2025/04/30 11:03:54 Increased receive buffer size to 14336 kiB 2025/04/30 11:03:54 Increased send buffer size to 14336 kiB 2025/04/30 11:03:54 Setting DF for IPv4 and IPv6. 2025/04/30 11:03:54 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:03:54 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:03:54 server Listening for udp connections on [::]:443 2025/04/30 11:03:55 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:03:55 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:03:55 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:03:55 server <- Received Initial packet. 2025/04/30 11:03:55 Created qlog file: /logs/qlog/ff0a5495f458c161f047a6f4a65d.sqlog 2025/04/30 11:03:55 server Changing connection ID to 98321bc0. 2025/04/30 11:03:55 Adding connection IDs ff0a5495f458c161f047a6f4a65d and 98321bc0 for a new connection. 2025/04/30 11:03:55 server <- Reading packet 0 (1280 bytes) for connection ff0a5495f458c161f047a6f4a65d, Initial 2025/04/30 11:03:55 server Long Header{Type: Initial, DestConnectionID: ff0a5495f458c161f047a6f4a65d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:03:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:03:55 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:55 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:55 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:55 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:55 Adding connection ID 387d7e87. 2025/04/30 11:03:55 Adding connection ID 311df184. 2025/04/30 11:03:55 Adding connection ID cb195d5d. 2025/04/30 11:03:55 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ff0a5495f458c161f047a6f4a65d 2025/04/30 11:03:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98321bc0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 427, Version: v1} 2025/04/30 11:03:55 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98321bc0, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:03:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:03:55 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 311df184, StatelessResetToken: 0x62687a59e9f37bc6b4d67dc4bd2d587e} 2025/04/30 11:03:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 387d7e87, StatelessResetToken: 0xc4187397dbb1d3f495c853a73f707381} 2025/04/30 11:03:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb195d5d, StatelessResetToken: 0xb78341889826e39961c66abb63c5e91b} 2025/04/30 11:03:55 server <- Reading packet 2 (1280 bytes) for connection ff0a5495f458c161f047a6f4a65d, Initial 2025/04/30 11:03:55 server Long Header{Type: Initial, DestConnectionID: ff0a5495f458c161f047a6f4a65d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:03:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:03:55 server -> Sending packet 1 (39 bytes) for connection ff0a5495f458c161f047a6f4a65d, Initial 2025/04/30 11:03:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98321bc0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:03:55 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:03:55 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:55 server -> Sending packet 2 (1280 bytes) for connection ff0a5495f458c161f047a6f4a65d, Initial 2025/04/30 11:03:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98321bc0, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:55 server -> Sending packet 3 (1280 bytes) for connection ff0a5495f458c161f047a6f4a65d, Initial 2025/04/30 11:03:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 98321bc0, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:55 server <- Reading packet 4 (1280 bytes) for connection 98321bc0, Initial 2025/04/30 11:03:55 server Long Header{Type: Initial, DestConnectionID: 98321bc0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:55 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:55 server newly acked packets (1): [3] 2025/04/30 11:03:55 server updated RTT: 34.050739ms (σ: 17.025369ms) 2025/04/30 11:03:55 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:03:55 server -> Sending packet 1 (748 bytes) for connection ff0a5495f458c161f047a6f4a65d, Handshake 2025/04/30 11:03:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98321bc0, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:03:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:03:55 server -> Sending packet 2 (748 bytes) for connection ff0a5495f458c161f047a6f4a65d, Handshake 2025/04/30 11:03:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 98321bc0, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:03:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:03:55 server <- Reading packet 0 (75 bytes) for connection 98321bc0, Handshake 2025/04/30 11:03:55 server Long Header{Type: Handshake, DestConnectionID: 98321bc0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:03:55 server Dropping Initial keys. 2025/04/30 11:03:55 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:03:55 server newly acked packets (1): [2] 2025/04/30 11:03:55 server updated RTT: 33.839ms (σ: 13.19ms) 2025/04/30 11:03:55 server Canceling loss detection timer. 2025/04/30 11:03:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:55 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:55 Retiring connection ID ff0a5495f458c161f047a6f4a65d in 5s. 2025/04/30 11:03:55 server Dropping Handshake keys. 2025/04/30 11:03:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:55 server -> Sending packet 2 (323 bytes) for connection ff0a5495f458c161f047a6f4a65d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:55 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 311df184, StatelessResetToken: 0x62687a59e9f37bc6b4d67dc4bd2d587e} 2025/04/30 11:03:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 387d7e87, StatelessResetToken: 0xc4187397dbb1d3f495c853a73f707381} 2025/04/30 11:03:55 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:55 server -> &wire.NewTokenFrame{Token: 0xcbb7c7f0da5e6a0473436983b8a0f62b5deeebf4d9a7806fb18431eb6c42baa06ae5aae1a7b9c86864a308805252109df981bde4ee10b17b1e7b8463b143dcddfa83f4e9cd7865f9725c42e89be91526c76d513af2b4} 2025/04/30 11:03:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb195d5d, StatelessResetToken: 0xb78341889826e39961c66abb63c5e91b} 2025/04/30 11:03:55 server -> Sending packet 3 (323 bytes) for connection ff0a5495f458c161f047a6f4a65d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:55 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 server -> &wire.NewTokenFrame{Token: 0xcbb7c7f0da5e6a0473436983b8a0f62b5deeebf4d9a7806fb18431eb6c42baa06ae5aae1a7b9c86864a308805252109df981bde4ee10b17b1e7b8463b143dcddfa83f4e9cd7865f9725c42e89be91526c76d513af2b4} 2025/04/30 11:03:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 311df184, StatelessResetToken: 0x62687a59e9f37bc6b4d67dc4bd2d587e} 2025/04/30 11:03:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 387d7e87, StatelessResetToken: 0xc4187397dbb1d3f495c853a73f707381} 2025/04/30 11:03:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cb195d5d, StatelessResetToken: 0xb78341889826e39961c66abb63c5e91b} 2025/04/30 11:03:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:55 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:55 server <- Reading packet 0 (42 bytes) for connection 98321bc0, 1-RTT 2025/04/30 11:03:55 server Short Header{DestConnectionID: 98321bc0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:55 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:55 server -> Sending packet 4 (27 bytes) for connection ff0a5495f458c161f047a6f4a65d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:55 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 217.543µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:55 Received request: GET /eprlikampp 2025/04/30 11:03:55 server -> Sending packet 5 (1045 bytes) for connection ff0a5495f458c161f047a6f4a65d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:55 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:55 server <- Reading packet 1 (33 bytes) for connection 387d7e87, 1-RTT 2025/04/30 11:03:55 server Short Header{DestConnectionID: 387d7e87, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 112µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:55 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:55 Retiring connection ID 98321bc0 in 5s. 2025/04/30 11:03:55 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:55 server <- Reading packet 3 (26 bytes) for connection 387d7e87, 1-RTT 2025/04/30 11:03:55 server Short Header{DestConnectionID: 387d7e87, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:55 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:03:55 Replacing connection for connection IDs [387d7e87 311df184 cb195d5d] with a closed connection. 2025/04/30 11:03:55 server Connection ff0a5495f458c161f047a6f4a65d closed. 2025/04/30 11:03:55 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:03:55 server <- Received Initial packet. 2025/04/30 11:03:55 Created qlog file: /logs/qlog/8314cf9add8b5478.sqlog 2025/04/30 11:03:55 server Changing connection ID to 947224c7. 2025/04/30 11:03:55 Adding connection IDs 8314cf9add8b5478 and 947224c7 for a new connection. 2025/04/30 11:03:55 server <- Reading packet 0 (1280 bytes) for connection 8314cf9add8b5478, Initial 2025/04/30 11:03:55 server Long Header{Type: Initial, DestConnectionID: 8314cf9add8b5478, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:03:55 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:55 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:55 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:55 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:55 Adding connection ID 004daf06. 2025/04/30 11:03:55 Adding connection ID ded46327. 2025/04/30 11:03:55 Adding connection ID 58579102. 2025/04/30 11:03:55 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8314cf9add8b5478 2025/04/30 11:03:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 947224c7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 438, Version: v1} 2025/04/30 11:03:55 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 947224c7, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:03:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:03:55 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ded46327, StatelessResetToken: 0x980d48862e6d5f756129547c02ae9af5} 2025/04/30 11:03:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 004daf06, StatelessResetToken: 0xc777a3b8f4fcc2be72d4b7b221f73fd1} 2025/04/30 11:03:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 58579102, StatelessResetToken: 0x7fc589fc6f6cedb0845da69e5e7c5012} 2025/04/30 11:03:56 server <- Reading packet 1 (1280 bytes) for connection 8314cf9add8b5478, Initial 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: 8314cf9add8b5478, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:03:56 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:56 server -> Sending packet 1 (1280 bytes) for connection 8314cf9add8b5478, Initial 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 947224c7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:56 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:56 server -> Sending packet 2 (1280 bytes) for connection 8314cf9add8b5478, Initial 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 947224c7, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:56 server <- Reading packet 3 (1280 bytes) for connection 947224c7, Initial 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: 947224c7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:56 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:56 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:03:56 server -> Sending packet 1 (737 bytes) for connection 8314cf9add8b5478, Handshake 2025/04/30 11:03:56 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 947224c7, PacketNumber: 1, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:03:56 server -> Sending packet 2 (737 bytes) for connection 8314cf9add8b5478, Handshake 2025/04/30 11:03:56 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 947224c7, PacketNumber: 2, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 11:03:56 server <- Reading packet 0 (75 bytes) for connection 947224c7, Handshake 2025/04/30 11:03:56 server Long Header{Type: Handshake, DestConnectionID: 947224c7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:03:56 server Dropping Initial keys. 2025/04/30 11:03:56 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:56 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 Retiring connection ID 8314cf9add8b5478 in 5s. 2025/04/30 11:03:56 server Dropping Handshake keys. 2025/04/30 11:03:56 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:56 server -> Sending packet 2 (320 bytes) for connection 8314cf9add8b5478, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:56 server -> &wire.NewTokenFrame{Token: 0x3264ba7a482ec8394b425df2912c017d806b0b3c8c94e52bd121413a8ce30202ca38e8a5f997d2c991e5446a51685892bf2aedf318f3f7f5021a4799854ab362d04e278878dabe658a8466dd7acaf709d51a79217c78} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 004daf06, StatelessResetToken: 0xc777a3b8f4fcc2be72d4b7b221f73fd1} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 58579102, StatelessResetToken: 0x7fc589fc6f6cedb0845da69e5e7c5012} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ded46327, StatelessResetToken: 0x980d48862e6d5f756129547c02ae9af5} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:03:56 server -> Sending packet 3 (320 bytes) for connection 8314cf9add8b5478, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 58579102, StatelessResetToken: 0x7fc589fc6f6cedb0845da69e5e7c5012} 2025/04/30 11:03:56 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ded46327, StatelessResetToken: 0x980d48862e6d5f756129547c02ae9af5} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 004daf06, StatelessResetToken: 0xc777a3b8f4fcc2be72d4b7b221f73fd1} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:03:56 server -> &wire.NewTokenFrame{Token: 0x3264ba7a482ec8394b425df2912c017d806b0b3c8c94e52bd121413a8ce30202ca38e8a5f997d2c991e5446a51685892bf2aedf318f3f7f5021a4799854ab362d04e278878dabe658a8466dd7acaf709d51a79217c78} 2025/04/30 11:03:56 server -> Sending packet 4 (1366 bytes) for connection 8314cf9add8b5478, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.PingFrame{} 2025/04/30 11:03:56 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:03:56 server <- Reading packet 2 (33 bytes) for connection 004daf06, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: 004daf06, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 160µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:56 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:56 Retiring connection ID 947224c7 in 5s. 2025/04/30 11:03:56 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:56 server -> Sending packet 5 (27 bytes) for connection 8314cf9add8b5478, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 155.568µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:56 server <- Reading packet 3 (31 bytes) for connection 004daf06, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: 004daf06, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 80µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:56 server newly acked packets (2): [3 4] 2025/04/30 11:03:56 server updated RTT: 32.344158ms (σ: 16.172079ms) 2025/04/30 11:03:56 server ECN capability confirmed. 2025/04/30 11:03:56 server Canceling loss detection timer. 2025/04/30 11:03:56 server <- Reading packet 4 (42 bytes) for connection 004daf06, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: 004daf06, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:56 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:56 Received request: GET /ihkzyuiova 2025/04/30 11:03:56 server -> Sending packet 6 (1053 bytes) for connection 8314cf9add8b5478, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 244.165µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:56 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:56 server <- Reading packet 5 (26 bytes) for connection 004daf06, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: 004daf06, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:56 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:03:56 Replacing connection for connection IDs [004daf06 ded46327 58579102] with a closed connection. 