs [79b0306a fbdaadd9 63175ac6 8f5cdc1d 50d57cd0 e5979f74 67e7c4d08d89338f] with a closed connection. 2025/09/12 02:43:42 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:42 server Connection 67e7c4d08d89338f closed. 2025/09/12 02:43:42 Removing connection IDs [79b0306a fbdaadd9 63175ac6 8f5cdc1d 50d57cd0 e5979f74 67e7c4d08d89338f] for a closed connection after it has been retired. 2025/09/12 02:43:42 server <- Received Initial packet. 2025/09/12 02:43:42 Created qlog file: /logs/qlog/31efd7de32ad7da8.sqlog 2025/09/12 02:43:42 server Changing connection ID to 2d51a324. 2025/09/12 02:43:42 Adding connection IDs 31efd7de32ad7da8 and 2d51a324 for a new connection. 2025/09/12 02:43:42 server <- Reading packet 73673 (1252 bytes) for connection 31efd7de32ad7da8, Initial 2025/09/12 02:43:42 server Long Header{Type: Initial, DestConnectionID: 31efd7de32ad7da8, SrcConnectionID: d64dce4484937abd, Token: 0xcd26ec46be9232e6fcc76d6f71d5d54e8fc86f7967a5afbe1f5add4ab9e7560c71174a0cbfc5efdda0a1bce0f81608454ee83bb12f43103b840c1089d9d86dea31f60292dfe3ccbf12ac163af412f5a6719d219397882e2ce39a, PacketNumber: 73673, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:42 server <- &wire.PingFrame{} 2025/09/12 02:43:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d64dce4484937abd, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:42 Adding connection ID 028474fc. 2025/09/12 02:43:42 Adding connection ID 99f9f93b. 2025/09/12 02:43:42 Adding connection ID 51e5cf91. 2025/09/12 02:43:42 Adding connection ID f27635b7. 2025/09/12 02:43:42 Adding connection ID af38182b. 2025/09/12 02:43:42 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 31efd7de32ad7da8 2025/09/12 02:43:42 server Long Header{Type: Initial, DestConnectionID: d64dce4484937abd, SrcConnectionID: 2d51a324, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 914, Version: v1} 2025/09/12 02:43:42 server -> &wire.AckFrame{LargestAcked: 73673, LowestAcked: 73673, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:42 server Long Header{Type: Handshake, DestConnectionID: d64dce4484937abd, SrcConnectionID: 2d51a324, PacketNumber: 0, PacketNumberLen: 2, Length: 176, Version: v1} 2025/09/12 02:43:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/09/12 02:43:42 server Short Header{DestConnectionID: d64dce4484937abd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: af38182b, StatelessResetToken: 0x7ac5c55871018b7dd9fb7e09beb241f5} 2025/09/12 02:43:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 99f9f93b, StatelessResetToken: 0x9ccdb9750ee5d0f79a1c600d67bc032a} 2025/09/12 02:43:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 51e5cf91, StatelessResetToken: 0x34639bd137d06328aa885e1ecdcc57d4} 2025/09/12 02:43:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 028474fc, StatelessResetToken: 0x61c506884080c4230ca2df47b5d63dda} 2025/09/12 02:43:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f27635b7, StatelessResetToken: 0x13cbabffc428f45f7fcf5281860b85dc} 2025/09/12 02:43:42 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:42 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:42 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:42 server -> Sending packet 1 (1280 bytes) for connection 31efd7de32ad7da8, Initial 2025/09/12 02:43:42 server Long Header{Type: Initial, DestConnectionID: d64dce4484937abd, SrcConnectionID: 2d51a324, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:42 server -> Sending packet 2 (1280 bytes) for connection 31efd7de32ad7da8, Initial 2025/09/12 02:43:42 server Long Header{Type: Initial, DestConnectionID: d64dce4484937abd, SrcConnectionID: 2d51a324, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:42 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:42 server -> Sending packet 1 (197 bytes) for connection 31efd7de32ad7da8, Handshake 2025/09/12 02:43:42 server Long Header{Type: Handshake, DestConnectionID: d64dce4484937abd, SrcConnectionID: 2d51a324, PacketNumber: 1, PacketNumberLen: 2, Length: 176, Version: v1} 2025/09/12 02:43:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/09/12 02:43:42 server -> Sending packet 2 (197 bytes) for connection 31efd7de32ad7da8, Handshake 2025/09/12 02:43:42 server Long Header{Type: Handshake, DestConnectionID: d64dce4484937abd, SrcConnectionID: 2d51a324, PacketNumber: 2, PacketNumberLen: 2, Length: 176, Version: v1} 2025/09/12 02:43:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/09/12 02:43:42 server <- Reading packet 1 (55 bytes) for connection 2d51a324, Handshake 2025/09/12 02:43:42 server Long Header{Type: Handshake, DestConnectionID: 2d51a324, SrcConnectionID: d64dce4484937abd, PacketNumber: 1, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:42 server Dropping Initial keys. 2025/09/12 02:43:42 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 48µs} 2025/09/12 02:43:42 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:43:42 server -> Sending packet 3 (197 bytes) for connection 31efd7de32ad7da8, Handshake 2025/09/12 02:43:42 server Long Header{Type: Handshake, DestConnectionID: d64dce4484937abd, SrcConnectionID: 2d51a324, PacketNumber: 3, PacketNumberLen: 2, Length: 176, Version: v1} 2025/09/12 02:43:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/09/12 02:43:42 server -> Sending packet 4 (197 bytes) for connection 31efd7de32ad7da8, Handshake 2025/09/12 02:43:42 server Long Header{Type: Handshake, DestConnectionID: d64dce4484937abd, SrcConnectionID: 2d51a324, PacketNumber: 4, PacketNumberLen: 2, Length: 176, Version: v1} 2025/09/12 02:43:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/09/12 02:43:42 server <- Reading packet 4 (55 bytes) for connection 2d51a324, Handshake 2025/09/12 02:43:42 server Long Header{Type: Handshake, DestConnectionID: 2d51a324, SrcConnectionID: d64dce4484937abd, PacketNumber: 4, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:42 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 32µs} 2025/09/12 02:43:42 server newly acked packets (1): [4] 2025/09/12 02:43:42 server updated RTT: 31.008362ms (σ: 15.504181ms) 2025/09/12 02:43:42 server Canceling loss detection timer. 2025/09/12 02:43:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:43:42 server -> Sending packet 17 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:42 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:42 server -> Sending packet 18 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:42 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:42 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:42 server Queueing packet (183 bytes) for later decryption 2025/09/12 02:43:43 server <- Reading packet 6 (183 bytes) for connection 2d51a324, Handshake 2025/09/12 02:43:43 server Long Header{Type: Handshake, DestConnectionID: 2d51a324, SrcConnectionID: d64dce4484937abd, PacketNumber: 6, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:43 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 498.192ms} 2025/09/12 02:43:43 server Dropping Handshake keys. 2025/09/12 02:43:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:43 server -> Sending packet 2 (415 bytes) for connection 31efd7de32ad7da8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:43 server Short Header{DestConnectionID: d64dce4484937abd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 51e5cf91, StatelessResetToken: 0x34639bd137d06328aa885e1ecdcc57d4} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 028474fc, StatelessResetToken: 0x61c506884080c4230ca2df47b5d63dda} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: af38182b, StatelessResetToken: 0x7ac5c55871018b7dd9fb7e09beb241f5} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f27635b7, StatelessResetToken: 0x13cbabffc428f45f7fcf5281860b85dc} 2025/09/12 02:43:43 server -> &wire.NewTokenFrame{Token: 0x49e2fcf8a51aaf160118c7f7e5b5d17e2d05b774118d9e501cc7012374c2c27790185fb883f11bcf39fb5fa42b0ab6996e5a9457ade140467fb1be1b33d79ddec64af00f0530f6a2862ea776078c730d0032eb980cbe5d6cfeb9} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 99f9f93b, StatelessResetToken: 0x9ccdb9750ee5d0f79a1c600d67bc032a} 2025/09/12 02:43:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:43 server -> Sending packet 3 (415 bytes) for connection 31efd7de32ad7da8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:43 server Short Header{DestConnectionID: d64dce4484937abd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:43 server -> &wire.NewTokenFrame{Token: 0x49e2fcf8a51aaf160118c7f7e5b5d17e2d05b774118d9e501cc7012374c2c27790185fb883f11bcf39fb5fa42b0ab6996e5a9457ade140467fb1be1b33d79ddec64af00f0530f6a2862ea776078c730d0032eb980cbe5d6cfeb9} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 51e5cf91, StatelessResetToken: 0x34639bd137d06328aa885e1ecdcc57d4} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 028474fc, StatelessResetToken: 0x61c506884080c4230ca2df47b5d63dda} 2025/09/12 02:43:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 99f9f93b, StatelessResetToken: 0x9ccdb9750ee5d0f79a1c600d67bc032a} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f27635b7, StatelessResetToken: 0x13cbabffc428f45f7fcf5281860b85dc} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: af38182b, StatelessResetToken: 0x7ac5c55871018b7dd9fb7e09beb241f5} 2025/09/12 02:43:43 server <- Reading packet 1 (55 bytes) for connection 2d51a324, 1-RTT 2025/09/12 02:43:43 server Short Header{DestConnectionID: 2d51a324, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:43 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:43 server <- Reading packet 2 (55 bytes) for connection 2d51a324, 1-RTT 2025/09/12 02:43:43 server Short Header{DestConnectionID: 2d51a324, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:43 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:43 server <- Reading packet 4 (55 bytes) for connection 2d51a324, 1-RTT 2025/09/12 02:43:43 server Short Header{DestConnectionID: 2d51a324, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:43 server <- Reading packet 5 (183 bytes) for connection 2d51a324, 1-RTT 2025/09/12 