2025/12/13 08:41:57 Increased receive buffer size to 14336 kiB 2025/12/13 08:41:57 Increased send buffer size to 14336 kiB 2025/12/13 08:41:57 Setting DF for IPv4 and IPv6. 2025/12/13 08:41:57 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 08:41:57 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 08:41:57 server Listening for udp connections on [::]:443 2025/12/13 08:41:57 server Client offered version 0x57414954, sending Version Negotiation 2025/12/13 08:41:58 server <- Received Initial packet. 2025/12/13 08:41:58 Created qlog file: /logs/qlog/f5dc5f624a137c1f4a5ed967ba8a70.sqlog 2025/12/13 08:41:58 server Changing connection ID to ff4512bf. 2025/12/13 08:41:58 Adding connection IDs f5dc5f624a137c1f4a5ed967ba8a70 and ff4512bf for a new connection. 2025/12/13 08:41:58 server <- Received Initial packet. 2025/12/13 08:41:58 server <- Reading packet 0 (1280 bytes) for connection f5dc5f624a137c1f4a5ed967ba8a70, Initial 2025/12/13 08:41:58 server Long Header{Type: Initial, DestConnectionID: f5dc5f624a137c1f4a5ed967ba8a70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 08:41:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/12/13 08:41:58 server <- &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/12/13 08:41:58 server <- Reading packet 1 (1280 bytes) for connection f5dc5f624a137c1f4a5ed967ba8a70, Initial 2025/12/13 08:41:58 server Long Header{Type: Initial, DestConnectionID: f5dc5f624a137c1f4a5ed967ba8a70, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/12/13 08:41:58 server <- &wire.CryptoFrame{Offset: 1233, Data length: 273, Offset + Data length: 1506} 2025/12/13 08:41:58 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/12/13 08:41:58 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 08:41:58 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 08:41:58 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 08:41:58 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/12/13 08:41:58 Adding connection ID d8db624d. 2025/12/13 08:41:58 Adding connection ID cc1059db. 2025/12/13 08:41:58 Adding connection ID dbd55155. 2025/12/13 08:41:58 server -> Sending packet 0 (1280 bytes) for connection f5dc5f624a137c1f4a5ed967ba8a70, Initial 2025/12/13 08:41:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ff4512bf, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/12/13 08:41:58 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/12/13 08:41:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/12/13 08:41:58 server -> Sending packet 0 (845 bytes) for connection f5dc5f624a137c1f4a5ed967ba8a70, Handshake 2025/12/13 08:41:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ff4512bf, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/12/13 08:41:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/12/13 08:41:58 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:41:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8db624d, StatelessResetToken: 0x8e7c0019e2a7cbde53e6b866d182878b} 2025/12/13 08:41:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cc1059db, StatelessResetToken: 0x0bfe2fd366218b42358e03dadf261d9a} 2025/12/13 08:41:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dbd55155, StatelessResetToken: 0xd5dacb55ef45a6dd08bf0763efb96f60} 2025/12/13 08:41:58 server <- Reading packet 2 (1280 bytes) for connection ff4512bf, Initial 2025/12/13 08:41:58 server Long Header{Type: Initial, DestConnectionID: ff4512bf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/12/13 08:41:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 08:41:58 server newly acked packets (1): [0] 2025/12/13 08:41:58 server updated RTT: 33.173524ms (σ: 16.586762ms) 2025/12/13 08:41:58 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 31 bytes. 2025/12/13 08:41:58 server <- Reading packet 0 (75 bytes) for connection d8db624d, Handshake 2025/12/13 08:41:58 server Long Header{Type: Handshake, DestConnectionID: d8db624d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/12/13 08:41:58 server Dropping Initial keys. 2025/12/13 08:41:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/12/13 08:41:58 server newly acked packets (1): [0] 2025/12/13 08:41:58 server updated RTT: 33.17ms (σ: 12.443ms) 2025/12/13 08:41:58 server Canceling loss detection timer. 2025/12/13 08:41:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 08:41:58 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 08:41:58 server Dropping Handshake keys. 2025/12/13 08:41:58 server <- Reading packet 0 (31 bytes) for connection d8db624d, 1-RTT 2025/12/13 08:41:58 server Short Header{DestConnectionID: d8db624d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:41:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 584µs} 2025/12/13 08:41:58 server newly acked packets (1): [0] 2025/12/13 08:41:58 server updated RTT: 33.168ms (σ: 9.335ms) 2025/12/13 08:41:58 server Canceling loss detection timer. 2025/12/13 08:41:58 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 08:41:58 server Setting ACK timer to max ack delay: 25ms 2025/12/13 08:41:58 server <- Reading packet 1 (52 bytes) for connection d8db624d, 1-RTT 2025/12/13 08:41:58 server Short Header{DestConnectionID: d8db624d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:41:58 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 27, Offset + Data length: 27} 2025/12/13 08:41:58 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/12/13 08:41:58 server <- Reading packet 2 (26 bytes) for connection d8db624d, 1-RTT 2025/12/13 08:41:58 server Short Header{DestConnectionID: d8db624d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:41:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 27, Data length: 0, Offset + Data length: 27} 2025/12/13 08:41:58 server -> Sending packet 1 (296 bytes) for connection f5dc5f624a137c1f4a5ed967ba8a70, 1-RTT (ECN: ECT(0)) 2025/12/13 08:41:58 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:41:58 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 169.585µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 08:41:58 server -> &wire.HandshakeDoneFrame{} 2025/12/13 08:41:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/12/13 08:41:58 server -> &wire.NewTokenFrame{Token: 0x374535fc51eeca264665589d163410f6520302af5cbd0d185560a934011e1151925bcb005f2774a3096d960e408bb90e4180b64beb836e0fb2482f5f5cd49d4c4b3caccde12fcb1f2b96e68992e6d074ea22427b88906e627e278a} 2025/12/13 08:41:58 Received request: GET /massive-bored-floppy 2025/12/13 08:41:58 server -> Sending packet 2 (1045 bytes) for connection f5dc5f624a137c1f4a5ed967ba8a70, 1-RTT (ECN: ECT(0)) 2025/12/13 08:41:58 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:41:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/12/13 08:41:58 server <- Reading packet 3 (31 bytes) for connection d8db624d, 1-RTT 2025/12/13 08:41:58 server Short Header{DestConnectionID: d8db624d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:41:58 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 08:41:58 server newly acked packets (2): [1 2] 2025/12/13 08:41:58 server Ignoring all packets below 3. 2025/12/13 08:41:58 server updated RTT: 32.946ms (σ: 7.443ms) 2025/12/13 08:41:58 server ECN capability confirmed. 2025/12/13 08:41:58 server Canceling loss detection timer. 2025/12/13 08:41:58 server <- Reading packet 4 (26 bytes) for connection d8db624d, 1-RTT 2025/12/13 08:41:58 server Short Header{DestConnectionID: d8db624d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:41:58 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 08:41:58 server Closing connection with error: Application error 0x0 (remote) 2025/12/13 08:41:58 Replacing connection for connection IDs [d8db624d cc1059db dbd55155 ff4512bf f5dc5f624a137c1f4a5ed967ba8a70] with a closed connection. 2025/12/13 08:41:58 Error accepting stream: Application error 0x0 (remote) 2025/12/13 08:41:58 server Connection f5dc5f624a137c1f4a5ed967ba8a70 closed. 2025/12/13 08:41:58 Removing connection IDs [d8db624d cc1059db dbd55155 ff4512bf f5dc5f624a137c1f4a5ed967ba8a70] for a closed connection after it has been retired.