2025/04/30 11:03:56 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:03:56 server Connection 8314cf9add8b5478 closed. 2025/04/30 11:03:56 server <- Received Initial packet. 2025/04/30 11:03:56 Created qlog file: /logs/qlog/20866a1eba579dd18ecd1c842aeb4b.sqlog 2025/04/30 11:03:56 server Changing connection ID to 522b15e7. 2025/04/30 11:03:56 Adding connection IDs 20866a1eba579dd18ecd1c842aeb4b and 522b15e7 for a new connection. 2025/04/30 11:03:56 server <- Reading packet 0 (1280 bytes) for connection 20866a1eba579dd18ecd1c842aeb4b, Initial 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: 20866a1eba579dd18ecd1c842aeb4b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:03:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:03:56 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:56 Adding connection ID da98d8ce. 2025/04/30 11:03:56 Adding connection ID 844b7577. 2025/04/30 11:03:56 Adding connection ID 0cd56ab9. 2025/04/30 11:03:56 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 20866a1eba579dd18ecd1c842aeb4b 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 522b15e7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 435, Version: v1} 2025/04/30 11:03:56 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:56 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 522b15e7, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: da98d8ce, StatelessResetToken: 0x41c60aed2193afc571dd87e66ac02f5f} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0cd56ab9, StatelessResetToken: 0x77f8cff2a9a42ea6a5bc7298c1d8956c} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 844b7577, StatelessResetToken: 0xcd04b321c7c67b43c554f735158f3b02} 2025/04/30 11:03:56 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:03:56 server <- Reading packet 1 (1185 bytes) for connection da98d8ce, Initial 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: da98d8ce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:03:56 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 server newly acked packets (1): [0] 2025/04/30 11:03:56 server updated RTT: 33.391743ms (σ: 16.695871ms) 2025/04/30 11:03:56 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:03:56 server <- Reading packet 0 (70 bytes) for connection da98d8ce, Handshake 2025/04/30 11:03:56 server Long Header{Type: Handshake, DestConnectionID: da98d8ce, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:56 server Dropping Initial keys. 2025/04/30 11:03:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:56 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 Retiring connection ID 20866a1eba579dd18ecd1c842aeb4b in 5s. 2025/04/30 11:03:56 server Dropping Handshake keys. 2025/04/30 11:03:56 server <- Reading packet 0 (25 bytes) for connection da98d8ce, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: da98d8ce, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:56 Retiring connection ID 522b15e7 in 5s. 2025/04/30 11:03:56 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:56 server -> Sending packet 1 (256 bytes) for connection 20866a1eba579dd18ecd1c842aeb4b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 325.166µs} 2025/04/30 11:03:56 server -> &wire.NewTokenFrame{Token: 0x4dd1ab44e3c4829740206c372f05128a55cf4e489269a04c13cbaa6b4a5df1585801231a87c0d1ecf533e9705fcfe4bd456d176c8627c7106f0f54706e2407fca61c2a76b150ca1f102ebe1811a04ad59573577d4983} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:56 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:56 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:03:56 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:03:56 server <- Reading packet 1 (42 bytes) for connection da98d8ce, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: da98d8ce, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:56 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:56 server <- Reading packet 2 (29 bytes) for connection da98d8ce, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: da98d8ce, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 768µs} 2025/04/30 11:03:56 server newly acked packets (1): [0] 2025/04/30 11:03:56 server updated RTT: 33.409ms (σ: 12.557ms) 2025/04/30 11:03:56 Received request: GET /whzolzomee 2025/04/30 11:03:56 server -> Sending packet 2 (1053 bytes) for connection 20866a1eba579dd18ecd1c842aeb4b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 445.614µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:56 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:56 server <- Reading packet 3 (33 bytes) for connection da98d8ce, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: da98d8ce, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:56 server newly acked packets (1): [2] 2025/04/30 11:03:56 server updated RTT: 33.185ms (σ: 9.864ms) 2025/04/30 11:03:56 server ECN capability confirmed. 2025/04/30 11:03:56 server setting loss timer for packet 1 (1-RTT) to 37.333125ms (in 2025-04-30 11:03:56.408340218 +0000 UTC m=+1.932062101) 2025/04/30 11:03:56 server Ignoring all packets below 3. 2025/04/30 11:03:56 server -> Sending packet 3 (22 bytes) for connection 20866a1eba579dd18ecd1c842aeb4b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:03:56 server <- Reading packet 4 (26 bytes) for connection da98d8ce, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: da98d8ce, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:56 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:03:56 Replacing connection for connection IDs [da98d8ce 844b7577 0cd56ab9] with a closed connection. 2025/04/30 11:03:56 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:03:56 server Connection 20866a1eba579dd18ecd1c842aeb4b closed. 2025/04/30 11:03:56 Tracking 15 connection IDs and 0 reset tokens. 2025/04/30 11:03:56 server <- Received Initial packet. 2025/04/30 11:03:56 Created qlog file: /logs/qlog/8f269cd2cdcf594c87a31a88ce.sqlog 2025/04/30 11:03:56 server Changing connection ID to 21613a67. 2025/04/30 11:03:56 Adding connection IDs 8f269cd2cdcf594c87a31a88ce and 21613a67 for a new connection. 2025/04/30 11:03:56 server <- Reading packet 2 (1280 bytes) for connection 8f269cd2cdcf594c87a31a88ce, Initial 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: 8f269cd2cdcf594c87a31a88ce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:03:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:03:56 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:56 Adding connection ID 8862a0fe. 2025/04/30 11:03:56 Adding connection ID ffde4c3d. 2025/04/30 11:03:56 Adding connection ID e21f1da4. 2025/04/30 11:03:56 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8f269cd2cdcf594c87a31a88ce 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 21613a67, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 422, Version: v1} 2025/04/30 11:03:56 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:56 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 21613a67, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e21f1da4, StatelessResetToken: 0x1a99afae821de7d91a32eedb48f498ac} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ffde4c3d, StatelessResetToken: 0x622a6e723f49b6e4677170a519cdab4b} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8862a0fe, StatelessResetToken: 0x636bf435c0e3c1a786eefbd4f3eef567} 2025/04/30 11:03:56 server Parsed a coalesced packet. Part 1: 1166 bytes. Remaining: 114 bytes. 2025/04/30 11:03:56 server <- Reading packet 3 (1166 bytes) for connection 8862a0fe, Initial 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: 8862a0fe, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:03:56 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 server newly acked packets (1): [0] 2025/04/30 11:03:56 server updated RTT: 33.593731ms (σ: 16.796865ms) 2025/04/30 11:03:56 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 44 bytes. 2025/04/30 11:03:56 server <- Reading packet 0 (70 bytes) for connection 8862a0fe, Handshake 2025/04/30 11:03:56 server Long Header{Type: Handshake, DestConnectionID: 8862a0fe, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:56 server Dropping Initial keys. 2025/04/30 11:03:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:56 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 Retiring connection ID 8f269cd2cdcf594c87a31a88ce in 5s. 2025/04/30 11:03:56 server Dropping Handshake keys. 2025/04/30 11:03:56 server <- Reading packet 0 (44 bytes) for connection 8862a0fe, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: 8862a0fe, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:56 Retiring connection ID 21613a67 in 5s. 2025/04/30 11:03:56 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:56 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:56 server -> Sending packet 1 (256 bytes) for connection 8f269cd2cdcf594c87a31a88ce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 346.967µs} 2025/04/30 11:03:56 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:56 server -> &wire.NewTokenFrame{Token: 0x95ccfc45be1393822d29d7187a97cc5ba4eb85ffbd246bb691a0d2ea31025df87a332139751659543c8dbd37e8585e2d393afe69d395e2dbd6595dde9d2de040dc2c6825ea26f04e2b690d10b3a083cf8dfcc6b38b06} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:56 Received request: GET /hwangfgopg 2025/04/30 11:03:56 server -> Sending packet 2 (1045 bytes) for connection 8f269cd2cdcf594c87a31a88ce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:56 server <- Reading packet 2 (31 bytes) for connection 8862a0fe, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: 8862a0fe, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:03:56 server newly acked packets (3): [0 1 2] 2025/04/30 11:03:56 server updated RTT: 33.342ms (σ: 13.097ms) 2025/04/30 11:03:56 server ECN capability confirmed. 2025/04/30 11:03:56 server Canceling loss detection timer. 2025/04/30 11:03:56 server Ignoring all packets below 1. 2025/04/30 11:03:56 server -> Sending packet 3 (22 bytes) for connection 8f269cd2cdcf594c87a31a88ce, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:03:56 server <- Reading packet 3 (26 bytes) for connection 8862a0fe, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: 8862a0fe, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:56 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:03:56 Replacing connection for connection IDs [8862a0fe ffde4c3d e21f1da4] with a closed connection. 2025/04/30 11:03:56 server Connection 8f269cd2cdcf594c87a31a88ce closed. 2025/04/30 11:03:56 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:03:56 server <- Received Initial packet. 2025/04/30 11:03:56 Created qlog file: /logs/qlog/39567dd5221aa0ced18aac6edae9713119833f.sqlog 2025/04/30 11:03:56 server Changing connection ID to d95540b6. 2025/04/30 11:03:56 Adding connection IDs 39567dd5221aa0ced18aac6edae9713119833f and d95540b6 for a new connection. 2025/04/30 11:03:56 server <- Reading packet 0 (1280 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, Initial 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: 39567dd5221aa0ced18aac6edae9713119833f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:03:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:03:56 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:56 Adding connection ID 8be8e33d. 2025/04/30 11:03:56 Adding connection ID d8d6e31a. 2025/04/30 11:03:56 Adding connection ID 1b122859. 2025/04/30 11:03:56 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d95540b6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 426, Version: v1} 2025/04/30 11:03:56 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:56 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d95540b6, PacketNumber: 0, PacketNumberLen: 2, Length: 736, Version: v1} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8be8e33d, StatelessResetToken: 0x86b2c747f6dfb3e3750ad24e40587aaf} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d8d6e31a, StatelessResetToken: 0x5fad0b92f475e2ea4ea04e805b931040} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1b122859, StatelessResetToken: 0x1ff4481fe5dc6e44575e996602458d42} 2025/04/30 11:03:56 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:03:56 server <- Reading packet 1 (1185 bytes) for connection 8be8e33d, Initial 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: 8be8e33d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:03:56 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 server newly acked packets (1): [0] 2025/04/30 11:03:56 server updated RTT: 33.701679ms (σ: 16.850839ms) 2025/04/30 11:03:56 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:03:56 server <- Reading packet 0 (70 bytes) for connection 8be8e33d, Handshake 2025/04/30 11:03:56 server Long Header{Type: Handshake, DestConnectionID: 8be8e33d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:56 server Dropping Initial keys. 2025/04/30 11:03:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:56 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 Retiring connection ID 39567dd5221aa0ced18aac6edae9713119833f in 5s. 2025/04/30 11:03:56 server Dropping Handshake keys. 2025/04/30 11:03:56 server <- Reading packet 0 (25 bytes) for connection 8be8e33d, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: 8be8e33d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:56 Retiring connection ID d95540b6 in 5s. 2025/04/30 11:03:56 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:56 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:03:56 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:03:56 server <- Reading packet 1 (42 bytes) for connection 8be8e33d, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: 8be8e33d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:56 server -> Sending packet 1 (256 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 400.177µs} 2025/04/30 11:03:56 Received request: GET /pvrxqgboht 2025/04/30 11:03:56 server -> &wire.NewTokenFrame{Token: 0xae1fd7e4aa5c046ed55eb95c26470625dd9e2c0d30826fe137dbefc0c61c3a5eb1fea6bdb76189c8867fdbc46850ebc2d0768eb8029e6f00578e9651f7e54db47f1caca1bf8eaa3b54f3dc458784b5ef5ff540635f27} 2025/04/30 11:03:56 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:56 server <- Reading packet 2 (29 bytes) for connection 8be8e33d, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: 8be8e33d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.04ms} 2025/04/30 11:03:56 server newly acked packets (1): [0] 2025/04/30 11:03:56 server updated RTT: 33.71ms (σ: 12.656ms) 2025/04/30 11:03:56 server -> Sending packet 2 (1045 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:56 server -> Sending packet 3 (23 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:03:56 server <- Received Initial packet. 2025/04/30 11:03:56 Created qlog file: /logs/qlog/b9607d3b15b8b7c8533b.sqlog 2025/04/30 11:03:56 server Changing connection ID to ffab97a8. 2025/04/30 11:03:56 Adding connection IDs b9607d3b15b8b7c8533b and ffab97a8 for a new connection. 2025/04/30 11:03:56 server <- Reading packet 0 (1280 bytes) for connection b9607d3b15b8b7c8533b, Initial 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: b9607d3b15b8b7c8533b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:03:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:03:56 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:56 Adding connection ID f991ea3a. 2025/04/30 11:03:56 Adding connection ID 9d15daed. 2025/04/30 11:03:56 Adding connection ID f1a43805. 