02:43:43 server Short Header{DestConnectionID: 2d51a324, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:43 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bdc47045f3400756, StatelessResetToken: 0xc105329e87a9b6359c22b0ca486892f7} 2025/09/12 02:43:43 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2bc8f2c379b9fd5c, StatelessResetToken: 0xc9cca3172fece279b3a6775331a4d921} 2025/09/12 02:43:43 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3decebb8e59121e9, StatelessResetToken: 0xd93f522e87455a4301473eace6a67a38} 2025/09/12 02:43:43 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416.424ms} 2025/09/12 02:43:43 Received request: GET /snjvwryubg 2025/09/12 02:43:43 server -> Sending packet 4 (42 bytes) for connection 31efd7de32ad7da8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:43 server Short Header{DestConnectionID: bdc47045f3400756, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:43 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 182.80974ms, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:43 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:43 server -> Sending packet 5 (1053 bytes) for connection 31efd7de32ad7da8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:43 server Short Header{DestConnectionID: bdc47045f3400756, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:43 server <- Reading packet 7 (37 bytes) for connection 2d51a324, 1-RTT 2025/09/12 02:43:43 server Short Header{DestConnectionID: 2d51a324, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:43 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 144µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:43 server newly acked packets (2): [3 5] 2025/09/12 02:43:43 server updated RTT: 31.121ms (σ: 11.855ms) 2025/09/12 02:43:43 server ECN capability confirmed. 2025/09/12 02:43:43 server setting loss timer for packet 4 (1-RTT) to 35.906126ms (in 2025-09-12 02:43:43.15955304 +0000 UTC m=+39.347703695) 2025/09/12 02:43:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:43 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:43 Replacing connection for connection IDs [f27635b7 af38182b 2d51a324 028474fc 99f9f93b 51e5cf91 31efd7de32ad7da8] with a closed connection. 2025/09/12 02:43:43 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:43 server Connection 31efd7de32ad7da8 closed. 2025/09/12 02:43:43 Removing connection IDs [f27635b7 af38182b 2d51a324 028474fc 99f9f93b 51e5cf91 31efd7de32ad7da8] for a closed connection after it has been retired. 2025/09/12 02:43:43 server <- Received Initial packet. 2025/09/12 02:43:43 Created qlog file: /logs/qlog/f31fbe6515569635.sqlog 2025/09/12 02:43:43 server Changing connection ID to b6132523. 2025/09/12 02:43:43 Adding connection IDs f31fbe6515569635 and b6132523 for a new connection. 2025/09/12 02:43:43 server <- Reading packet 89686 (1252 bytes) for connection f31fbe6515569635, Initial 2025/09/12 02:43:43 server Long Header{Type: Initial, DestConnectionID: f31fbe6515569635, SrcConnectionID: bd4c49bdb9fb962b, Token: 0x49e2fcf8a51aaf160118c7f7e5b5d17e2d05b774118d9e501cc7012374c2c27790185fb883f11bcf39fb5fa42b0ab6996e5a9457ade140467fb1be1b33d79ddec64af00f0530f6a2862ea776078c730d0032eb980cbe5d6cfeb9, PacketNumber: 89686, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:43 server <- &wire.PingFrame{} 2025/09/12 02:43:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:43 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:43 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:43 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:43 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: bd4c49bdb9fb962b, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:43 Adding connection ID 23ae0346. 2025/09/12 02:43:43 Adding connection ID 28b33844. 2025/09/12 02:43:43 Adding connection ID bddd0e15. 2025/09/12 02:43:43 Adding connection ID e1564e65. 2025/09/12 02:43:43 Adding connection ID 9e896a3b. 2025/09/12 02:43:43 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f31fbe6515569635 2025/09/12 02:43:43 server Long Header{Type: Initial, DestConnectionID: bd4c49bdb9fb962b, SrcConnectionID: b6132523, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 909, Version: v1} 2025/09/12 02:43:43 server -> &wire.AckFrame{LargestAcked: 89686, LowestAcked: 89686, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:43 server Long Header{Type: Handshake, DestConnectionID: bd4c49bdb9fb962b, SrcConnectionID: b6132523, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/09/12 02:43:43 server Short Header{DestConnectionID: bd4c49bdb9fb962b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e1564e65, StatelessResetToken: 0xbbe70a187b4f4b185608ffb74d79de96} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 9e896a3b, StatelessResetToken: 0xeff8098f8fdfbd57a9a1f427371358d3} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bddd0e15, StatelessResetToken: 0x4620551347c6bf9126d07507ac7be214} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 23ae0346, StatelessResetToken: 0xcf4bbde296ee85d3e51e6dbbe245225e} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 28b33844, StatelessResetToken: 0x3f6f8de365c6666d56362db69f9a7389} 2025/09/12 02:43:43 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:43 server <- Reading packet 0 (85 bytes) for connection b6132523, Handshake 2025/09/12 02:43:43 server Long Header{Type: Handshake, DestConnectionID: b6132523, SrcConnectionID: bd4c49bdb9fb962b, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:43 server Dropping Initial keys. 2025/09/12 02:43:43 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 360µs} 2025/09/12 02:43:43 server newly acked packets (1): [0] 2025/09/12 02:43:43 server updated RTT: 32.253141ms (σ: 16.12657ms) 2025/09/12 02:43:43 server Canceling loss detection timer. 2025/09/12 02:43:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:43 server Dropping Handshake keys. 2025/09/12 02:43:43 server <- Reading packet 0 (183 bytes) for connection b6132523, 1-RTT 2025/09/12 02:43:43 server Short Header{DestConnectionID: b6132523, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:43 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e94024f788ab3e7b, StatelessResetToken: 0xa44b6cddd2bdfc22339712c283f67b13} 2025/09/12 02:43:43 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6f18f0d6510d351c, StatelessResetToken: 0x044ba77ecc7526fbb3fc7b57c44b8d2b} 2025/09/12 02:43:43 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f60a089fec0790a3, StatelessResetToken: 0xb3b265d932e6c380d82c9881d29c80e4} 2025/09/12 02:43:43 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:43 server -> Sending packet 1 (305 bytes) for connection f31fbe6515569635, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:43 server Short Header{DestConnectionID: e94024f788ab3e7b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 206.809µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:43 server -> &wire.NewTokenFrame{Token: 0xc482bdb0aa21db5a233bca0b64a7faab6bbcb175fe07ae4aecfcf1ef27d28e591b8ee5e29a170ada88fab1fb076d148b9de4733d5fe390798121ec9fcfb5d9f474fde4b77ce210e468bd76ce68726485b9e41acc10b41489c124} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:43 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:43 server <- Reading packet 1 (55 bytes) for connection b6132523, 1-RTT 2025/09/12 02:43:43 server Short Header{DestConnectionID: b6132523, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:43 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:43 Received request: GET /duxayonoby 2025/09/12 02:43:43 server -> Sending packet 2 (1061 bytes) for connection f31fbe6515569635, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:43 server Short Header{DestConnectionID: e94024f788ab3e7b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:43 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 324.413µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:43 server <- Reading packet 2 (55 bytes) for connection b6132523, 1-RTT 2025/09/12 02:43:43 server Short Header{DestConnectionID: b6132523, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:43 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:43 server newly acked packets (1): [0] 2025/09/12 02:43:43 server updated RTT: 32.313ms (σ: 12.215ms) 2025/09/12 02:43:43 server <- Reading packet 3 (55 bytes) for connection b6132523, 1-RTT 2025/09/12 02:43:43 server Short Header{DestConnectionID: b6132523, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:43 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6b311f81184ac256, StatelessResetToken: 0xc3e4cd596ba163841b088ce14f22945a} 2025/09/12 02:43:43 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:43 server Sending ACK because the ACK timer expired. 2025/09/12 02:43:43 server -> Sending packet 3 (36 bytes) for connection f31fbe6515569635, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:43 server Short Header{DestConnectionID: e94024f788ab3e7b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:43 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 25.373595ms, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:43 server <- Reading packet 5 (25 bytes) for connection b6132523, 1-RTT 2025/09/12 02:43:43 server Short Header{DestConnectionID: b6132523, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:43 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:43 Replacing connection for connection IDs [e1564e65 9e896a3b b6132523 23ae0346 28b33844 bddd0e15 f31fbe6515569635] with a closed connection. 2025/09/12 02:43:43 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:43 server Connection f31fbe6515569635 closed. 2025/09/12 02:43:43 Removing connection IDs [e1564e65 9e896a3b b6132523 23ae0346 28b33844 bddd0e15 f31fbe6515569635] for a closed connection after it has been retired. 2025/09/12 02:43:43 server <- Received Initial packet. 2025/09/12 02:43:43 Created qlog file: /logs/qlog/a36556199e4a12e3.sqlog 2025/09/12 02:43:43 server Changing connection ID to d642b5ed. 2025/09/12 02:43:43 Adding connection IDs a36556199e4a12e3 and d642b5ed for a new connection. 