2025/04/30 11:03:56 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b9607d3b15b8b7c8533b 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ffab97a8, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 434, Version: v1} 2025/04/30 11:03:56 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:56 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ffab97a8, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f991ea3a, StatelessResetToken: 0xce0f0dc66ecbd95813052a654bf4b55a} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9d15daed, StatelessResetToken: 0x4a5681488717a277e19500bd9c4a3f28} 2025/04/30 11:03:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f1a43805, StatelessResetToken: 0x0904b7a84ad2bc0d691df14cf4bcb4d5} 2025/04/30 11:03:56 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:03:56 server <- Reading packet 1 (1185 bytes) for connection f991ea3a, Initial 2025/04/30 11:03:56 server Long Header{Type: Initial, DestConnectionID: f991ea3a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:03:56 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:56 server newly acked packets (1): [0] 2025/04/30 11:03:56 server updated RTT: 33.472086ms (σ: 16.736043ms) 2025/04/30 11:03:56 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:03:56 server <- Reading packet 0 (70 bytes) for connection f991ea3a, Handshake 2025/04/30 11:03:56 server Long Header{Type: Handshake, DestConnectionID: f991ea3a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:56 server Dropping Initial keys. 2025/04/30 11:03:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:56 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:56 Retiring connection ID b9607d3b15b8b7c8533b in 5s. 2025/04/30 11:03:56 server Dropping Handshake keys. 2025/04/30 11:03:56 server <- Reading packet 0 (25 bytes) for connection f991ea3a, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: f991ea3a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:56 Retiring connection ID ffab97a8 in 5s. 2025/04/30 11:03:56 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:56 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:03:56 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:03:56 server <- Reading packet 1 (42 bytes) for connection f991ea3a, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: f991ea3a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:56 server -> Sending packet 1 (256 bytes) for connection b9607d3b15b8b7c8533b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 362.205µs} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:56 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:56 server -> &wire.NewTokenFrame{Token: 0x67b5772da688c82ab4a04ac4338c33349ff432c6d16abb6376c39671ee3ead69fe9029a3eeb39b1076f2ca4aa920d53dc13fbcb58fce4aace63bd69bc51d13a58d4d7f8aca79830d775ec7f0e875e05261419badc697} 2025/04/30 11:03:56 Received request: GET /hfdgrinrpk 2025/04/30 11:03:56 server -> Sending packet 2 (1045 bytes) for connection b9607d3b15b8b7c8533b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:56 server <- Reading packet 4 (26 bytes) for connection f991ea3a, 1-RTT 2025/04/30 11:03:56 server Short Header{DestConnectionID: f991ea3a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:56 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:03:56 Replacing connection for connection IDs [f991ea3a 9d15daed f1a43805] with a closed connection. 2025/04/30 11:03:56 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:03:56 server Connection b9607d3b15b8b7c8533b closed. 2025/04/30 11:03:56 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:56 server -> Sending packet 5 (251 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:56 server -> &wire.NewTokenFrame{Token: 0xae1fd7e4aa5c046ed55eb95c26470625dd9e2c0d30826fe137dbefc0c61c3a5eb1fea6bdb76189c8867fdbc46850ebc2d0768eb8029e6f00578e9651f7e54db47f1caca1bf8eaa3b54f3dc458784b5ef5ff540635f27} 2025/04/30 11:03:56 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:56 server Skipping packet number 4 2025/04/30 11:03:56 server -> Sending packet 6 (1045 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:56 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:56 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:57 server <- Received Initial packet. 2025/04/30 11:03:57 Created qlog file: /logs/qlog/aba5aca260a882f333a08623539a9c95.sqlog 2025/04/30 11:03:57 server Changing connection ID to 67100921. 2025/04/30 11:03:57 Adding connection IDs aba5aca260a882f333a08623539a9c95 and 67100921 for a new connection. 2025/04/30 11:03:57 server <- Reading packet 1 (1280 bytes) for connection aba5aca260a882f333a08623539a9c95, Initial 2025/04/30 11:03:57 server Long Header{Type: Initial, DestConnectionID: aba5aca260a882f333a08623539a9c95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:03:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:03:57 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:57 Adding connection ID 55decf46. 2025/04/30 11:03:57 Adding connection ID a5f2168e. 2025/04/30 11:03:57 Adding connection ID 2b9098c3. 2025/04/30 11:03:57 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection aba5aca260a882f333a08623539a9c95 2025/04/30 11:03:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 67100921, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 428, Version: v1} 2025/04/30 11:03:57 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:57 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 67100921, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5f2168e, StatelessResetToken: 0xf3d8a76af3bba39472e15914d10e127a} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 55decf46, StatelessResetToken: 0xc86d7f109fbde828439ab3197aeb8713} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2b9098c3, StatelessResetToken: 0x1fb0263e8faa1a8c43d6733eb27d01b9} 2025/04/30 11:03:57 server <- Reading packet 2 (1280 bytes) for connection aba5aca260a882f333a08623539a9c95, Initial 2025/04/30 11:03:57 server Long Header{Type: Initial, DestConnectionID: aba5aca260a882f333a08623539a9c95, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:03:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:03:57 server -> Sending packet 1 (37 bytes) for connection aba5aca260a882f333a08623539a9c95, Initial 2025/04/30 11:03:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 67100921, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:57 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:03:57 server -> Sending packet 8 (23 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:03:57 server Skipping packet number 7 2025/04/30 11:03:57 server -> Sending packet 9 (251 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.NewTokenFrame{Token: 0xae1fd7e4aa5c046ed55eb95c26470625dd9e2c0d30826fe137dbefc0c61c3a5eb1fea6bdb76189c8867fdbc46850ebc2d0768eb8029e6f00578e9651f7e54db47f1caca1bf8eaa3b54f3dc458784b5ef5ff540635f27} 2025/04/30 11:03:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:57 server -> Sending packet 10 (1366 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.PingFrame{} 2025/04/30 11:03:57 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:03:57 server <- Reading packet 1 (36 bytes) for connection 55decf46, Handshake 2025/04/30 11:03:57 server Long Header{Type: Handshake, DestConnectionID: 55decf46, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:57 server Dropping Initial keys. 2025/04/30 11:03:57 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:57 server newly acked packets (1): [0] 2025/04/30 11:03:57 server updated RTT: 33.810797ms (σ: 16.905398ms) 2025/04/30 11:03:57 server Canceling loss detection timer. 2025/04/30 11:03:57 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:03:57 server <- Reading packet 4 (70 bytes) for connection 55decf46, Handshake 2025/04/30 11:03:57 server Long Header{Type: Handshake, DestConnectionID: 55decf46, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:57 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 Retiring connection ID aba5aca260a882f333a08623539a9c95 in 5s. 2025/04/30 11:03:57 server Dropping Handshake keys. 2025/04/30 11:03:57 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:03:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:57 server -> Sending packet 2 (323 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2b9098c3, StatelessResetToken: 0x1fb0263e8faa1a8c43d6733eb27d01b9} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 55decf46, StatelessResetToken: 0xc86d7f109fbde828439ab3197aeb8713} 2025/04/30 11:03:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:57 server -> &wire.NewTokenFrame{Token: 0x81db0bbf8c00d9d680611bc56186a7212b2f5fdd198cee7b93b0ad535d3dc757d7068a7d5d4a20c1faa47f65d8cc044b3e46a4bc341c244394a34e3d98e0bf94f5b1a57306dde875ae9e4d0b67ce5c3dba0bedfc7fa0} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5f2168e, StatelessResetToken: 0xf3d8a76af3bba39472e15914d10e127a} 2025/04/30 11:03:57 server -> Sending packet 3 (323 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 55decf46, StatelessResetToken: 0xc86d7f109fbde828439ab3197aeb8713} 2025/04/30 11:03:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5f2168e, StatelessResetToken: 0xf3d8a76af3bba39472e15914d10e127a} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2b9098c3, StatelessResetToken: 0x1fb0263e8faa1a8c43d6733eb27d01b9} 2025/04/30 11:03:57 server -> &wire.NewTokenFrame{Token: 0x81db0bbf8c00d9d680611bc56186a7212b2f5fdd198cee7b93b0ad535d3dc757d7068a7d5d4a20c1faa47f65d8cc044b3e46a4bc341c244394a34e3d98e0bf94f5b1a57306dde875ae9e4d0b67ce5c3dba0bedfc7fa0} 2025/04/30 11:03:57 server <- Reading packet 1 (42 bytes) for connection 55decf46, 1-RTT 2025/04/30 11:03:57 server Short Header{DestConnectionID: 55decf46, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:57 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:57 server -> Sending packet 4 (27 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 308.68772ms} 2025/04/30 11:03:57 Received request: GET /fcnflvmlxx 2025/04/30 11:03:57 server -> Sending packet 5 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:57 server <- Reading packet 5 (42 bytes) for connection 55decf46, 1-RTT 2025/04/30 11:03:57 server Short Header{DestConnectionID: 55decf46, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:57 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:57 server -> Sending packet 6 (29 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 69.109µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:57 server <- Reading packet 6 (34 bytes) for connection 55decf46, 1-RTT 2025/04/30 11:03:57 server Short Header{DestConnectionID: 55decf46, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.248ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:57 server newly acked packets (1): [3] 2025/04/30 11:03:57 server ECN capability confirmed. 2025/04/30 11:03:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:57 server -> Sending packet 8 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:57 server -> Sending packet 9 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:03:57 server -> Sending packet 12 (1045 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:57 server Skipping packet number 11 2025/04/30 11:03:57 server -> Sending packet 13 (23 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:03:57 server <- Reading packet 8 (37 bytes) for connection 55decf46, 1-RTT 2025/04/30 11:03:57 server Short Header{DestConnectionID: 55decf46, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 96µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:03:57 server <- Received Initial packet. 2025/04/30 11:03:57 Created qlog file: /logs/qlog/d67ee5ac708ffd47.sqlog 2025/04/30 11:03:57 server Changing connection ID to c7c00879. 2025/04/30 11:03:57 Adding connection IDs d67ee5ac708ffd47 and c7c00879 for a new connection. 2025/04/30 11:03:57 server <- Reading packet 0 (1280 bytes) for connection d67ee5ac708ffd47, Initial 2025/04/30 11:03:57 server Long Header{Type: Initial, DestConnectionID: d67ee5ac708ffd47, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:03:57 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:57 Adding connection ID a941edda. 2025/04/30 11:03:57 Adding connection ID 614eac2f. 2025/04/30 11:03:57 Adding connection ID 0b81e58d. 2025/04/30 11:03:57 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d67ee5ac708ffd47 2025/04/30 11:03:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c7c00879, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:03:57 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:57 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c7c00879, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b81e58d, StatelessResetToken: 0x77e22a63e85540a98d55eb11f603a9e0} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 614eac2f, StatelessResetToken: 0xab9e50092544feaae1b1c48d2cef8041} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a941edda, StatelessResetToken: 0x5387d68c19a68fb386bde14992e7448f} 2025/04/30 11:03:57 server <- Reading packet 1 (1280 bytes) for connection d67ee5ac708ffd47, Initial 2025/04/30 11:03:57 server Long Header{Type: Initial, DestConnectionID: d67ee5ac708ffd47, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:03:57 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:57 server -> Sending packet 1 (1280 bytes) for connection d67ee5ac708ffd47, Initial 2025/04/30 11:03:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c7c00879, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:57 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:57 server -> Sending packet 2 (1280 bytes) for connection d67ee5ac708ffd47, Initial 2025/04/30 11:03:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: c7c00879, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:03:57 server -> Sending packet 11 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:57 server -> Sending packet 12 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:57 server -> Sending packet 13 (1366 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.PingFrame{} 2025/04/30 11:03:57 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:03:57 server -> Sending packet 1 (744 bytes) for connection d67ee5ac708ffd47, Handshake 2025/04/30 11:03:57 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c7c00879, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:03:57 server -> Sending packet 2 (744 bytes) for connection d67ee5ac708ffd47, Handshake 2025/04/30 11:03:57 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: c7c00879, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:03:57 server <- Reading packet 0 (75 bytes) for connection c7c00879, Handshake 2025/04/30 11:03:57 server Long Header{Type: Handshake, DestConnectionID: c7c00879, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:03:57 server Dropping Initial keys. 2025/04/30 11:03:57 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:03:57 server newly acked packets (1): [2] 2025/04/30 11:03:57 server updated RTT: 32.568254ms (σ: 16.284127ms) 2025/04/30 11:03:57 server Canceling loss detection timer. 2025/04/30 11:03:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:57 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 Retiring connection ID d67ee5ac708ffd47 in 5s. 2025/04/30 11:03:57 server Dropping Handshake keys. 2025/04/30 11:03:57 server <- Reading packet 0 (42 bytes) for connection c7c00879, 1-RTT 2025/04/30 11:03:57 server Short Header{DestConnectionID: c7c00879, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:57 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:57 server -> Sending packet 2 (331 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 Received request: GET /dpghiztsjk 2025/04/30 11:03:57 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 361.324µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 614eac2f, StatelessResetToken: 0xab9e50092544feaae1b1c48d2cef8041} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:57 server -> &wire.NewTokenFrame{Token: 0x42432b220a65aad352c01503df415b82eb209d62dd7b9c54df3224dcd02d020b45cc93103bb3b15bfb435a5f48c9613dbb86b81620158aff151b88e4f3fdec1d1105c3d8f8fa4c9f5f35b72b4d82877e5e6b8573b7ce} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a941edda, StatelessResetToken: 0x5387d68c19a68fb386bde14992e7448f} 2025/04/30 11:03:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b81e58d, StatelessResetToken: 0x77e22a63e85540a98d55eb11f603a9e0} 2025/04/30 11:03:57 server -> Sending packet 3 (323 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b81e58d, StatelessResetToken: 0x77e22a63e85540a98d55eb11f603a9e0} 2025/04/30 11:03:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:57 server -> &wire.NewTokenFrame{Token: 0x42432b220a65aad352c01503df415b82eb209d62dd7b9c54df3224dcd02d020b45cc93103bb3b15bfb435a5f48c9613dbb86b81620158aff151b88e4f3fdec1d1105c3d8f8fa4c9f5f35b72b4d82877e5e6b8573b7ce} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 614eac2f, StatelessResetToken: 0xab9e50092544feaae1b1c48d2cef8041} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a941edda, StatelessResetToken: 0x5387d68c19a68fb386bde14992e7448f} 2025/04/30 11:03:57 server -> Sending packet 4 (1045 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:57 server <- Received Initial packet. 2025/04/30 11:03:57 Created qlog file: /logs/qlog/59994b531dd076da.sqlog 2025/04/30 11:03:57 server Changing connection ID to 34f1db42. 2025/04/30 11:03:57 Adding connection IDs 59994b531dd076da and 34f1db42 for a new connection. 2025/04/30 11:03:57 server <- Reading packet 0 (1280 bytes) for connection 59994b531dd076da, Initial 2025/04/30 11:03:57 server Long Header{Type: Initial, DestConnectionID: 59994b531dd076da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:03:57 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:57 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:57 Adding connection ID 7dffab58. 2025/04/30 11:03:57 Adding connection ID c5aeb7e1. 2025/04/30 11:03:57 Adding connection ID 1234b61c. 2025/04/30 11:03:57 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 59994b531dd076da 2025/04/30 11:03:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34f1db42, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 442, Version: v1} 2025/04/30 11:03:57 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:57 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f1db42, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:03:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:03:57 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1234b61c, StatelessResetToken: 0xc9904a783cfef5fc0d15068ed1cbc814} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c5aeb7e1, StatelessResetToken: 0x4cd090529058da9db99a8b16051b7182} 2025/04/30 11:03:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7dffab58, StatelessResetToken: 0xa01ccf37a8f49872646c8dbbeab21502} 2025/04/30 11:03:58 server <- Reading packet 1 (1280 bytes) for connection 59994b531dd076da, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: 59994b531dd076da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:03:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:03:58 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:58 server -> Sending packet 1 (1280 bytes) for connection 59994b531dd076da, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34f1db42, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:58 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:58 server -> Sending packet 2 (1280 bytes) for connection 59994b531dd076da, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34f1db42, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:03:58 server -> Sending packet 6 (323 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b81e58d, StatelessResetToken: 0x77e22a63e85540a98d55eb11f603a9e0} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a941edda, StatelessResetToken: 0x5387d68c19a68fb386bde14992e7448f} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:58 server -> &wire.NewTokenFrame{Token: 0x42432b220a65aad352c01503df415b82eb209d62dd7b9c54df3224dcd02d020b45cc93103bb3b15bfb435a5f48c9613dbb86b81620158aff151b88e4f3fdec1d1105c3d8f8fa4c9f5f35b72b4d82877e5e6b8573b7ce} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 614eac2f, StatelessResetToken: 0xab9e50092544feaae1b1c48d2cef8041} 2025/04/30 11:03:58 server Skipping packet number 5 2025/04/30 11:03:58 server -> Sending packet 7 (1045 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:58 server -> Sending packet 8 (1366 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.PingFrame{} 2025/04/30 11:03:58 server <- Reading packet 3 (1280 bytes) for connection 34f1db42, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: 34f1db42, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:58 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:58 server <- Reading packet 4 (1280 bytes) for connection 34f1db42, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: 34f1db42, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:58 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:58 server newly acked packets (1): [2] 2025/04/30 11:03:58 server updated RTT: 34.059925ms (σ: 17.029962ms) 2025/04/30 11:03:58 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:03:58 server -> Sending packet 1 (733 bytes) for connection 59994b531dd076da, Handshake 2025/04/30 11:03:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f1db42, PacketNumber: 1, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:03:58 server -> Sending packet 2 (733 bytes) for connection 59994b531dd076da, Handshake 2025/04/30 11:03:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34f1db42, PacketNumber: 2, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 11:03:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:03:58 server -> Sending packet 15 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:58 server -> Sending packet 16 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:58 server <- Reading packet 0 (75 bytes) for connection 34f1db42, Handshake 2025/04/30 11:03:58 server Long Header{Type: Handshake, DestConnectionID: 34f1db42, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:03:58 server Dropping Initial keys. 2025/04/30 11:03:58 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:58 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 Retiring connection ID 59994b531dd076da in 5s. 2025/04/30 11:03:58 server Dropping Handshake keys. 2025/04/30 11:03:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:58 server -> Sending packet 2 (323 bytes) for connection 59994b531dd076da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c5aeb7e1, StatelessResetToken: 0x4cd090529058da9db99a8b16051b7182} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1234b61c, StatelessResetToken: 0xc9904a783cfef5fc0d15068ed1cbc814} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7dffab58, StatelessResetToken: 0xa01ccf37a8f49872646c8dbbeab21502} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:58 server -> &wire.NewTokenFrame{Token: 0x9cdceeeb543578d0abdf1923c116df65a1f4ffa8858d080602059215edc030e4afd1386e2a03fd0d7e70e54d068f0fb52af5304686957c36b5751de2c1c46c53422a338b2722f7f817d213771e70e56a745df73dca0d} 2025/04/30 11:03:58 server -> Sending packet 3 (323 bytes) for connection 59994b531dd076da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c5aeb7e1, StatelessResetToken: 0x4cd090529058da9db99a8b16051b7182} 2025/04/30 11:03:58 server -> &wire.NewTokenFrame{Token: 0x9cdceeeb543578d0abdf1923c116df65a1f4ffa8858d080602059215edc030e4afd1386e2a03fd0d7e70e54d068f0fb52af5304686957c36b5751de2c1c46c53422a338b2722f7f817d213771e70e56a745df73dca0d} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7dffab58, StatelessResetToken: 0xa01ccf37a8f49872646c8dbbeab21502} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1234b61c, StatelessResetToken: 0xc9904a783cfef5fc0d15068ed1cbc814} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:58 server <- Reading packet 0 (42 bytes) for connection 34f1db42, 1-RTT 2025/04/30 11:03:58 server Short Header{DestConnectionID: 34f1db42, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:58 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:58 server -> Sending packet 4 (27 bytes) for connection 59994b531dd076da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 363.746µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:58 Received request: GET /suckhndyxv 2025/04/30 11:03:58 server -> Sending packet 5 (1045 bytes) for connection 59994b531dd076da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:58 server <- Reading packet 1 (1366 bytes) for connection 7dffab58, 1-RTT 2025/04/30 11:03:58 server Short Header{DestConnectionID: 7dffab58, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server <- &wire.PingFrame{} 2025/04/30 11:03:58 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:58 server <- Reading packet 2 (33 bytes) for connection 7dffab58, 1-RTT 2025/04/30 11:03:58 server Short Header{DestConnectionID: 7dffab58, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 192µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:58 server newly acked packets (1): [3] 2025/04/30 11:03:58 server updated RTT: 33.867ms (σ: 13.154ms) 2025/04/30 11:03:58 server ECN capability confirmed. 2025/04/30 11:03:58 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:58 Retiring connection ID 34f1db42 in 5s. 2025/04/30 11:03:58 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:03:58 server -> Sending packet 6 (27 bytes) for connection 59994b531dd076da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 92.413µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:58 server -> Sending packet 8 (1045 bytes) for connection 59994b531dd076da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:58 server -> Sending packet 9 (1045 bytes) for connection 59994b531dd076da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:03:58 server -> Sending packet 15 (251 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:58 server -> &wire.NewTokenFrame{Token: 0xae1fd7e4aa5c046ed55eb95c26470625dd9e2c0d30826fe137dbefc0c61c3a5eb1fea6bdb76189c8867fdbc46850ebc2d0768eb8029e6f00578e9651f7e54db47f1caca1bf8eaa3b54f3dc458784b5ef5ff540635f27} 2025/04/30 11:03:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:58 server Skipping packet number 14 2025/04/30 11:03:58 server -> Sending packet 16 (1045 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:58 server <- Reading packet 4 (26 bytes) for connection 7dffab58, 1-RTT 2025/04/30 11:03:58 server Short Header{DestConnectionID: 7dffab58, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:58 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:03:58 Replacing connection for connection IDs [1234b61c 7dffab58 c5aeb7e1] with a closed connection. 2025/04/30 11:03:58 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:03:58 server Connection 59994b531dd076da closed. 2025/04/30 11:03:58 server <- Received Initial packet. 2025/04/30 11:03:58 Created qlog file: /logs/qlog/f908be740ec22be506c1f812ab37e5adf589d274.sqlog 2025/04/30 11:03:58 server Changing connection ID to 9dfed28f. 2025/04/30 11:03:58 Adding connection IDs f908be740ec22be506c1f812ab37e5adf589d274 and 9dfed28f for a new connection. 2025/04/30 11:03:58 server <- Reading packet 0 (1280 bytes) for connection f908be740ec22be506c1f812ab37e5adf589d274, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: f908be740ec22be506c1f812ab37e5adf589d274, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 11:03:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:03:58 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:58 Adding connection ID 8428fff6. 2025/04/30 11:03:58 Adding connection ID aaf109ae. 2025/04/30 11:03:58 Adding connection ID f85c12bd. 2025/04/30 11:03:58 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f908be740ec22be506c1f812ab37e5adf589d274 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9dfed28f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 423, Version: v1} 2025/04/30 11:03:58 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9dfed28f, PacketNumber: 0, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aaf109ae, StatelessResetToken: 0xb02ac14634b96e4fdeb712e958e26e2e} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f85c12bd, StatelessResetToken: 0xce8c5eecd9630f243fec4b712af7d360} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8428fff6, StatelessResetToken: 0xc13ce3ad0f39cf7310adc8d5c3293e0d} 2025/04/30 11:03:58 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:03:58 server <- Reading packet 1 (1185 bytes) for connection 8428fff6, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: 8428fff6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:03:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:58 server newly acked packets (1): [0] 2025/04/30 11:03:58 server updated RTT: 33.356215ms (σ: 16.678107ms) 2025/04/30 11:03:58 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:03:58 server <- Reading packet 0 (70 bytes) for connection 8428fff6, Handshake 2025/04/30 11:03:58 server Long Header{Type: Handshake, DestConnectionID: 8428fff6, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:58 server Dropping Initial keys. 2025/04/30 11:03:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:58 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 Retiring connection ID f908be740ec22be506c1f812ab37e5adf589d274 in 5s. 2025/04/30 11:03:58 server Dropping Handshake keys. 2025/04/30 11:03:58 server <- Reading packet 0 (25 bytes) for connection 8428fff6, 1-RTT 2025/04/30 11:03:58 server Short Header{DestConnectionID: 8428fff6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:58 Retiring connection ID 9dfed28f in 5s. 2025/04/30 11:03:58 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:58 server -> Sending packet 1 (256 bytes) for connection f908be740ec22be506c1f812ab37e5adf589d274, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 294.8µs} 2025/04/30 11:03:58 server -> &wire.NewTokenFrame{Token: 0x933e1ebc833c910d0afeea5d0c8a3b2c724b279be0c7de7a19b9d2af3a3536139baedab2ed58fa240e4bddcf40d4fc64d97661020644ff67b5a30a8d2546dddc402b2cad9303eb73f8615c39675a5fa98b1f6003075f} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:58 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:03:58 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:03:58 server <- Reading packet 1 (42 bytes) for connection 8428fff6, 1-RTT 2025/04/30 11:03:58 server Short Header{DestConnectionID: 8428fff6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:58 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:58 server <- Reading packet 2 (29 bytes) for connection 8428fff6, 1-RTT 2025/04/30 11:03:58 server Short Header{DestConnectionID: 8428fff6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 728µs} 2025/04/30 11:03:58 server newly acked packets (1): [0] 2025/04/30 11:03:58 server updated RTT: 33.372ms (σ: 12.541ms) 2025/04/30 11:03:58 Received request: GET /yeofzovzxe 2025/04/30 11:03:58 server -> Sending packet 2 (1053 bytes) for connection f908be740ec22be506c1f812ab37e5adf589d274, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 427.908µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:58 server <- Reading packet 3 (33 bytes) for connection 8428fff6, 1-RTT 2025/04/30 11:03:58 server Short Header{DestConnectionID: 8428fff6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 104µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:58 server newly acked packets (1): [2] 2025/04/30 11:03:58 server updated RTT: 33.152ms (σ: 9.845ms) 2025/04/30 11:03:58 server ECN capability confirmed. 2025/04/30 11:03:58 server setting loss timer for packet 1 (1-RTT) to 37.296ms (in 2025-04-30 11:03:58.470781081 +0000 UTC m=+3.994502964) 2025/04/30 11:03:58 server Ignoring all packets below 3. 2025/04/30 11:03:58 server <- Reading packet 4 (26 bytes) for connection 8428fff6, 1-RTT 2025/04/30 11:03:58 server Short Header{DestConnectionID: 8428fff6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:58 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:03:58 Replacing connection for connection IDs [8428fff6 aaf109ae f85c12bd] with a closed connection. 