2025/09/12 02:43:43 server <- Reading packet 102812 (1252 bytes) for connection a36556199e4a12e3, Initial 2025/09/12 02:43:43 server Long Header{Type: Initial, DestConnectionID: a36556199e4a12e3, SrcConnectionID: c3d4160752bbba4c, Token: 0xc482bdb0aa21db5a233bca0b64a7faab6bbcb175fe07ae4aecfcf1ef27d28e591b8ee5e29a170ada88fab1fb076d148b9de4733d5fe390798121ec9fcfb5d9f474fde4b77ce210e468bd76ce68726485b9e41acc10b41489c124, PacketNumber: 102812, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:43 server <- &wire.PingFrame{} 2025/09/12 02:43:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:43 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:43 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:43 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:43 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c3d4160752bbba4c, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:43 Adding connection ID c9644af5. 2025/09/12 02:43:43 Adding connection ID aa570ae9. 2025/09/12 02:43:43 Adding connection ID 8f294adb. 2025/09/12 02:43:43 Adding connection ID 6511b05b. 2025/09/12 02:43:43 Adding connection ID 295c486a. 2025/09/12 02:43:43 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a36556199e4a12e3 2025/09/12 02:43:43 server Long Header{Type: Initial, DestConnectionID: c3d4160752bbba4c, SrcConnectionID: d642b5ed, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 912, Version: v1} 2025/09/12 02:43:43 server -> &wire.AckFrame{LargestAcked: 102812, LowestAcked: 102812, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:43 server Long Header{Type: Handshake, DestConnectionID: c3d4160752bbba4c, SrcConnectionID: d642b5ed, PacketNumber: 0, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:43 server Short Header{DestConnectionID: c3d4160752bbba4c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6511b05b, StatelessResetToken: 0xa82ef56cf88c8f8d455fa5f3a51c113c} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8f294adb, StatelessResetToken: 0x07011c135998cd64fa1f1e43abfa3bb6} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 295c486a, StatelessResetToken: 0xfeef4246abdd42276484897cc6590a05} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c9644af5, StatelessResetToken: 0x0ed3b8ff29aaaf23ae4e954482769bd4} 2025/09/12 02:43:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aa570ae9, StatelessResetToken: 0x0d2027de7b3aa6d413595c06107912cb} 2025/09/12 02:43:43 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:43 server -> Sending packet 1 (1280 bytes) for connection a36556199e4a12e3, Initial 2025/09/12 02:43:43 server Long Header{Type: Initial, DestConnectionID: c3d4160752bbba4c, SrcConnectionID: d642b5ed, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:43 server -> Sending packet 2 (1280 bytes) for connection a36556199e4a12e3, Initial 2025/09/12 02:43:43 server Long Header{Type: Initial, DestConnectionID: c3d4160752bbba4c, SrcConnectionID: d642b5ed, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:43 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:43 server -> Sending packet 1 (199 bytes) for connection a36556199e4a12e3, Handshake 2025/09/12 02:43:43 server Long Header{Type: Handshake, DestConnectionID: c3d4160752bbba4c, SrcConnectionID: d642b5ed, PacketNumber: 1, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:43 server -> Sending packet 2 (199 bytes) for connection a36556199e4a12e3, Handshake 2025/09/12 02:43:43 server Long Header{Type: Handshake, DestConnectionID: c3d4160752bbba4c, SrcConnectionID: d642b5ed, PacketNumber: 2, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:43 server <- Reading packet 1 (55 bytes) for connection d642b5ed, Handshake 2025/09/12 02:43:43 server Long Header{Type: Handshake, DestConnectionID: d642b5ed, SrcConnectionID: c3d4160752bbba4c, PacketNumber: 1, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:43 server Dropping Initial keys. 2025/09/12 02:43:43 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs} 2025/09/12 02:43:43 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:43:43 server -> Sending packet 3 (199 bytes) for connection a36556199e4a12e3, Handshake 2025/09/12 02:43:43 server Long Header{Type: Handshake, DestConnectionID: c3d4160752bbba4c, SrcConnectionID: d642b5ed, PacketNumber: 3, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:43 server -> Sending packet 4 (199 bytes) for connection a36556199e4a12e3, Handshake 2025/09/12 02:43:43 server Long Header{Type: Handshake, DestConnectionID: c3d4160752bbba4c, SrcConnectionID: d642b5ed, PacketNumber: 4, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:43 server Queueing packet (183 bytes) for later decryption 2025/09/12 02:43:43 server Destroying connection: timeout: no recent network activity 2025/09/12 02:43:43 Error accepting stream: timeout: no recent network activity 2025/09/12 02:43:43 Removing connection ID 3d64ac96. 2025/09/12 02:43:43 Removing connection ID 8c81fce3. 2025/09/12 02:43:43 Removing connection ID ce502c26. 2025/09/12 02:43:43 Removing connection ID 811fc84f. 2025/09/12 02:43:43 Removing connection ID 2ec10cdc. 2025/09/12 02:43:43 Removing connection ID eeae4998. 2025/09/12 02:43:43 server Connection 77bd5bdb6c05d96e closed. 2025/09/12 02:43:43 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:43 server -> Sending packet 5 (199 bytes) for connection a36556199e4a12e3, Handshake 2025/09/12 02:43:43 server Long Header{Type: Handshake, DestConnectionID: c3d4160752bbba4c, SrcConnectionID: d642b5ed, PacketNumber: 5, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:43 server -> Sending packet 6 (199 bytes) for connection a36556199e4a12e3, Handshake 2025/09/12 02:43:43 server Long Header{Type: Handshake, DestConnectionID: c3d4160752bbba4c, SrcConnectionID: d642b5ed, PacketNumber: 6, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:44 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:44 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/09/12 02:43:44 server -> Sending packet 7 (199 bytes) for connection a36556199e4a12e3, Handshake 2025/09/12 02:43:44 server Long Header{Type: Handshake, DestConnectionID: c3d4160752bbba4c, SrcConnectionID: d642b5ed, PacketNumber: 7, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:44 server -> Sending packet 8 (199 bytes) for connection a36556199e4a12e3, Handshake 2025/09/12 02:43:44 server Long Header{Type: Handshake, DestConnectionID: c3d4160752bbba4c, SrcConnectionID: d642b5ed, PacketNumber: 8, PacketNumberLen: 2, Length: 178, Version: v1} 2025/09/12 02:43:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/09/12 02:43:44 server <- Reading packet 4 (55 bytes) for connection d642b5ed, Handshake 2025/09/12 02:43:44 server Long Header{Type: Handshake, DestConnectionID: d642b5ed, SrcConnectionID: c3d4160752bbba4c, PacketNumber: 4, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:44 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 32µs} 2025/09/12 02:43:44 server newly acked packets (1): [8] 2025/09/12 02:43:44 server updated RTT: 30.98144ms (σ: 15.49072ms) 2025/09/12 02:43:44 server Canceling loss detection timer. 2025/09/12 02:43:44 server Queueing packet (183 bytes) for later decryption 2025/09/12 02:43:44 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:44 server Queueing packet (183 bytes) for later decryption 2025/09/12 02:43:45 server <- Reading packet 8 (183 bytes) for connection d642b5ed, Handshake 2025/09/12 02:43:45 server Long Header{Type: Handshake, DestConnectionID: d642b5ed, SrcConnectionID: c3d4160752bbba4c, PacketNumber: 8, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:45 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, DelayTime: 1.24592s} 2025/09/12 02:43:45 server Dropping Handshake keys. 2025/09/12 02:43:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:45 server -> Sending packet 2 (415 bytes) for connection a36556199e4a12e3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:45 server Short Header{DestConnectionID: c3d4160752bbba4c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:45 server -> &wire.NewTokenFrame{Token: 0xe778ca9729576f2dcc376b28065b68ec7fb75d551457eec405cb86c1fb81a20f1883f9b69499b85bf02fd3fdb885658c701c134ecd3fd23c2bc92f3f3138c2c81e4013aa5acb40004e9701bee7dfce93cbd1046625d030c42d45} 2025/09/12 02:43:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aa570ae9, StatelessResetToken: 0x0d2027de7b3aa6d413595c06107912cb} 2025/09/12 02:43:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8f294adb, StatelessResetToken: 0x07011c135998cd64fa1f1e43abfa3bb6} 2025/09/12 02:43:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 295c486a, StatelessResetToken: 0xfeef4246abdd42276484897cc6590a05} 2025/09/12 02:43:45 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6511b05b, StatelessResetToken: 0xa82ef56cf88c8f8d455fa5f3a51c113c} 2025/09/12 02:43:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c9644af5, StatelessResetToken: 0x0ed3b8ff29aaaf23ae4e954482769bd4} 2025/09/12 02:43:45 server -> Sending packet 3 (415 bytes) for connection a36556199e4a12e3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:45 server Short Header{DestConnectionID: c3d4160752bbba4c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 295c486a, StatelessResetToken: 0xfeef4246abdd42276484897cc6590a05} 2025/09/12 02:43:45 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c9644af5, StatelessResetToken: 0x0ed3b8ff29aaaf23ae4e954482769bd4} 2025/09/12 02:43:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6511b05b, StatelessResetToken: 0xa82ef56cf88c8f8d455fa5f3a51c113c} 2025/09/12 02:43:45 server -> &wire.NewTokenFrame{Token: 0xe778ca9729576f2dcc376b28065b68ec7fb75d551457eec405cb86c1fb81a20f1883f9b69499b85bf02fd3fdb885658c701c134ecd3fd23c2bc92f3f3138c2c81e4013aa5acb40004e9701bee7dfce93cbd1046625d030c42d45} 2025/09/12 02:43:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8f294adb, StatelessResetToken: 0x07011c135998cd64fa1f1e43abfa3bb6} 2025/09/12 02:43:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aa570ae9, StatelessResetToken: 