2025/04/30 11:03:58 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:03:58 server Connection f908be740ec22be506c1f812ab37e5adf589d274 closed. 2025/04/30 11:03:58 server <- Received Initial packet. 2025/04/30 11:03:58 Created qlog file: /logs/qlog/5c706d7fcb8a3a075cea75f5d3.sqlog 2025/04/30 11:03:58 server Changing connection ID to 90be1d07. 2025/04/30 11:03:58 Adding connection IDs 5c706d7fcb8a3a075cea75f5d3 and 90be1d07 for a new connection. 2025/04/30 11:03:58 server <- Reading packet 0 (1280 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: 5c706d7fcb8a3a075cea75f5d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:03:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:03:58 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:58 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:58 Adding connection ID cc1d8ee7. 2025/04/30 11:03:58 Adding connection ID 2b4d78ba. 2025/04/30 11:03:58 Adding connection ID 43285caf. 2025/04/30 11:03:58 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5c706d7fcb8a3a075cea75f5d3 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 90be1d07, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 427, Version: v1} 2025/04/30 11:03:58 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 90be1d07, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2b4d78ba, StatelessResetToken: 0xdb3308c74748da0cd7f32e0e9d0dfaee} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cc1d8ee7, StatelessResetToken: 0xa010af9ad0a5e8e461638fed484ac60a} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 43285caf, StatelessResetToken: 0x6b38569af259718ade093470258f8e29} 2025/04/30 11:03:58 Tracking 55 connection IDs and 0 reset tokens. 2025/04/30 11:03:58 server <- Reading packet 1 (1280 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: 5c706d7fcb8a3a075cea75f5d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:03:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:03:58 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:03:58 server -> Sending packet 1 (1280 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 90be1d07, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:58 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:58 server -> Sending packet 2 (1280 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 90be1d07, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:58 server <- Reading packet 2 (1280 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: 5c706d7fcb8a3a075cea75f5d3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:03:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:03:58 server -> Sending packet 3 (37 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Initial 2025/04/30 11:03:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 90be1d07, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:58 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:03:58 server -> Sending packet 10 (323 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b81e58d, StatelessResetToken: 0x77e22a63e85540a98d55eb11f603a9e0} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a941edda, StatelessResetToken: 0x5387d68c19a68fb386bde14992e7448f} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 614eac2f, StatelessResetToken: 0xab9e50092544feaae1b1c48d2cef8041} 2025/04/30 11:03:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:58 server -> &wire.NewTokenFrame{Token: 0x42432b220a65aad352c01503df415b82eb209d62dd7b9c54df3224dcd02d020b45cc93103bb3b15bfb435a5f48c9613dbb86b81620158aff151b88e4f3fdec1d1105c3d8f8fa4c9f5f35b72b4d82877e5e6b8573b7ce} 2025/04/30 11:03:58 server Skipping packet number 9 2025/04/30 11:03:58 server -> Sending packet 11 (1045 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:58 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:58 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:03:58 server -> Sending packet 1 (748 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Handshake 2025/04/30 11:03:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 90be1d07, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:03:58 server -> Sending packet 2 (748 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, Handshake 2025/04/30 11:03:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 90be1d07, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:03:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:03:58 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:03:58 server <- Reading packet 1 (36 bytes) for connection 90be1d07, Handshake 2025/04/30 11:03:58 server Long Header{Type: Handshake, DestConnectionID: 90be1d07, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:58 server Dropping Initial keys. 2025/04/30 11:03:58 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:58 server newly acked packets (1): [2] 2025/04/30 11:03:58 server updated RTT: 31.983648ms (σ: 15.991824ms) 2025/04/30 11:03:58 server Canceling loss detection timer. 2025/04/30 11:03:59 server <- Reading packet 2 (70 bytes) for connection 90be1d07, Handshake 2025/04/30 11:03:59 server Long Header{Type: Handshake, DestConnectionID: 90be1d07, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:59 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 Retiring connection ID 5c706d7fcb8a3a075cea75f5d3 in 5s. 2025/04/30 11:03:59 server Dropping Handshake keys. 2025/04/30 11:03:59 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:03:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:59 server -> Sending packet 2 (323 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2b4d78ba, StatelessResetToken: 0xdb3308c74748da0cd7f32e0e9d0dfaee} 2025/04/30 11:03:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cc1d8ee7, StatelessResetToken: 0xa010af9ad0a5e8e461638fed484ac60a} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 43285caf, StatelessResetToken: 0x6b38569af259718ade093470258f8e29} 2025/04/30 11:03:59 server -> &wire.NewTokenFrame{Token: 0xc4aaaa4fe593f27209c63f62cbc4a47c74b0690d0a6b14f5cd49d06badfb5488d4fff8d19db5cd13e97cbcb835b3563c58b2e3d72d321a9afc2d0c5cc085b08f6940eea5583b2b8ca43524dc4272716f4f10b24a90a3} 2025/04/30 11:03:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 server -> Sending packet 3 (323 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cc1d8ee7, StatelessResetToken: 0xa010af9ad0a5e8e461638fed484ac60a} 2025/04/30 11:03:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 server -> &wire.NewTokenFrame{Token: 0xc4aaaa4fe593f27209c63f62cbc4a47c74b0690d0a6b14f5cd49d06badfb5488d4fff8d19db5cd13e97cbcb835b3563c58b2e3d72d321a9afc2d0c5cc085b08f6940eea5583b2b8ca43524dc4272716f4f10b24a90a3} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2b4d78ba, StatelessResetToken: 0xdb3308c74748da0cd7f32e0e9d0dfaee} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 43285caf, StatelessResetToken: 0x6b38569af259718ade093470258f8e29} 2025/04/30 11:03:59 server <- Reading packet 0 (42 bytes) for connection 90be1d07, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 90be1d07, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:59 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:59 server -> Sending packet 4 (28 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 103.087717ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:59 Received request: GET /wdqoiylgsm 2025/04/30 11:03:59 server -> Sending packet 5 (1045 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:59 server <- Reading packet 2 (52 bytes) for connection cc1d8ee7, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: cc1d8ee7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 160µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:03:59 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:59 Retiring connection ID 90be1d07 in 5s. 2025/04/30 11:03:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:59 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:59 server -> Sending packet 6 (29 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 125.213µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:03:59 server <- Reading packet 3 (44 bytes) for connection cc1d8ee7, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: cc1d8ee7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:59 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:59 server <- Reading packet 4 (31 bytes) for connection cc1d8ee7, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: cc1d8ee7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 120µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:03:59 server newly acked packets (2): [3 5] 2025/04/30 11:03:59 server updated RTT: 31.968ms (σ: 12.023ms) 2025/04/30 11:03:59 server ECN capability confirmed. 2025/04/30 11:03:59 server Canceling loss detection timer. 2025/04/30 11:03:59 server -> Sending packet 7 (32 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 74.84µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:03:59 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:03:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:59 server -> Sending packet 9 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:03:59 server -> Sending packet 10 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:03:59 server <- Received Initial packet. 2025/04/30 11:03:59 Created qlog file: /logs/qlog/5b1c333a32e6b2269ec7eba8af35b8.sqlog 2025/04/30 11:03:59 server Changing connection ID to 2c13f762. 2025/04/30 11:03:59 Adding connection IDs 5b1c333a32e6b2269ec7eba8af35b8 and 2c13f762 for a new connection. 2025/04/30 11:03:59 server <- Reading packet 1 (1280 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, Initial 2025/04/30 11:03:59 server Long Header{Type: Initial, DestConnectionID: 5b1c333a32e6b2269ec7eba8af35b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:03:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:03:59 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:59 Adding connection ID 65671eca. 2025/04/30 11:03:59 Adding connection ID e5ab06ae. 2025/04/30 11:03:59 Adding connection ID 768acd7a. 2025/04/30 11:03:59 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8 2025/04/30 11:03:59 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2c13f762, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 424, Version: v1} 2025/04/30 11:03:59 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:59 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2c13f762, PacketNumber: 0, PacketNumberLen: 2, Length: 738, Version: v1} 2025/04/30 11:03:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65671eca, StatelessResetToken: 0xa046bd9d090aafef5ff1a9c45968ffdf} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 768acd7a, StatelessResetToken: 0xcb62a3c58f61569b51a15a17287488b0} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e5ab06ae, StatelessResetToken: 0x73da0a39677e668c94fb14222f366914} 2025/04/30 11:03:59 server <- Reading packet 2 (1280 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, Initial 2025/04/30 11:03:59 server Long Header{Type: Initial, DestConnectionID: 5b1c333a32e6b2269ec7eba8af35b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:03:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:03:59 server -> Sending packet 1 (37 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, Initial 2025/04/30 11:03:59 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2c13f762, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:03:59 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:03:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:03:59 server -> Sending packet 18 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:59 server -> Sending packet 19 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:59 server Parsed a coalesced packet. Part 1: 1166 bytes. Remaining: 114 bytes. 2025/04/30 11:03:59 server <- Reading packet 3 (1166 bytes) for connection 65671eca, Initial 2025/04/30 11:03:59 server Long Header{Type: Initial, DestConnectionID: 65671eca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:03:59 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:59 server newly acked packets (1): [0] 2025/04/30 11:03:59 server updated RTT: 33.439521ms (σ: 16.71976ms) 2025/04/30 11:03:59 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 44 bytes. 2025/04/30 11:03:59 server <- Reading packet 0 (70 bytes) for connection 65671eca, Handshake 2025/04/30 11:03:59 server Long Header{Type: Handshake, DestConnectionID: 65671eca, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:59 server Dropping Initial keys. 2025/04/30 11:03:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:59 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 Retiring connection ID 5b1c333a32e6b2269ec7eba8af35b8 in 5s. 2025/04/30 11:03:59 server Dropping Handshake keys. 2025/04/30 11:03:59 server <- Reading packet 0 (44 bytes) for connection 65671eca, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 65671eca, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:59 Retiring connection ID 2c13f762 in 5s. 2025/04/30 11:03:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:59 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:59 server -> Sending packet 1 (256 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 Received request: GET /xzqnujdyco 2025/04/30 11:03:59 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 324.555µs} 2025/04/30 11:03:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 server -> &wire.NewTokenFrame{Token: 0x40e5aff58cbff03f328dc40d0348a626e2d55b05773fd036ad4b2f5cb684e94968bbfcb7ebb7720c5d3d8eaffba072f358e99d07e20c9ae0275337865039f2c93694c0c257624b9095a68972c11cd58f709abc9e3c38} 2025/04/30 11:03:59 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:03:59 server -> Sending packet 2 (1045 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:03:59 server -> Sending packet 12 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:03:59 server -> Sending packet 13 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:03:59 server -> Sending packet 14 (1366 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.PingFrame{} 2025/04/30 11:03:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:59 server -> Sending packet 4 (91 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 768acd7a, StatelessResetToken: 0xcb62a3c58f61569b51a15a17287488b0} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e5ab06ae, StatelessResetToken: 0x73da0a39677e668c94fb14222f366914} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65671eca, StatelessResetToken: 0xa046bd9d090aafef5ff1a9c45968ffdf} 2025/04/30 11:03:59 server Skipping packet number 3 2025/04/30 11:03:59 server -> Sending packet 5 (251 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 server -> &wire.NewTokenFrame{Token: 0x40e5aff58cbff03f328dc40d0348a626e2d55b05773fd036ad4b2f5cb684e94968bbfcb7ebb7720c5d3d8eaffba072f358e99d07e20c9ae0275337865039f2c93694c0c257624b9095a68972c11cd58f709abc9e3c38} 2025/04/30 11:03:59 server <- Reading packet 3 (33 bytes) for connection 65671eca, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 65671eca, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 80µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:03:59 server newly acked packets (1): [4] 2025/04/30 11:03:59 server updated RTT: 33.125ms (σ: 13.165ms) 2025/04/30 11:03:59 server ECN capability confirmed. 2025/04/30 11:03:59 server lost packet 2 (time threshold) 2025/04/30 11:03:59 server -> Sending packet 6 (1045 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:59 server <- Reading packet 4 (34 bytes) for connection 65671eca, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 65671eca, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 25.256ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:59 server newly acked packets (1): [5] 2025/04/30 11:03:59 server updated RTT: 32.863ms (σ: 10.397ms) 2025/04/30 11:03:59 server -> Sending packet 7 (1366 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.PingFrame{} 2025/04/30 11:03:59 server <- Reading packet 6 (35 bytes) for connection 65671eca, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 65671eca, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 112µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:03:59 server newly acked packets (1): [7] 2025/04/30 11:03:59 server updated RTT: 32.855ms (σ: 7.812ms) 2025/04/30 11:03:59 server lost packet 6 (time threshold) 2025/04/30 11:03:59 server Canceling loss detection timer. 2025/04/30 11:03:59 server -> Sending packet 8 (1045 bytes) for connection 5b1c333a32e6b2269ec7eba8af35b8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:59 server <- Reading packet 7 (26 bytes) for connection 65671eca, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 65671eca, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:59 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:03:59 Replacing connection for connection IDs [65671eca e5ab06ae 768acd7a] with a closed connection. 2025/04/30 11:03:59 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:03:59 server Connection 5b1c333a32e6b2269ec7eba8af35b8 closed. 2025/04/30 11:03:59 server <- Received Initial packet. 2025/04/30 11:03:59 Created qlog file: /logs/qlog/c42cc020e7d7eb5f144813c50b91666675.sqlog 2025/04/30 11:03:59 server Changing connection ID to bce00a68. 2025/04/30 11:03:59 Adding connection IDs c42cc020e7d7eb5f144813c50b91666675 and bce00a68 for a new connection. 2025/04/30 11:03:59 server <- Reading packet 0 (1280 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, Initial 2025/04/30 11:03:59 server Long Header{Type: Initial, DestConnectionID: c42cc020e7d7eb5f144813c50b91666675, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:03:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:03:59 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:03:59 Adding connection ID 8674b766. 2025/04/30 11:03:59 Adding connection ID aaa65bec. 2025/04/30 11:03:59 Adding connection ID 5f81316b. 2025/04/30 11:03:59 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c42cc020e7d7eb5f144813c50b91666675 2025/04/30 11:03:59 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: bce00a68, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 421, Version: v1} 2025/04/30 11:03:59 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:03:59 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: bce00a68, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 11:03:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f81316b, StatelessResetToken: 0x8ddf9d8f08323bee64eb668e1e289f85} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8674b766, StatelessResetToken: 0xa78626ce0115a9625468c53011275550} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aaa65bec, StatelessResetToken: 0x7b32b1c37c8d21a46e34a48a85bc598b} 2025/04/30 11:03:59 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:03:59 server <- Reading packet 1 (1185 bytes) for connection 8674b766, Initial 2025/04/30 11:03:59 server Long Header{Type: Initial, DestConnectionID: 8674b766, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:03:59 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:03:59 server newly acked packets (1): [0] 2025/04/30 11:03:59 server updated RTT: 33.421881ms (σ: 16.71094ms) 2025/04/30 11:03:59 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:03:59 server <- Reading packet 0 (70 bytes) for connection 8674b766, Handshake 2025/04/30 11:03:59 server Long Header{Type: Handshake, DestConnectionID: 8674b766, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:03:59 server Dropping Initial keys. 2025/04/30 11:03:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:03:59 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:03:59 Retiring connection ID c42cc020e7d7eb5f144813c50b91666675 in 5s. 2025/04/30 11:03:59 server Dropping Handshake keys. 2025/04/30 11:03:59 server <- Reading packet 0 (25 bytes) for connection 8674b766, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 8674b766, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:59 Retiring connection ID bce00a68 in 5s. 2025/04/30 11:03:59 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:03:59 server -> Sending packet 1 (256 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 224.749µs} 2025/04/30 11:03:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 server -> &wire.NewTokenFrame{Token: 0xbd88ae9918c3ec28a388be932e9139c509990d41a2ca0d69c4a6f380853093dfc5f8c4729bf7cd86fa56cd750131fb888f54b638e42900709c838e549f9b79c09c0420bac3dbbee9a480f6879d88aa4170ad156e7def} 2025/04/30 11:03:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:03:59 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:03:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:03:59 server -> Sending packet 3 (91 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8674b766, StatelessResetToken: 0xa78626ce0115a9625468c53011275550} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aaa65bec, StatelessResetToken: 0x7b32b1c37c8d21a46e34a48a85bc598b} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f81316b, StatelessResetToken: 0x8ddf9d8f08323bee64eb668e1e289f85} 2025/04/30 11:03:59 server Skipping packet number 2 2025/04/30 11:03:59 server -> Sending packet 4 (251 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 server -> &wire.NewTokenFrame{Token: 0xbd88ae9918c3ec28a388be932e9139c509990d41a2ca0d69c4a6f380853093dfc5f8c4729bf7cd86fa56cd750131fb888f54b638e42900709c838e549f9b79c09c0420bac3dbbee9a480f6879d88aa4170ad156e7def} 2025/04/30 11:03:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:03:59 server -> Sending packet 13 (323 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b81e58d, StatelessResetToken: 0x77e22a63e85540a98d55eb11f603a9e0} 2025/04/30 11:03:59 server -> &wire.NewTokenFrame{Token: 0x42432b220a65aad352c01503df415b82eb209d62dd7b9c54df3224dcd02d020b45cc93103bb3b15bfb435a5f48c9613dbb86b81620158aff151b88e4f3fdec1d1105c3d8f8fa4c9f5f35b72b4d82877e5e6b8573b7ce} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a941edda, StatelessResetToken: 0x5387d68c19a68fb386bde14992e7448f} 2025/04/30 11:03:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 614eac2f, StatelessResetToken: 0xab9e50092544feaae1b1c48d2cef8041} 2025/04/30 11:03:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 server Skipping packet number 12 2025/04/30 11:03:59 server -> Sending packet 14 (1045 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:03:59 server -> Sending packet 16 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:03:59 server -> Sending packet 17 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:03:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:03:59 server -> Sending packet 6 (91 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8674b766, StatelessResetToken: 0xa78626ce0115a9625468c53011275550} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aaa65bec, StatelessResetToken: 0x7b32b1c37c8d21a46e34a48a85bc598b} 2025/04/30 11:03:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f81316b, StatelessResetToken: 0x8ddf9d8f08323bee64eb668e1e289f85} 2025/04/30 11:03:59 server Skipping packet number 5 2025/04/30 11:03:59 server -> Sending packet 7 (251 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:03:59 server -> &wire.NewTokenFrame{Token: 0xbd88ae9918c3ec28a388be932e9139c509990d41a2ca0d69c4a6f380853093dfc5f8c4729bf7cd86fa56cd750131fb888f54b638e42900709c838e549f9b79c09c0420bac3dbbee9a480f6879d88aa4170ad156e7def} 2025/04/30 11:03:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:03:59 server -> Sending packet 8 (1366 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.PingFrame{} 2025/04/30 11:03:59 server <- Reading packet 8 (25 bytes) for connection 8674b766, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 8674b766, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:03:59 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:03:59 server <- Reading packet 9 (42 bytes) for connection 8674b766, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 8674b766, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:03:59 server -> Sending packet 9 (29 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 Received request: GET /lkmecvgcbg 2025/04/30 11:03:59 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 0, Smallest: 0}}, DelayTime: 119.322µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:03:59 server -> Sending packet 10 (1045 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:03:59 server <- Reading packet 10 (1366 bytes) for connection 8674b766, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 8674b766, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.PingFrame{} 2025/04/30 11:03:59 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:03:59 server <- Reading packet 11 (35 bytes) for connection 8674b766, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 8674b766, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 96µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:03:59 server newly acked packets (1): [6] 2025/04/30 11:03:59 server updated RTT: 33.207ms (σ: 12.959ms) 2025/04/30 11:03:59 server ECN capability confirmed. 2025/04/30 11:03:59 server <- Reading packet 12 (35 bytes) for connection 8674b766, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 8674b766, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 104µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:03:59 server newly acked packets (2): [7 8] 2025/04/30 11:03:59 server updated RTT: 33.06ms (σ: 10.012ms) 2025/04/30 11:03:59 server Sending ACK because the ACK timer expired. 2025/04/30 11:03:59 server -> Sending packet 11 (30 bytes) for connection c42cc020e7d7eb5f144813c50b91666675, 1-RTT (ECN: ECT(0)) 2025/04/30 11:03:59 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 8}, {Largest: 0, Smallest: 0}}, DelayTime: 25.144042ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:03:59 server <- Reading packet 13 (37 bytes) for connection 8674b766, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 8674b766, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 64µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:03:59 server newly acked packets (1): [10] 2025/04/30 11:03:59 server updated RTT: 32.875ms (σ: 7.878ms) 2025/04/30 11:03:59 server Canceling loss detection timer. 2025/04/30 11:03:59 server <- Reading packet 14 (26 bytes) for connection 8674b766, 1-RTT 2025/04/30 11:03:59 server Short Header{DestConnectionID: 8674b766, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:03:59 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:03:59 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:03:59 Replacing connection for connection IDs [8674b766 aaa65bec 5f81316b] with a closed connection. 2025/04/30 11:03:59 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:03:59 server Connection c42cc020e7d7eb5f144813c50b91666675 closed. 2025/04/30 11:04:00 server <- Received Initial packet. 2025/04/30 11:04:00 Created qlog file: /logs/qlog/23d0d3cddf0ff9c2b25a5164bcd9b529c3da.sqlog 2025/04/30 11:04:00 server Changing connection ID to 4a599647. 2025/04/30 11:04:00 Adding connection IDs 23d0d3cddf0ff9c2b25a5164bcd9b529c3da and 4a599647 for a new connection. 2025/04/30 11:04:00 server <- Reading packet 0 (1280 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:04:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:00 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:00 Adding connection ID 4fe67f78. 2025/04/30 11:04:00 Adding connection ID 40b8b6a8. 2025/04/30 11:04:00 Adding connection ID 106023b7. 2025/04/30 11:04:00 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4a599647, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 427, Version: v1} 2025/04/30 11:04:00 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:00 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4a599647, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4fe67f78, StatelessResetToken: 0xcb1105e33808f48e29289fd4ffb5d66e} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 106023b7, StatelessResetToken: 0x713c3137442021b446ffc6f74dc6cf8e} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40b8b6a8, StatelessResetToken: 0x59745dba5507dd3189ae346147639dc0} 2025/04/30 11:04:00 server Parsed a coalesced packet. Part 1: 1166 bytes. Remaining: 114 bytes. 2025/04/30 11:04:00 server <- Reading packet 1 (1166 bytes) for connection 4fe67f78, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: 4fe67f78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:04:00 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 server newly acked packets (1): [0] 2025/04/30 11:04:00 server updated RTT: 33.728955ms (σ: 16.864477ms) 2025/04/30 11:04:00 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 44 bytes. 2025/04/30 11:04:00 server <- Reading packet 0 (70 bytes) for connection 4fe67f78, Handshake 2025/04/30 11:04:00 server Long Header{Type: Handshake, DestConnectionID: 4fe67f78, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:00 server Dropping Initial keys. 2025/04/30 11:04:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:00 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 Retiring connection ID 23d0d3cddf0ff9c2b25a5164bcd9b529c3da in 5s. 2025/04/30 11:04:00 server Dropping Handshake keys. 2025/04/30 11:04:00 server <- Reading packet 0 (44 bytes) for connection 4fe67f78, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: 4fe67f78, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:00 Retiring connection ID 4a599647 in 5s. 2025/04/30 11:04:00 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:00 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:00 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:00 server -> Sending packet 1 (256 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 368.901µs} 2025/04/30 11:04:00 Received request: GET /ykemmazoey 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server -> Sending packet 2 (1045 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:00 server -> Sending packet 18 (23 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:04:00 server Skipping packet number 17 2025/04/30 11:04:00 server -> Sending packet 19 (251 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0xae1fd7e4aa5c046ed55eb95c26470625dd9e2c0d30826fe137dbefc0c61c3a5eb1fea6bdb76189c8867fdbc46850ebc2d0768eb8029e6f00578e9651f7e54db47f1caca1bf8eaa3b54f3dc458784b5ef5ff540635f27} 2025/04/30 11:04:00 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:04:00 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:04:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:00 server -> Sending packet 4 (91 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4fe67f78, StatelessResetToken: 0xcb1105e33808f48e29289fd4ffb5d66e} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 106023b7, StatelessResetToken: 0x713c3137442021b446ffc6f74dc6cf8e} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 40b8b6a8, StatelessResetToken: 0x59745dba5507dd3189ae346147639dc0} 2025/04/30 11:04:00 server Skipping packet number 3 2025/04/30 11:04:00 server -> Sending packet 5 (251 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:00 server <- Reading packet 2 (33 bytes) for connection 4fe67f78, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: 4fe67f78, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:00 server newly acked packets (1): [4] 2025/04/30 11:04:00 server updated RTT: 33.383ms (σ: 13.337ms) 2025/04/30 11:04:00 server ECN capability confirmed. 2025/04/30 11:04:00 server lost packet 2 (time threshold) 2025/04/30 11:04:00 server -> Sending packet 6 (1045 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:00 server <- Reading packet 3 (35 bytes) for connection 4fe67f78, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: 4fe67f78, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:00 server newly acked packets (1): [6] 2025/04/30 11:04:00 server updated RTT: 33.15ms (σ: 10.467ms) 2025/04/30 11:04:00 server lost packet 5 (time threshold) 2025/04/30 11:04:00 server Canceling loss detection timer. 