0x0d2027de7b3aa6d413595c06107912cb} 2025/09/12 02:43:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:45 server <- Reading packet 3 (183 bytes) for connection d642b5ed, 1-RTT 2025/09/12 02:43:45 server Short Header{DestConnectionID: d642b5ed, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 34dda39927b4c5b3, StatelessResetToken: 0xf1c347f774d021c51882a015bb2513fc} 2025/09/12 02:43:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: be26ba9787c584c1, StatelessResetToken: 0xbb71b42fdbf7dd52df1ff2d9c202d17e} 2025/09/12 02:43:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3917e75ebe93d771, StatelessResetToken: 0xeb2578bdf916fb109dc4a21cd0740cc8} 2025/09/12 02:43:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 84.136ms} 2025/09/12 02:43:45 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:45 server <- Reading packet 4 (55 bytes) for connection d642b5ed, 1-RTT 2025/09/12 02:43:45 server Short Header{DestConnectionID: d642b5ed, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:45 server <- Reading packet 5 (183 bytes) for connection d642b5ed, 1-RTT 2025/09/12 02:43:45 server Short Header{DestConnectionID: d642b5ed, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 34dda39927b4c5b3, StatelessResetToken: 0xf1c347f774d021c51882a015bb2513fc} 2025/09/12 02:43:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: be26ba9787c584c1, StatelessResetToken: 0xbb71b42fdbf7dd52df1ff2d9c202d17e} 2025/09/12 02:43:45 Received request: GET /eswegmywtx 2025/09/12 02:43:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3917e75ebe93d771, StatelessResetToken: 0xeb2578bdf916fb109dc4a21cd0740cc8} 2025/09/12 02:43:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416.44ms} 2025/09/12 02:43:45 server <- Reading packet 6 (55 bytes) for connection d642b5ed, 1-RTT 2025/09/12 02:43:45 server Short Header{DestConnectionID: d642b5ed, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:45 server <- Reading packet 7 (183 bytes) for connection d642b5ed, 1-RTT 2025/09/12 02:43:45 server Short Header{DestConnectionID: d642b5ed, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 34dda39927b4c5b3, StatelessResetToken: 0xf1c347f774d021c51882a015bb2513fc} 2025/09/12 02:43:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: be26ba9787c584c1, StatelessResetToken: 0xbb71b42fdbf7dd52df1ff2d9c202d17e} 2025/09/12 02:43:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3917e75ebe93d771, StatelessResetToken: 0xeb2578bdf916fb109dc4a21cd0740cc8} 2025/09/12 02:43:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 914.776ms} 2025/09/12 02:43:45 server -> Sending packet 4 (1066 bytes) for connection a36556199e4a12e3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:45 server Short Header{DestConnectionID: 34dda39927b4c5b3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:45 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 633.309494ms, ECT0: 0, ECT1: 5, CE: 0} 2025/09/12 02:43:45 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:45 server <- Reading packet 10 (35 bytes) for connection d642b5ed, 1-RTT 2025/09/12 02:43:45 server Short Header{DestConnectionID: d642b5ed, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:45 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 128µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:45 server newly acked packets (1): [4] 2025/09/12 02:43:45 server updated RTT: 31.087ms (σ: 11.83ms) 2025/09/12 02:43:45 server ECN capability confirmed. 2025/09/12 02:43:45 server setting loss timer for packet 3 (1-RTT) to 35.810382ms (in 2025-09-12 02:43:45.395530494 +0000 UTC m=+41.583681149) 2025/09/12 02:43:45 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:45 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:45 Replacing connection for connection IDs [aa570ae9 8f294adb 6511b05b 295c486a d642b5ed c9644af5 a36556199e4a12e3] with a closed connection. 2025/09/12 02:43:45 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:45 server Connection a36556199e4a12e3 closed. 2025/09/12 02:43:45 Removing connection IDs [aa570ae9 8f294adb 6511b05b 295c486a d642b5ed c9644af5 a36556199e4a12e3] for a closed connection after it has been retired. 2025/09/12 02:43:45 server Destroying connection: timeout: no recent network activity 2025/09/12 02:43:45 Removing connection ID 3a5ad9ca. 2025/09/12 02:43:45 Removing connection ID 722589e0. 2025/09/12 02:43:45 Removing connection ID 4f60a412. 2025/09/12 02:43:45 Error accepting stream: timeout: no recent network activity 2025/09/12 02:43:45 Removing connection ID ec7b6309. 2025/09/12 02:43:45 Removing connection ID 5912d500. 2025/09/12 02:43:45 Removing connection ID 1f22be29. 2025/09/12 02:43:45 server Connection d2b2a664b6d79ddc closed. 2025/09/12 02:43:47 server <- Received Initial packet. 2025/09/12 02:43:47 Created qlog file: /logs/qlog/5a2c9709fa09bf8a.sqlog 2025/09/12 02:43:47 server Changing connection ID to 55a3b1c5. 2025/09/12 02:43:47 Adding connection IDs 5a2c9709fa09bf8a and 55a3b1c5 for a new connection. 2025/09/12 02:43:47 server <- Reading packet 96405 (1252 bytes) for connection 5a2c9709fa09bf8a, Initial 2025/09/12 02:43:47 server Long Header{Type: Initial, DestConnectionID: 5a2c9709fa09bf8a, SrcConnectionID: d9acd9525775ed8f, Token: 0xe778ca9729576f2dcc376b28065b68ec7fb75d551457eec405cb86c1fb81a20f1883f9b69499b85bf02fd3fdb885658c701c134ecd3fd23c2bc92f3f3138c2c81e4013aa5acb40004e9701bee7dfce93cbd1046625d030c42d45, PacketNumber: 96405, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:47 server <- &wire.PingFrame{} 2025/09/12 02:43:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 483, Offset + Data length: 483} 2025/09/12 02:43:47 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:47 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:47 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:47 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d9acd9525775ed8f, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:47 Adding connection ID 3b986cca. 2025/09/12 02:43:47 Adding connection ID 868b57bc. 2025/09/12 02:43:47 Adding connection ID bf683e2d. 2025/09/12 02:43:47 Adding connection ID 8868eeec. 2025/09/12 02:43:47 Adding connection ID 6c18078d. 2025/09/12 02:43:47 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5a2c9709fa09bf8a 2025/09/12 02:43:47 server Long Header{Type: Initial, DestConnectionID: d9acd9525775ed8f, SrcConnectionID: 55a3b1c5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 920, Version: v1} 2025/09/12 02:43:47 server -> &wire.AckFrame{LargestAcked: 96405, LowestAcked: 96405, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:47 server Long Header{Type: Handshake, DestConnectionID: d9acd9525775ed8f, SrcConnectionID: 55a3b1c5, PacketNumber: 0, PacketNumberLen: 2, Length: 170, Version: v1} 2025/09/12 02:43:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/09/12 02:43:47 server Short Header{DestConnectionID: d9acd9525775ed8f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bf683e2d, StatelessResetToken: 0x939b3669c94e1d715ea49bce66b4fb7b} 2025/09/12 02:43:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 6c18078d, StatelessResetToken: 0x61650a0fa14bf2f4323b0b1031da11d5} 2025/09/12 02:43:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8868eeec, StatelessResetToken: 0x0705778ae066ab16f53b5b90a3b5503d} 2025/09/12 02:43:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3b986cca, StatelessResetToken: 0x9f530132c03bdebfaab2c2c892417303} 2025/09/12 02:43:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 868b57bc, StatelessResetToken: 0x89acf06c62b6075041872e6d5ebe487d} 2025/09/12 02:43:47 server Parsed a coalesced packet. Part 1: 85 bytes. Remaining: 183 bytes. 2025/09/12 02:43:47 server <- Reading packet 0 (85 bytes) for connection 55a3b1c5, Handshake 2025/09/12 02:43:47 server Long Header{Type: Handshake, DestConnectionID: 55a3b1c5, SrcConnectionID: d9acd9525775ed8f, PacketNumber: 0, PacketNumberLen: 4, Length: 64, Version: v1} 2025/09/12 02:43:47 server Dropping Initial keys. 2025/09/12 02:43:47 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/09/12 02:43:47 server newly acked packets (1): [0] 2025/09/12 02:43:47 server updated RTT: 32.32516ms (σ: 16.16258ms) 2025/09/12 02:43:47 server Canceling loss detection timer. 2025/09/12 02:43:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:47 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:47 server Dropping Handshake keys. 2025/09/12 02:43:47 server <- Reading packet 0 (183 bytes) for connection 55a3b1c5, 1-RTT 2025/09/12 02:43:47 server Short Header{DestConnectionID: 55a3b1c5, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:47 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d033648c3e506015, StatelessResetToken: 0x372124fe0e4c60d56bc4ddc2433ec6d1} 2025/09/12 02:43:47 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 395ff68c56658268, StatelessResetToken: 0x47352ab6873dce70d52a7cd685503bfa} 2025/09/12 02:43:47 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 445ecca6284ffe0d, StatelessResetToken: 0x27328328dc997b4352169ea577efff17} 2025/09/12 02:43:47 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:47 server -> Sending packet 1 (305 bytes) for connection 5a2c9709fa09bf8a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:47 server Short Header{DestConnectionID: d033648c3e506015, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:47 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 338.643µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:47 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:47 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:47 server -> &wire.NewTokenFrame{Token: 0x634a91af215048a4de9b68aaf41a4523e16ec8a945a35396cf33eedf2446c9c30d254761d61ee119952dfe68b50d65c5f707942dcaf741faba7d3c327551d406786e3112d64a5effc7da71c120880945d56d9baa953b51ebdc4d} 2025/09/12 02:43:47 server <- Reading packet 1 (55 bytes) for connection 55a3b1c5, 1-RTT 2025/09/12 02:43:47 server Short Header{DestConnectionID: 55a3b1c5, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:47 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:47 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:47 server <- Reading packet 2 (55 bytes) for connection 55a3b1c5, 1-RTT 2025/09/12 02:43:47 server Short Header{DestConnectionID: 55a3b1c5, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:47 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:47 server newly acked packets (1): [0] 2025/09/12 02:43:47 server updated RTT: 32.373ms (σ: 12.218ms) 2025/09/12 02:43:47 Received request: GET /wxkxjnxdjd 2025/09/12 02:43:47 server -> Sending packet 2 (1061 bytes) for connection 5a2c9709fa09bf8a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:47 server Short Header{DestConnectionID: d033648c3e506015, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:47 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 161.601µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:47 server <- Reading packet 4 (33 bytes) for connection 55a3b1c5, 1-RTT 2025/09/12 02:43:47 server Short Header{DestConnectionID: 55a3b1c5, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:47 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 112µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:47 server newly acked packets (2): [1 2] 2025/09/12 02:43:47 server updated RTT: 32.283ms (σ: 9.342ms) 2025/09/12 02:43:47 server ECN capability confirmed. 