2025/04/30 11:04:00 server -> Sending packet 7 (1366 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.PingFrame{} 2025/04/30 11:04:00 server -> Sending packet 8 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:00 server <- Received Initial packet. 2025/04/30 11:04:00 Created qlog file: /logs/qlog/917a91516493bd0ee1806e20e028bf7d7db271.sqlog 2025/04/30 11:04:00 server Changing connection ID to f6c249cb. 2025/04/30 11:04:00 Adding connection IDs 917a91516493bd0ee1806e20e028bf7d7db271 and f6c249cb for a new connection. 2025/04/30 11:04:00 server <- Reading packet 0 (1280 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: 917a91516493bd0ee1806e20e028bf7d7db271, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:04:00 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:00 Adding connection ID e4f3607f. 2025/04/30 11:04:00 Adding connection ID 2b9f0ff4. 2025/04/30 11:04:00 Adding connection ID 2bf1919c. 2025/04/30 11:04:00 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f6c249cb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 427, Version: v1} 2025/04/30 11:04:00 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:00 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f6c249cb, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2b9f0ff4, StatelessResetToken: 0x724103faa2fc03afb061b68b9b50ffd5} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2bf1919c, StatelessResetToken: 0xf53492068e9193743395553d90242672} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e4f3607f, StatelessResetToken: 0x8793e6ebc66b8b7677b70f7441b027c9} 2025/04/30 11:04:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:00 server -> Sending packet 10 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:00 server -> Sending packet 11 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server <- Reading packet 1 (1280 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: 917a91516493bd0ee1806e20e028bf7d7db271, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:04:00 server -> Sending packet 1 (37 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f6c249cb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:00 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 server <- Reading packet 2 (1280 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: 917a91516493bd0ee1806e20e028bf7d7db271, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:04:00 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:00 server -> Sending packet 2 (1280 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f6c249cb, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:00 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:00 server -> Sending packet 3 (1280 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f6c249cb, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:00 server <- Reading packet 3 (1280 bytes) for connection f6c249cb, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: f6c249cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:00 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:00 server <- Reading packet 4 (1280 bytes) for connection f6c249cb, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: f6c249cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:00 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:00 server newly acked packets (1): [3] 2025/04/30 11:04:00 server updated RTT: 34.017107ms (σ: 17.008553ms) 2025/04/30 11:04:00 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:00 server -> Sending packet 1 (748 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Handshake 2025/04/30 11:04:00 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f6c249cb, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:00 server -> Sending packet 2 (748 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, Handshake 2025/04/30 11:04:00 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f6c249cb, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:00 Tracking 75 connection IDs and 0 reset tokens. 2025/04/30 11:04:00 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:04:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:00 server -> Sending packet 13 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server -> Sending packet 14 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server <- Reading packet 2 (70 bytes) for connection f6c249cb, Handshake 2025/04/30 11:04:00 server Long Header{Type: Handshake, DestConnectionID: f6c249cb, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:00 server Dropping Initial keys. 2025/04/30 11:04:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:00 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 Retiring connection ID 917a91516493bd0ee1806e20e028bf7d7db271 in 5s. 2025/04/30 11:04:00 server Dropping Handshake keys. 2025/04/30 11:04:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:00 server -> Sending packet 2 (323 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e4f3607f, StatelessResetToken: 0x8793e6ebc66b8b7677b70f7441b027c9} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0x370f27667d73c7dcdc196e81ab0be93b5d37d0a79bb2270aafc93e9963fb9284b0d2c2fd20d27e4220d36948a1785c817ab67aa0ef34138249073dc16a7f1e2c81f35660187218a8ea357f8b039ca6d71ab4f38299c4} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2b9f0ff4, StatelessResetToken: 0x724103faa2fc03afb061b68b9b50ffd5} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2bf1919c, StatelessResetToken: 0xf53492068e9193743395553d90242672} 2025/04/30 11:04:00 server -> Sending packet 3 (323 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0x370f27667d73c7dcdc196e81ab0be93b5d37d0a79bb2270aafc93e9963fb9284b0d2c2fd20d27e4220d36948a1785c817ab67aa0ef34138249073dc16a7f1e2c81f35660187218a8ea357f8b039ca6d71ab4f38299c4} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2bf1919c, StatelessResetToken: 0xf53492068e9193743395553d90242672} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e4f3607f, StatelessResetToken: 0x8793e6ebc66b8b7677b70f7441b027c9} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2b9f0ff4, StatelessResetToken: 0x724103faa2fc03afb061b68b9b50ffd5} 2025/04/30 11:04:00 server <- Reading packet 0 (42 bytes) for connection f6c249cb, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: f6c249cb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:00 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:00 server -> Sending packet 4 (28 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 102.918856ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:00 Received request: GET /hrndujivqs 2025/04/30 11:04:00 server -> Sending packet 5 (1045 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:04:00 server -> Sending packet 19 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server -> Sending packet 20 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server <- Reading packet 2 (52 bytes) for connection e4f3607f, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: e4f3607f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 152µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:00 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:00 Retiring connection ID f6c249cb in 5s. 2025/04/30 11:04:00 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:00 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:00 server <- Reading packet 3 (44 bytes) for connection e4f3607f, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: e4f3607f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:00 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:00 server -> Sending packet 6 (29 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 121.928µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:00 server <- Reading packet 4 (33 bytes) for connection e4f3607f, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: e4f3607f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 56µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:00 server newly acked packets (2): [3 5] 2025/04/30 11:04:00 server updated RTT: 33.733ms (σ: 13.322ms) 2025/04/30 11:04:00 server ECN capability confirmed. 2025/04/30 11:04:00 server Canceling loss detection timer. 2025/04/30 11:04:00 server -> Sending packet 7 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server <- Received Initial packet. 2025/04/30 11:04:00 Created qlog file: /logs/qlog/3ef79d885f1aff45a5.sqlog 2025/04/30 11:04:00 server Changing connection ID to 3cf24690. 2025/04/30 11:04:00 Adding connection IDs 3ef79d885f1aff45a5 and 3cf24690 for a new connection. 2025/04/30 11:04:00 server <- Reading packet 0 (1280 bytes) for connection 3ef79d885f1aff45a5, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: 3ef79d885f1aff45a5, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:04:00 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:00 Adding connection ID 1e570113. 2025/04/30 11:04:00 Adding connection ID 8924c447. 2025/04/30 11:04:00 Adding connection ID b0f8115b. 2025/04/30 11:04:00 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3ef79d885f1aff45a5 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3cf24690, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 441, Version: v1} 2025/04/30 11:04:00 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:00 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3cf24690, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b0f8115b, StatelessResetToken: 0x395ff73bdee15a2fe075ce6b6ae73673} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8924c447, StatelessResetToken: 0x5fc21c8c705a4ecbb62b1f5605c52c68} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1e570113, StatelessResetToken: 0x452b5fb411b64dd6f62d413fc2b9d2a7} 2025/04/30 11:04:00 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:04:00 server <- Reading packet 1 (1185 bytes) for connection 1e570113, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: 1e570113, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:00 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 server newly acked packets (1): [0] 2025/04/30 11:04:00 server updated RTT: 33.389046ms (σ: 16.694523ms) 2025/04/30 11:04:00 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:04:00 server <- Reading packet 0 (70 bytes) for connection 1e570113, Handshake 2025/04/30 11:04:00 server Long Header{Type: Handshake, DestConnectionID: 1e570113, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:00 server Dropping Initial keys. 2025/04/30 11:04:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:00 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 Retiring connection ID 3ef79d885f1aff45a5 in 5s. 2025/04/30 11:04:00 server Dropping Handshake keys. 2025/04/30 11:04:00 server <- Reading packet 0 (25 bytes) for connection 1e570113, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: 1e570113, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:00 Retiring connection ID 3cf24690 in 5s. 2025/04/30 11:04:00 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:00 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:04:00 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:00 server <- Reading packet 1 (42 bytes) for connection 1e570113, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: 1e570113, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:00 server -> Sending packet 1 (256 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 361.153µs} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 Received request: GET /tixbihnvis 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0xda98638555020bce6efeefe94476dc3492e9d4ffde175397a976c91cbd9ee06ef46646b1eb5036e3e466c4a4d5c9aa9e92ec6c1b5d7a9974a74a9c3b1e15d3bb766d5ecaee60968007bc32cb1b1f28123cb347761dbb} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server -> Sending packet 2 (1045 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:00 server -> Sending packet 3 (23 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:04:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:00 server -> Sending packet 9 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server -> Sending packet 10 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 Removing connection ID ff0a5495f458c161f047a6f4a65d after it has been retired. 2025/04/30 11:04:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:00 server -> Sending packet 5 (91 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b0f8115b, StatelessResetToken: 0x395ff73bdee15a2fe075ce6b6ae73673} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1e570113, StatelessResetToken: 0x452b5fb411b64dd6f62d413fc2b9d2a7} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8924c447, StatelessResetToken: 0x5fc21c8c705a4ecbb62b1f5605c52c68} 2025/04/30 11:04:00 server Skipping packet number 4 2025/04/30 11:04:00 server -> Sending packet 6 (251 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0xda98638555020bce6efeefe94476dc3492e9d4ffde175397a976c91cbd9ee06ef46646b1eb5036e3e466c4a4d5c9aa9e92ec6c1b5d7a9974a74a9c3b1e15d3bb766d5ecaee60968007bc32cb1b1f28123cb347761dbb} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 Removing connection ID 98321bc0 after it has been retired. 2025/04/30 11:04:00 Removing connection IDs [387d7e87 311df184 cb195d5d] for a closed connection after it has been retired. 2025/04/30 11:04:00 server <- Reading packet 5 (34 bytes) for connection 1e570113, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: 1e570113, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 25.264ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:04:00 server newly acked packets (3): [2 5 6] 2025/04/30 11:04:00 server updated RTT: 36.256ms (σ: 18.256ms) 2025/04/30 11:04:00 server ECN capability confirmed. 2025/04/30 11:04:00 server lost packet 3 (time threshold) 2025/04/30 11:04:00 server Canceling loss detection timer. 2025/04/30 11:04:00 server -> Sending packet 7 (1366 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.PingFrame{} 2025/04/30 11:04:00 server -> Sending packet 8 (23 bytes) for connection 3ef79d885f1aff45a5, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:04:00 server <- Reading packet 6 (1366 bytes) for connection 1e570113, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: 1e570113, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.PingFrame{} 2025/04/30 11:04:00 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:00 server <- Reading packet 7 (33 bytes) for connection 1e570113, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: 1e570113, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 192µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:04:00 server newly acked packets (2): [7 8] 2025/04/30 11:04:00 server updated RTT: 35.865ms (σ: 14.473ms) 2025/04/30 11:04:00 server Canceling loss detection timer. 2025/04/30 11:04:00 server <- Reading packet 8 (26 bytes) for connection 1e570113, 1-RTT 2025/04/30 11:04:00 server Short Header{DestConnectionID: 1e570113, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:00 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:00 Replacing connection for connection IDs [1e570113 8924c447 b0f8115b] with a closed connection. 2025/04/30 11:04:00 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:00 server Connection 3ef79d885f1aff45a5 closed. 2025/04/30 11:04:00 server <- Received Initial packet. 2025/04/30 11:04:00 Created qlog file: /logs/qlog/4cc86ef10ebe1e1333cf31992fb08fd81f.sqlog 2025/04/30 11:04:00 server Changing connection ID to 31790e6e. 2025/04/30 11:04:00 Adding connection IDs 4cc86ef10ebe1e1333cf31992fb08fd81f and 31790e6e for a new connection. 2025/04/30 11:04:00 server <- Reading packet 0 (1280 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, Initial 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: 4cc86ef10ebe1e1333cf31992fb08fd81f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:04:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:04:00 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:00 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:00 Adding connection ID de71c778. 2025/04/30 11:04:00 Adding connection ID cf30effe. 2025/04/30 11:04:00 Adding connection ID acf62c98. 