2025/09/12 02:43:47 server Canceling loss detection timer. 2025/09/12 02:43:47 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:47 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:47 Replacing connection for connection IDs [6c18078d 55a3b1c5 3b986cca 868b57bc bf683e2d 8868eeec 5a2c9709fa09bf8a] with a closed connection. 2025/09/12 02:43:47 server Connection 5a2c9709fa09bf8a closed. 2025/09/12 02:43:47 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:47 server Destroying connection: timeout: no recent network activity 2025/09/12 02:43:47 Removing connection ID 157976f1. 2025/09/12 02:43:47 Removing connection ID e447a092. 2025/09/12 02:43:47 Error accepting stream: timeout: no recent network activity 2025/09/12 02:43:47 Removing connection ID 3fe99f47. 2025/09/12 02:43:47 Removing connection ID b061d6d6. 2025/09/12 02:43:47 Removing connection ID 18b620fa. 2025/09/12 02:43:47 Removing connection ID ffb5b111. 2025/09/12 02:43:47 server Connection eacee66e59396015 closed. 2025/09/12 02:43:47 Removing connection IDs [6c18078d 55a3b1c5 3b986cca 868b57bc bf683e2d 8868eeec 5a2c9709fa09bf8a] for a closed connection after it has been retired. 2025/09/12 02:43:47 server <- Received Initial packet. 2025/09/12 02:43:47 Created qlog file: /logs/qlog/cfa9edf47a37cc41.sqlog 2025/09/12 02:43:47 server Changing connection ID to 4128c020. 2025/09/12 02:43:47 Adding connection IDs cfa9edf47a37cc41 and 4128c020 for a new connection. 2025/09/12 02:43:47 server <- Reading packet 122141 (1252 bytes) for connection cfa9edf47a37cc41, Initial 2025/09/12 02:43:47 server Long Header{Type: Initial, DestConnectionID: cfa9edf47a37cc41, SrcConnectionID: 81ea1dc1e5e123e0, Token: 0x634a91af215048a4de9b68aaf41a4523e16ec8a945a35396cf33eedf2446c9c30d254761d61ee119952dfe68b50d65c5f707942dcaf741faba7d3c327551d406786e3112d64a5effc7da71c120880945d56d9baa953b51ebdc4d, PacketNumber: 122141, PacketNumberLen: 4, Length: 1135, Version: v1} 2025/09/12 02:43:47 server <- &wire.PingFrame{} 2025/09/12 02:43:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:47 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:47 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:47 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:47 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 81ea1dc1e5e123e0, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:47 Adding connection ID 8b11b513. 2025/09/12 02:43:47 Adding connection ID 2f83f8a3. 2025/09/12 02:43:47 Adding connection ID ca69bb31. 2025/09/12 02:43:47 Adding connection ID 7376935b. 2025/09/12 02:43:47 Adding connection ID 3e065b24. 2025/09/12 02:43:47 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection cfa9edf47a37cc41 2025/09/12 02:43:47 server Long Header{Type: Initial, DestConnectionID: 81ea1dc1e5e123e0, SrcConnectionID: 4128c020, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 917, Version: v1} 2025/09/12 02:43:47 server -> &wire.AckFrame{LargestAcked: 122141, LowestAcked: 122141, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:47 server Long Header{Type: Handshake, DestConnectionID: 81ea1dc1e5e123e0, SrcConnectionID: 4128c020, PacketNumber: 0, PacketNumberLen: 2, Length: 173, Version: v1} 2025/09/12 02:43:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/09/12 02:43:47 server Short Header{DestConnectionID: 81ea1dc1e5e123e0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2f83f8a3, StatelessResetToken: 0x873ff3dd17ad0be9f37366598b3947bc} 2025/09/12 02:43:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8b11b513, StatelessResetToken: 0x455ea7e8dd7894f416fba686881df40f} 2025/09/12 02:43:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7376935b, StatelessResetToken: 0x5dd16763161d30c2523c9618bf787dd5} 2025/09/12 02:43:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 3e065b24, StatelessResetToken: 0x2244ffa886a908674200123a76d079d5} 2025/09/12 02:43:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ca69bb31, StatelessResetToken: 0xa57afc33b2abebe64da1c3844d919d87} 2025/09/12 02:43:47 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:47 server -> Sending packet 1 (1280 bytes) for connection cfa9edf47a37cc41, Initial 2025/09/12 02:43:47 server Long Header{Type: Initial, DestConnectionID: 81ea1dc1e5e123e0, SrcConnectionID: 4128c020, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:47 server -> Sending packet 2 (1280 bytes) for connection cfa9edf47a37cc41, Initial 2025/09/12 02:43:47 server Long Header{Type: Initial, DestConnectionID: 81ea1dc1e5e123e0, SrcConnectionID: 4128c020, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:47 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:47 server -> Sending packet 1 (194 bytes) for connection cfa9edf47a37cc41, Handshake 2025/09/12 02:43:47 server Long Header{Type: Handshake, DestConnectionID: 81ea1dc1e5e123e0, SrcConnectionID: 4128c020, PacketNumber: 1, PacketNumberLen: 2, Length: 173, Version: v1} 2025/09/12 02:43:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/09/12 02:43:47 server -> Sending packet 2 (194 bytes) for connection cfa9edf47a37cc41, Handshake 2025/09/12 02:43:47 server Long Header{Type: Handshake, DestConnectionID: 81ea1dc1e5e123e0, SrcConnectionID: 4128c020, PacketNumber: 2, PacketNumberLen: 2, Length: 173, Version: v1} 2025/09/12 02:43:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/09/12 02:43:47 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 02:43:47 server -> Sending packet 3 (1280 bytes) for connection cfa9edf47a37cc41, Initial 2025/09/12 02:43:47 server Long Header{Type: Initial, DestConnectionID: 81ea1dc1e5e123e0, SrcConnectionID: 4128c020, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:47 server -> Sending packet 4 (1280 bytes) for connection cfa9edf47a37cc41, Initial 2025/09/12 02:43:47 server Long Header{Type: Initial, DestConnectionID: 81ea1dc1e5e123e0, SrcConnectionID: 4128c020, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:47 server Parsed a coalesced packet. Part 1: 86 bytes. Remaining: 183 bytes. 2025/09/12 02:43:47 server <- Reading packet 0 (86 bytes) for connection 4128c020, Handshake 2025/09/12 02:43:47 server Long Header{Type: Handshake, DestConnectionID: 4128c020, SrcConnectionID: 81ea1dc1e5e123e0, PacketNumber: 0, PacketNumberLen: 4, Length: 65, Version: v1} 2025/09/12 02:43:47 server Dropping Initial keys. 2025/09/12 02:43:47 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 101.328ms} 2025/09/12 02:43:47 server newly acked packets (1): [2] 2025/09/12 02:43:47 server updated RTT: 132.62717ms (σ: 66.313585ms) 2025/09/12 02:43:47 server Canceling loss detection timer. 2025/09/12 02:43:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:47 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:47 server Dropping Handshake keys. 2025/09/12 02:43:47 server <- Reading packet 0 (183 bytes) for connection 4128c020, 1-RTT 2025/09/12 02:43:47 server Short Header{DestConnectionID: 4128c020, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:47 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fc3c102b89844528, StatelessResetToken: 0x14efe3f7c99b0b394e9fe7d8f8de2305} 2025/09/12 02:43:47 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 68eeac604e43f593, StatelessResetToken: 0x610ad034d8642bc2843362d8160b2b49} 2025/09/12 02:43:47 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0803181b41e91107, StatelessResetToken: 0xd11d6184cec31fd5be17e89378450feb} 2025/09/12 02:43:47 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:47 server -> Sending packet 1 (306 bytes) for connection cfa9edf47a37cc41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:47 server Short Header{DestConnectionID: fc3c102b89844528, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:47 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376.675µs, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:47 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:47 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:47 server -> &wire.NewTokenFrame{Token: 0x00412d14298a7874207777417538556da20a92b5f113262e31f500377f45bcda981d5c4e7803ada48502d580b39385c7106a113f2c0ed4cb600bb55b763d1b76781d67f5e9bcdaca3e52cccbbb9f9de302420da6cd117e5c36d37d} 2025/09/12 02:43:47 server <- Reading packet 1 (55 bytes) for connection 4128c020, 1-RTT 2025/09/12 02:43:47 server Short Header{DestConnectionID: 4128c020, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:47 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:47 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:47 Received request: GET /zvjgbtvqvl 2025/09/12 02:43:47 server -> Sending packet 2 (1061 bytes) for connection cfa9edf47a37cc41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:47 server Short Header{DestConnectionID: fc3c102b89844528, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:47 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 423.646µs, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:47 server <- Reading packet 2 (55 bytes) for connection 4128c020, 1-RTT 2025/09/12 02:43:47 server Short Header{DestConnectionID: 4128c020, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:47 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b94c66ec8b505263, StatelessResetToken: 0xb7cfdade03d455503bed18094fa08ea2} 2025/09/12 02:43:47 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:47 server <- Reading packet 3 (33 bytes) for connection 4128c020, 1-RTT 2025/09/12 02:43:47 server Short Header{DestConnectionID: 4128c020, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:47 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 160µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:47 server newly acked packets (2): [1 2] 2025/09/12 02:43:47 server updated RTT: 120.012ms (σ: 74.964ms) 2025/09/12 02:43:47 server ECN capability confirmed. 2025/09/12 02:43:47 server lost packet 0 (time threshold) 2025/09/12 02:43:47 server Canceling loss detection timer. 2025/09/12 02:43:47 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:47 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:47 Replacing connection for connection IDs [4128c020 8b11b513 2f83f8a3 ca69bb31 7376935b 3e065b24 cfa9edf47a37cc41] with a closed connection. 2025/09/12 02:43:47 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:47 server Connection cfa9edf47a37cc41 closed. 2025/09/12 02:43:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:43:48 server -> Sending packet 20 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:48 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:48 server -> Sending packet 21 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:48 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:48 server <- Received Initial packet. 2025/09/12 02:43:48 Created qlog file: /logs/qlog/91ce31fed8bf5a7e.sqlog 2025/09/12 02:43:48 server Changing connection ID to 8ff9d17f. 2025/09/12 02:43:48 Adding connection IDs 91ce31fed8bf5a7e and 8ff9d17f for a new connection. 2025/09/12 02:43:48 server <- Reading packet 101584 (1252 bytes) for connection 91ce31fed8bf5a7e, Initial 2025/09/12 02:43:48 server Long Header{Type: Initial, DestConnectionID: 91ce31fed8bf5a7e, SrcConnectionID: b8a0eeca9d6af3dd, Token: 0x00412d14298a7874207777417538556da20a92b5f113262e31f500377f45bcda981d5c4e7803ada48502d580b39385c7106a113f2c0ed4cb600bb55b763d1b76781d67f5e9bcdaca3e52cccbbb9f9de302420da6cd117e5c36d37d, PacketNumber: 101584, PacketNumberLen: 4, Length: 1134, Version: v1} 2025/09/12 02:43:48 server <- &wire.PingFrame{} 2025/09/12 02:43:48 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:48 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:48 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:48 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:48 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: b8a0eeca9d6af3dd, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:48 Adding connection ID 52c9e3b5. 2025/09/12 02:43:48 Adding connection ID 4a5a0ead. 2025/09/12 02:43:48 Adding connection ID 1ae280d1. 2025/09/12 02:43:48 Adding connection ID 316e3865. 2025/09/12 02:43:48 Adding connection ID c64fa1cb. 2025/09/12 02:43:48 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 91ce31fed8bf5a7e 2025/09/12 02:43:48 server Long Header{Type: Initial, DestConnectionID: b8a0eeca9d6af3dd, SrcConnectionID: 8ff9d17f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 909, Version: v1} 2025/09/12 02:43:48 server -> &wire.AckFrame{LargestAcked: 101584, LowestAcked: 101584, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:48 server Long Header{Type: Handshake, DestConnectionID: b8a0eeca9d6af3dd, SrcConnectionID: 8ff9d17f, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/09/12 02:43:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/09/12 02:43:48 server Short Header{DestConnectionID: b8a0eeca9d6af3dd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 52c9e3b5, StatelessResetToken: 0xef8b21f9b5c3f61c10f2281bc5fe3152} 2025/09/12 02:43:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c64fa1cb, StatelessResetToken: 0xf7ea8c9f512b7eca7648bef789d79558} 2025/09/12 02:43:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 316e3865, StatelessResetToken: 0xd3fe5520d75fca404c3682d658463238} 2025/09/12 02:43:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4a5a0ead, StatelessResetToken: 0x83bdbd7f191675f594cb88d9aee17464} 2025/09/12 02:43:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1ae280d1, StatelessResetToken: 0x88b962a48df811b81ee4a4cd9de037bc} 2025/09/12 02:43:48 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:48 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:48 server <- Reading packet 1 (183 bytes) for connection 8ff9d17f, Handshake 2025/09/12 02:43:48 server Long Header{Type: Handshake, DestConnectionID: 8ff9d17f, SrcConnectionID: b8a0eeca9d6af3dd, PacketNumber: 1, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:48 server Dropping Initial keys. 2025/09/12 02:43:48 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:48 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:48 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 83.872ms} 2025/09/12 02:43:48 server newly acked packets (1): [0] 2025/09/12 02:43:48 server updated RTT: 115.73919ms (σ: 57.869595ms) 2025/09/12 02:43:48 server Canceling loss detection timer. 2025/09/12 02:43:48 server Dropping Handshake keys. 2025/09/12 02:43:48 server -> Sending packet 1 (296 bytes) for connection 91ce31fed8bf5a7e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:48 server Short Header{DestConnectionID: b8a0eeca9d6af3dd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:48 server -> &wire.NewTokenFrame{Token: 0x1fb340218756d0a27ab6221660b2e43b66df0f71e7379fd05cf5ad88eb2bc1f10fa917af24adca6600504ad2d95f98649f2908b6c42daf344d28023ccc012262115d05de58c901e6c63b1bf9a6f6e092574f2c72369bb5ff76d64b} 2025/09/12 02:43:48 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:48 server <- Reading packet 1 (55 bytes) for connection 8ff9d17f, 1-RTT 2025/09/12 02:43:48 server Short Header{DestConnectionID: 8ff9d17f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:48 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:48 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:48 server <- Reading packet 2 (55 bytes) for connection 8ff9d17f, 1-RTT 2025/09/12 02:43:48 server Short Header{DestConnectionID: 8ff9d17f, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:48 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.064ms} 2025/09/12 02:43:48 server newly acked packets (1): [0] 2025/09/12 02:43:48 server updated RTT: 105.358ms (σ: 64.163ms) 2025/09/12 02:43:48 server -> Sending packet 2 (36 bytes) for connection 91ce31fed8bf5a7e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:48 server Short Header{DestConnectionID: b8a0eeca9d6af3dd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:48 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 83.422903ms, ECT0: 0, ECT1: 2, CE: 0} 2025/09/12 02:43:48 Received request: GET /byvcztxlrf 2025/09/12 02:43:48 server -> Sending packet 3 (1053 bytes) for connection 91ce31fed8bf5a7e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:48 server Short Header{DestConnectionID: b8a0eeca9d6af3dd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:49 server <- Reading packet 5 (183 bytes) for connection 8ff9d17f, 1-RTT 2025/09/12 02:43:49 server Short Header{DestConnectionID: 8ff9d17f, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:49 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a8083c99882712e9, StatelessResetToken: 0x2342f73f06208e2dbd287df095cacb45} 2025/09/12 02:43:49 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a62fd88964ea3555, StatelessResetToken: 0xe5a2645e73f3c769831363b7da906ef5} 2025/09/12 02:43:49 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 90966a500f7baf4e, StatelessResetToken: 0x4ee305ac0812a0cae17285752fee92c6} 2025/09/12 02:43:49 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 189.52ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:49 server newly acked packets (1): [1] 2025/09/12 02:43:49 server ECN capability confirmed. 2025/09/12 02:43:49 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:43:49 server -> Sending packet 4 (39 bytes) for connection 91ce31fed8bf5a7e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:49 server Short Header{DestConnectionID: a8083c99882712e9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:49 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 141.005µs, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:49 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:49 Removing connection IDs [4128c020 8b11b513 2f83f8a3 ca69bb31 7376935b 3e065b24 cfa9edf47a37cc41] for a closed connection after it has been retired. 2025/09/12 02:43:49 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:43:49 server -> Sending packet 17 (1053 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:49 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:49 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:49 server Skipping packet number 16 2025/09/12 02:43:49 server -> Sending packet 18 (296 bytes) for connection 7527fecf1cbb6195, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:49 server Short Header{DestConnectionID: 999d465d3770fca2, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:49 server -> &wire.NewTokenFrame{Token: 0x3af77ec960847c6b4142a8489d5a58a161d36fef4ceda2d550170ab7e4b5f9a0c8f50fc19510bb936505e1935c6c457b3ee9f03680cf25490aee07f5356b953f1726e2999ccda4f4b7efa53ab791d32f2cb1ce064e790d2d30cbf5} 2025/09/12 02:43:49 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:49 server <- Reading packet 6 (183 bytes) for connection 8ff9d17f, 1-RTT 2025/09/12 02:43:49 server Short Header{DestConnectionID: 8ff9d17f, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:49 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a8083c99882712e9, StatelessResetToken: 0x2342f73f06208e2dbd287df095cacb45} 2025/09/12 02:43:49 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a62fd88964ea3555, StatelessResetToken: 0xe5a2645e73f3c769831363b7da906ef5} 2025/09/12 02:43:49 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 90966a500f7baf4e, StatelessResetToken: 0x4ee305ac0812a0cae17285752fee92c6} 2025/09/12 02:43:49 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 507.832ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:43:49 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:43:49 server -> Sending packet 5 (1360 bytes) for connection 91ce31fed8bf5a7e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:49 server Short Header{DestConnectionID: a8083c99882712e9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:49 server -> &wire.PingFrame{} 2025/09/12 02:43:49 server Sending ACK because the ACK timer expired. 2025/09/12 02:43:49 server -> Sending packet 6 (38 bytes) for connection 91ce31fed8bf5a7e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:49 server Short Header{DestConnectionID: a8083c99882712e9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:49 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 25.362717ms, ECT0: 0, ECT1: 4, CE: 0} 2025/09/12 02:43:49 server <- Reading packet 7 (55 bytes) for connection 8ff9d17f, 1-RTT 2025/09/12 02:43:49 server Short Header{DestConnectionID: 8ff9d17f, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:49 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 72µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:43:49 server newly acked packets (1): [5] 2025/09/12 02:43:49 server updated RTT: 96.164ms (σ: 66.509ms) 2025/09/12 02:43:49 server lost packet 3 (time threshold) 2025/09/12 02:43:49 server lost packet 4 (time threshold) 2025/09/12 02:43:49 server Canceling loss detection timer. 2025/09/12 02:43:49 server -> Sending packet 7 (1055 bytes) for connection 91ce31fed8bf5a7e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:49 server Short Header{DestConnectionID: a8083c99882712e9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:49 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:49 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:49 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:49 server -> Sending packet 9 (1055 bytes) for connection 91ce31fed8bf5a7e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:49 server Short Header{DestConnectionID: a8083c99882712e9, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:49 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:49 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:49 server -> Sending packet 10 (1055 bytes) for connection 91ce31fed8bf5a7e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:49 server Short Header{DestConnectionID: a8083c99882712e9, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:49 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:49 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:49 server <- Reading packet 8 (35 bytes) for connection 8ff9d17f, 1-RTT 2025/09/12 02:43:49 server Short Header{DestConnectionID: 8ff9d17f, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:49 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 5, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 5}}, DelayTime: 168µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 02:43:49 server newly acked packets (1): [10] 2025/09/12 02:43:49 server updated RTT: 88.189ms (σ: 65.831ms) 2025/09/12 02:43:49 server Canceling loss detection timer. 2025/09/12 02:43:49 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:43:49 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:43:49 Replacing connection for connection IDs [4a5a0ead 1ae280d1 316e3865 c64fa1cb 8ff9d17f 52c9e3b5 91ce31fed8bf5a7e] with a closed connection. 2025/09/12 02:43:49 server Connection 91ce31fed8bf5a7e closed. 2025/09/12 02:43:49 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:43:50 server <- Received Initial packet. 2025/09/12 02:43:50 Created qlog file: /logs/qlog/fbd9031ef9282b6d.sqlog 2025/09/12 02:43:50 server Changing connection ID to 36da5c4e. 2025/09/12 02:43:50 Adding connection IDs fbd9031ef9282b6d and 36da5c4e for a new connection. 2025/09/12 02:43:50 server <- Reading packet 128700 (1252 bytes) for connection fbd9031ef9282b6d, Initial 2025/09/12 02:43:50 server Long Header{Type: Initial, DestConnectionID: fbd9031ef9282b6d, SrcConnectionID: f1be92da986e0a8f, Token: 0x1fb340218756d0a27ab6221660b2e43b66df0f71e7379fd05cf5ad88eb2bc1f10fa917af24adca6600504ad2d95f98649f2908b6c42daf344d28023ccc012262115d05de58c901e6c63b1bf9a6f6e092574f2c72369bb5ff76d64b, PacketNumber: 128700, PacketNumberLen: 4, Length: 1134, Version: v1} 2025/09/12 02:43:50 server <- &wire.PingFrame{} 2025/09/12 02:43:50 server <- &wire.CryptoFrame{Offset: 0, Data length: 485, Offset + Data length: 485} 2025/09/12 02:43:50 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:50 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:50 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:50 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f1be92da986e0a8f, InitialMaxStreamDataBidiLocal: 2097152, InitialMaxStreamDataBidiRemote: 65635, InitialMaxStreamDataUni: 65535, InitialMaxData: 1048576, MaxBidiStreamNum: 512, MaxUniStreamNum: 512, MaxIdleTimeout: 3m0s, AckDelayExponent: 3, MaxAckDelay: 10ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false, MinAckDelay: 1ms} 2025/09/12 02:43:50 Adding connection ID cb59522a. 2025/09/12 02:43:50 Adding connection ID c5c8fe17. 2025/09/12 02:43:50 Adding connection ID 0720cf8c. 2025/09/12 02:43:50 Adding connection ID 85a92456. 2025/09/12 02:43:50 Adding connection ID 39fdd220. 2025/09/12 02:43:50 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection fbd9031ef9282b6d 2025/09/12 02:43:50 server Long Header{Type: Initial, DestConnectionID: f1be92da986e0a8f, SrcConnectionID: 36da5c4e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 913, Version: v1} 2025/09/12 02:43:50 server -> &wire.AckFrame{LargestAcked: 128700, LowestAcked: 128700, DelayTime: 0s, ECT0: 0, ECT1: 1, CE: 0} 2025/09/12 02:43:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:50 server Long Header{Type: Handshake, DestConnectionID: f1be92da986e0a8f, SrcConnectionID: 36da5c4e, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:50 server Short Header{DestConnectionID: f1be92da986e0a8f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 85a92456, StatelessResetToken: 0xabec238394ca79b1ff51a22df8db79ce} 2025/09/12 02:43:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb59522a, StatelessResetToken: 0x48d5cb08825d028bfc4a8f42faa3a00f} 2025/09/12 02:43:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0720cf8c, StatelessResetToken: 0x47b046d5d328390d35f5cdca43375ea3} 2025/09/12 02:43:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c5c8fe17, StatelessResetToken: 0x31ab3547ead128dfa77a239179bb438d} 2025/09/12 02:43:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 39fdd220, StatelessResetToken: 0x9e9d2245c54cb76e7a48d89b23f93ea1} 2025/09/12 02:43:50 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:50 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:43:50 server -> Sending packet 1 (1280 bytes) for connection fbd9031ef9282b6d, Initial 2025/09/12 02:43:50 server Long Header{Type: Initial, DestConnectionID: f1be92da986e0a8f, SrcConnectionID: 36da5c4e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:50 server -> Sending packet 2 (1280 bytes) for connection fbd9031ef9282b6d, Initial 2025/09/12 02:43:50 server Long Header{Type: Initial, DestConnectionID: f1be92da986e0a8f, SrcConnectionID: 36da5c4e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:43:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/09/12 02:43:50 server Queueing packet (183 bytes) for later decryption 2025/09/12 02:43:50 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:43:50 server -> Sending packet 1 (198 bytes) for connection fbd9031ef9282b6d, Handshake 2025/09/12 02:43:50 server Long Header{Type: Handshake, DestConnectionID: f1be92da986e0a8f, SrcConnectionID: 36da5c4e, PacketNumber: 1, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:50 server -> Sending packet 2 (198 bytes) for connection fbd9031ef9282b6d, Handshake 2025/09/12 02:43:50 server Long Header{Type: Handshake, DestConnectionID: f1be92da986e0a8f, SrcConnectionID: 36da5c4e, PacketNumber: 2, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:50 server <- Reading packet 2 (55 bytes) for connection 36da5c4e, Handshake 2025/09/12 02:43:50 server Long Header{Type: Handshake, DestConnectionID: 36da5c4e, SrcConnectionID: f1be92da986e0a8f, PacketNumber: 2, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:50 server Dropping Initial keys. 2025/09/12 02:43:50 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 48µs} 2025/09/12 02:43:50 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:43:50 server -> Sending packet 3 (198 bytes) for connection fbd9031ef9282b6d, Handshake 2025/09/12 02:43:50 server Long Header{Type: Handshake, DestConnectionID: f1be92da986e0a8f, SrcConnectionID: 36da5c4e, PacketNumber: 3, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:50 server -> Sending packet 4 (198 bytes) for connection fbd9031ef9282b6d, Handshake 2025/09/12 02:43:50 server Long Header{Type: Handshake, DestConnectionID: f1be92da986e0a8f, SrcConnectionID: 36da5c4e, PacketNumber: 4, PacketNumberLen: 2, Length: 177, Version: v1} 2025/09/12 02:43:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/09/12 02:43:50 server Queueing packet (55 bytes) for later decryption 2025/09/12 02:43:50 server <- Reading packet 3 (55 bytes) for connection 36da5c4e, Handshake 2025/09/12 02:43:50 server Long Header{Type: Handshake, DestConnectionID: 36da5c4e, SrcConnectionID: f1be92da986e0a8f, PacketNumber: 3, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:50 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 40µs} 2025/09/12 02:43:50 server <- Reading packet 4 (55 bytes) for connection 36da5c4e, Handshake 2025/09/12 02:43:50 server Long Header{Type: Handshake, DestConnectionID: 36da5c4e, SrcConnectionID: f1be92da986e0a8f, PacketNumber: 4, PacketNumberLen: 4, Length: 34, Version: v1} 2025/09/12 02:43:50 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 40µs} 2025/09/12 02:43:50 server newly acked packets (1): [4] 2025/09/12 02:43:50 server updated RTT: 31.026852ms (σ: 15.513426ms) 2025/09/12 02:43:50 server Canceling loss detection timer. 2025/09/12 02:43:50 Removing connection IDs [4a5a0ead 1ae280d1 316e3865 c64fa1cb 8ff9d17f 52c9e3b5 91ce31fed8bf5a7e] for a closed connection after it has been retired. 2025/09/12 02:43:51 server <- Reading packet 5 (183 bytes) for connection 36da5c4e, Handshake 2025/09/12 02:43:51 server Long Header{Type: Handshake, DestConnectionID: 36da5c4e, SrcConnectionID: f1be92da986e0a8f, PacketNumber: 5, PacketNumberLen: 4, Length: 162, Version: v1} 2025/09/12 02:43:51 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:43:51 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:43:51 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 333.24ms} 2025/09/12 02:43:51 server Dropping Handshake keys. 2025/09/12 02:43:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:51 server -> Sending packet 2 (415 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:51 server Short Header{DestConnectionID: f1be92da986e0a8f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb59522a, StatelessResetToken: 0x48d5cb08825d028bfc4a8f42faa3a00f} 2025/09/12 02:43:51 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c5c8fe17, StatelessResetToken: 0x31ab3547ead128dfa77a239179bb438d} 2025/09/12 02:43:51 server -> &wire.NewTokenFrame{Token: 0x5dfa923e745ed88c417aa0cc505e24149fab4b6f16a80f703ed5c29228afe6dbcc3cf7d9aaf03884e299770a96b1104d38777d9b5423cd0540d5e2da8261ad634b6fe1c12e031d05ad8744adf924a3b2b8af5165c5255d02d866} 2025/09/12 02:43:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 39fdd220, StatelessResetToken: 0x9e9d2245c54cb76e7a48d89b23f93ea1} 2025/09/12 02:43:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0720cf8c, StatelessResetToken: 0x47b046d5d328390d35f5cdca43375ea3} 2025/09/12 02:43:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 85a92456, StatelessResetToken: 0xabec238394ca79b1ff51a22df8db79ce} 2025/09/12 02:43:51 server -> Sending packet 3 (415 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:51 server Short Header{DestConnectionID: f1be92da986e0a8f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0720cf8c, StatelessResetToken: 0x47b046d5d328390d35f5cdca43375ea3} 2025/09/12 02:43:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb59522a, StatelessResetToken: 0x48d5cb08825d028bfc4a8f42faa3a00f} 2025/09/12 02:43:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 85a92456, StatelessResetToken: 0xabec238394ca79b1ff51a22df8db79ce} 2025/09/12 02:43:51 server -> &wire.NewTokenFrame{Token: 0x5dfa923e745ed88c417aa0cc505e24149fab4b6f16a80f703ed5c29228afe6dbcc3cf7d9aaf03884e299770a96b1104d38777d9b5423cd0540d5e2da8261ad634b6fe1c12e031d05ad8744adf924a3b2b8af5165c5255d02d866} 2025/09/12 02:43:51 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:43:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c5c8fe17, StatelessResetToken: 0x31ab3547ead128dfa77a239179bb438d} 2025/09/12 02:43:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 39fdd220, StatelessResetToken: 0x9e9d2245c54cb76e7a48d89b23f93ea1} 2025/09/12 02:43:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:43:51 server <- Reading packet 2 (55 bytes) for connection 36da5c4e, 1-RTT 2025/09/12 02:43:51 server Short Header{DestConnectionID: 36da5c4e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:51 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.056ms} 2025/09/12 02:43:51 server <- Reading packet 3 (183 bytes) for connection 36da5c4e, 1-RTT 2025/09/12 02:43:51 server Short Header{DestConnectionID: 36da5c4e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:51 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: aafdb56cfe5389f6, StatelessResetToken: 0xd9f0c003b478a3ee94d7dd77ab8b6420} 2025/09/12 02:43:51 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1d4bef419fa77b0d, StatelessResetToken: 0x5ed97b421f9562183f02252177df84ea} 2025/09/12 02:43:51 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 61d4fe574eca2afb, StatelessResetToken: 0xb3441abecf924df29fa2343c18f89ef3} 2025/09/12 02:43:51 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 167.64ms} 2025/09/12 02:43:51 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:43:51 server <- Reading packet 4 (55 bytes) for connection 36da5c4e, 1-RTT 2025/09/12 02:43:51 server Short Header{DestConnectionID: 36da5c4e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:51 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:43:51 server -> Sending packet 4 (40 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:51 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:51 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 350.025891ms, ECT0: 0, ECT1: 3, CE: 0} 2025/09/12 02:43:51 Received request: GET /csknuwojvc 2025/09/12 02:43:51 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:51 server -> Sending packet 5 (1053 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:51 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:51 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:51 server <- Reading packet 6 (55 bytes) for connection 36da5c4e, 1-RTT 2025/09/12 02:43:51 server Short Header{DestConnectionID: 36da5c4e, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:43:51 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 72µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:43:51 server newly acked packets (1): [3] 2025/09/12 02:43:51 server updated RTT: 31.067ms (σ: 11.717ms) 2025/09/12 02:43:51 server ECN capability confirmed. 2025/09/12 02:43:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:43:51 server -> Sending packet 7 (29 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:51 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:51 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:51 server Skipping packet number 6 2025/09/12 02:43:51 server -> Sending packet 8 (1053 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:51 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:51 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:43:51 server -> Sending packet 10 (29 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:51 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:51 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:51 server Skipping packet number 9 2025/09/12 02:43:51 server -> Sending packet 11 (1053 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:51 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:51 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:51 server -> Sending packet 12 (1360 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:51 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:51 server -> &wire.PingFrame{} 2025/09/12 02:43:51 Removing connection ID fbd9031ef9282b6d. 2025/09/12 02:43:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:43:51 server -> Sending packet 14 (29 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:51 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:51 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:51 server Skipping packet number 13 2025/09/12 02:43:51 server -> Sending packet 15 (1053 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:51 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:51 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:52 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:43:52 server -> Sending packet 17 (29 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:52 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:52 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:52 server Skipping packet number 16 2025/09/12 02:43:52 server -> Sending packet 18 (1053 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:52 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:52 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:53 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:43:53 server -> Sending packet 20 (29 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:53 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:53 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:53 server Skipping packet number 19 2025/09/12 02:43:53 server -> Sending packet 21 (1053 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:53 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:53 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:43:56 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:43:56 server -> Sending packet 23 (29 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:56 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:56 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:43:56 server Skipping packet number 22 2025/09/12 02:43:56 server -> Sending packet 24 (1053 bytes) for connection fbd9031ef9282b6d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:43:56 server Short Header{DestConnectionID: aafdb56cfe5389f6, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:43:56 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:44:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:44:00 server -> Sending packet 23 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:44:00 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:44:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:44:00 server -> Sending packet 24 (1053 bytes) for connection 4f9ab974eb3a3043, 1-RTT (ECN: ECT(0)) 2025/09/12 02:44:00 server Short Header{DestConnectionID: 07f848ed7788d5d0, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:44:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024}