2025/04/30 11:04:00 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f 2025/04/30 11:04:00 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 31790e6e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 423, Version: v1} 2025/04/30 11:04:00 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:00 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 31790e6e, PacketNumber: 0, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: acf62c98, StatelessResetToken: 0xb8fc320a39c40a986af415463045a271} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: de71c778, StatelessResetToken: 0x0b264465f32249fbd0a6b2cdc7f811d2} 2025/04/30 11:04:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cf30effe, StatelessResetToken: 0xf6df9a963266e190d7aa8fe06af480e8} 2025/04/30 11:04:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:04:00 server -> Sending packet 16 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server -> Sending packet 17 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:00 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:00 server -> Sending packet 12 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server -> Sending packet 13 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:00 server -> Sending packet 14 (1366 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:00 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:00 server -> &wire.PingFrame{} 2025/04/30 11:04:01 server <- Reading packet 1 (1280 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: 4cc86ef10ebe1e1333cf31992fb08fd81f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:04:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:04:01 server -> Sending packet 1 (37 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 31790e6e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:01 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:01 server -> Sending packet 2 (1280 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 31790e6e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:01 server -> Sending packet 3 (1280 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 31790e6e, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:01 server <- Reading packet 3 (1280 bytes) for connection 31790e6e, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: 31790e6e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:01 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:01 Removing connection ID 8314cf9add8b5478 after it has been retired. 2025/04/30 11:04:01 Removing connection ID 947224c7 after it has been retired. 2025/04/30 11:04:01 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:04:01 server -> Sending packet 1 (752 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, Handshake 2025/04/30 11:04:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 31790e6e, PacketNumber: 1, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 11:04:01 server -> Sending packet 2 (752 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, Handshake 2025/04/30 11:04:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 31790e6e, PacketNumber: 2, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 11:04:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:01 server -> Sending packet 21 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 server -> Sending packet 22 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 server <- Reading packet 0 (75 bytes) for connection 31790e6e, Handshake 2025/04/30 11:04:01 server Long Header{Type: Handshake, DestConnectionID: 31790e6e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:01 server Dropping Initial keys. 2025/04/30 11:04:01 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:01 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 Retiring connection ID 4cc86ef10ebe1e1333cf31992fb08fd81f in 5s. 2025/04/30 11:04:01 server Dropping Handshake keys. 2025/04/30 11:04:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:01 server -> Sending packet 2 (320 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cf30effe, StatelessResetToken: 0xf6df9a963266e190d7aa8fe06af480e8} 2025/04/30 11:04:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: de71c778, StatelessResetToken: 0x0b264465f32249fbd0a6b2cdc7f811d2} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:01 server -> &wire.NewTokenFrame{Token: 0xc0b5a0adb2c11ee98e5bbbb9e8cae2bbb43a76bff8e1a4a82798409a9ea94445653673c5be1aae335e300f6eca096a1798f3dadaa19e0a50bde50a4d7b293f84e1bcabfb067a775f90a7ee826000abd6143250f66af6} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: acf62c98, StatelessResetToken: 0xb8fc320a39c40a986af415463045a271} 2025/04/30 11:04:01 server -> Sending packet 3 (320 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cf30effe, StatelessResetToken: 0xf6df9a963266e190d7aa8fe06af480e8} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: acf62c98, StatelessResetToken: 0xb8fc320a39c40a986af415463045a271} 2025/04/30 11:04:01 server -> &wire.NewTokenFrame{Token: 0xc0b5a0adb2c11ee98e5bbbb9e8cae2bbb43a76bff8e1a4a82798409a9ea94445653673c5be1aae335e300f6eca096a1798f3dadaa19e0a50bde50a4d7b293f84e1bcabfb067a775f90a7ee826000abd6143250f66af6} 2025/04/30 11:04:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: de71c778, StatelessResetToken: 0x0b264465f32249fbd0a6b2cdc7f811d2} 2025/04/30 11:04:01 server -> Sending packet 4 (1366 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.PingFrame{} 2025/04/30 11:04:01 Removing connection IDs [004daf06 ded46327 58579102] for a closed connection after it has been retired. 2025/04/30 11:04:01 server <- Reading packet 1 (1366 bytes) for connection de71c778, 1-RTT 2025/04/30 11:04:01 server Short Header{DestConnectionID: de71c778, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server <- &wire.PingFrame{} 2025/04/30 11:04:01 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:01 server -> Sending packet 5 (27 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 64.15µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:01 Removing connection ID 20866a1eba579dd18ecd1c842aeb4b after it has been retired. 2025/04/30 11:04:01 Removing connection ID 522b15e7 after it has been retired. 2025/04/30 11:04:01 server <- Reading packet 4 (42 bytes) for connection de71c778, 1-RTT 2025/04/30 11:04:01 server Short Header{DestConnectionID: de71c778, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:01 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:01 server -> Sending packet 6 (29 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 98.283µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:01 Received request: GET /kbnperyfzs 2025/04/30 11:04:01 server -> Sending packet 7 (1045 bytes) for connection 4cc86ef10ebe1e1333cf31992fb08fd81f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 Removing connection IDs [da98d8ce 844b7577 0cd56ab9] for a closed connection after it has been retired. 2025/04/30 11:04:01 server <- Reading packet 6 (26 bytes) for connection de71c778, 1-RTT 2025/04/30 11:04:01 server Short Header{DestConnectionID: de71c778, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:01 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:01 Replacing connection for connection IDs [31790e6e de71c778 cf30effe acf62c98] with a closed connection. 2025/04/30 11:04:01 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:01 server Connection 4cc86ef10ebe1e1333cf31992fb08fd81f closed. 2025/04/30 11:04:01 server <- Received Initial packet. 2025/04/30 11:04:01 Created qlog file: /logs/qlog/f15686a4bb087d195aa53accedb2.sqlog 2025/04/30 11:04:01 server Changing connection ID to 5754677b. 2025/04/30 11:04:01 Adding connection IDs f15686a4bb087d195aa53accedb2 and 5754677b for a new connection. 2025/04/30 11:04:01 server <- Reading packet 0 (1280 bytes) for connection f15686a4bb087d195aa53accedb2, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: f15686a4bb087d195aa53accedb2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:01 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:01 Adding connection ID 4d6aea0a. 2025/04/30 11:04:01 Adding connection ID fcbe7378. 2025/04/30 11:04:01 Adding connection ID 3048a2c1. 2025/04/30 11:04:01 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f15686a4bb087d195aa53accedb2 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5754677b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 424, Version: v1} 2025/04/30 11:04:01 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5754677b, PacketNumber: 0, PacketNumberLen: 2, Length: 738, Version: v1} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3048a2c1, StatelessResetToken: 0x88c6942cfa8810f6ce25271df90f9e09} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d6aea0a, StatelessResetToken: 0xa855ce7c7ce1e737c1a2bc333a72a5ba} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fcbe7378, StatelessResetToken: 0xa30861a8df25f7905c958545eb778650} 2025/04/30 11:04:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:04:01 server -> Sending packet 16 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:01 server -> Sending packet 17 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:01 server Queueing packet (48 bytes) for later decryption 2025/04/30 11:04:01 server <- Reading packet 3 (70 bytes) for connection 4d6aea0a, Handshake 2025/04/30 11:04:01 server Long Header{Type: Handshake, DestConnectionID: 4d6aea0a, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:01 server Dropping Initial keys. 2025/04/30 11:04:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:01 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 Retiring connection ID f15686a4bb087d195aa53accedb2 in 5s. 2025/04/30 11:04:01 server Dropping Handshake keys. 2025/04/30 11:04:01 server -> Sending packet 1 (1366 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.PingFrame{} 2025/04/30 11:04:01 server <- Reading packet 1 (48 bytes) for connection 4d6aea0a, 1-RTT 2025/04/30 11:04:01 server Short Header{DestConnectionID: 4d6aea0a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 672µs} 2025/04/30 11:04:01 server newly acked packets (1): [0] 2025/04/30 11:04:01 server updated RTT: 33.407791ms (σ: 16.703895ms) 2025/04/30 11:04:01 server Canceling loss detection timer. 2025/04/30 11:04:01 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:01 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:01 server -> Sending packet 2 (257 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 100.789727ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:01 server -> &wire.NewTokenFrame{Token: 0x529a3ffc56510f0c532ba9806c74132f2405abec46631ca13236266e9f26fd71f73baf92eef6a0a1d284e56b50e1fa85daed3e6c1e2feec46f443706fc550a6ff03d58619559c697f5f14965a0f9d80e7c9a7818c7ab} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:01 Received request: GET /qfnrherzdu 2025/04/30 11:04:01 server -> Sending packet 3 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 server <- Reading packet 2 (33 bytes) for connection 4d6aea0a, 1-RTT 2025/04/30 11:04:01 server Short Header{DestConnectionID: 4d6aea0a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 136µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:01 server newly acked packets (2): [1 2] 2025/04/30 11:04:01 server updated RTT: 33.251ms (σ: 12.839ms) 2025/04/30 11:04:01 server ECN capability confirmed. 2025/04/30 11:04:01 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:01 Retiring connection ID 5754677b in 5s. 2025/04/30 11:04:01 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:01 server Ignoring all packets below 2. 2025/04/30 11:04:01 server <- Received Initial packet. 2025/04/30 11:04:01 Created qlog file: /logs/qlog/4c33c5c57cc41724e60e41ab553f.sqlog 2025/04/30 11:04:01 server Changing connection ID to de4b35f6. 2025/04/30 11:04:01 Adding connection IDs 4c33c5c57cc41724e60e41ab553f and de4b35f6 for a new connection. 2025/04/30 11:04:01 server <- Reading packet 0 (1280 bytes) for connection 4c33c5c57cc41724e60e41ab553f, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: 4c33c5c57cc41724e60e41ab553f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:01 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:01 Adding connection ID bb1930ab. 2025/04/30 11:04:01 Adding connection ID 0b0a3500. 2025/04/30 11:04:01 Adding connection ID a091019c. 2025/04/30 11:04:01 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4c33c5c57cc41724e60e41ab553f 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: de4b35f6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 428, Version: v1} 2025/04/30 11:04:01 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: de4b35f6, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0b0a3500, StatelessResetToken: 0x13b5af24e9b7fea15984abb1de411a0d} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a091019c, StatelessResetToken: 0xef7184a1a7956ea049a0714a8f346b22} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bb1930ab, StatelessResetToken: 0xb9e9f845160d1c9c3549ce722d4e8168} 2025/04/30 11:04:01 server Sending ACK because the ACK timer expired. 2025/04/30 11:04:01 server -> Sending packet 4 (28 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 25.281436ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:01 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:04:01 server <- Reading packet 1 (1185 bytes) for connection bb1930ab, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: bb1930ab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:01 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 server newly acked packets (1): [0] 2025/04/30 11:04:01 server updated RTT: 33.39978ms (σ: 16.69989ms) 2025/04/30 11:04:01 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:04:01 server <- Reading packet 0 (70 bytes) for connection bb1930ab, Handshake 2025/04/30 11:04:01 server Long Header{Type: Handshake, DestConnectionID: bb1930ab, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:01 server Dropping Initial keys. 2025/04/30 11:04:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:01 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 Retiring connection ID 4c33c5c57cc41724e60e41ab553f in 5s. 2025/04/30 11:04:01 server Dropping Handshake keys. 2025/04/30 11:04:01 server <- Reading packet 0 (25 bytes) for connection bb1930ab, 1-RTT 2025/04/30 11:04:01 server Short Header{DestConnectionID: bb1930ab, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:01 Retiring connection ID de4b35f6 in 5s. 2025/04/30 11:04:01 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:01 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:01 server -> Sending packet 1 (256 bytes) for connection 4c33c5c57cc41724e60e41ab553f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 382.066µs} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:01 server -> &wire.NewTokenFrame{Token: 0xa18ef1d21378f8b24fd14e6ccdb919c336a1eeae88580b0884d6062a4797fe41a280317e15e6d7f2f4eadf825238c99124b8eea88e2a93e13fcb62d6ce855bd5276dee40e046ca1f43426da7d6feb2b30ca47d9053d4} 2025/04/30 11:04:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:01 Removing connection ID 21613a67 after it has been retired. 2025/04/30 11:04:01 Removing connection ID 8f269cd2cdcf594c87a31a88ce after it has been retired. 2025/04/30 11:04:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:01 server -> Sending packet 6 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 server -> Sending packet 7 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:01 server -> Sending packet 16 (323 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a941edda, StatelessResetToken: 0x5387d68c19a68fb386bde14992e7448f} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b81e58d, StatelessResetToken: 0x77e22a63e85540a98d55eb11f603a9e0} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:01 server -> &wire.NewTokenFrame{Token: 0x42432b220a65aad352c01503df415b82eb209d62dd7b9c54df3224dcd02d020b45cc93103bb3b15bfb435a5f48c9613dbb86b81620158aff151b88e4f3fdec1d1105c3d8f8fa4c9f5f35b72b4d82877e5e6b8573b7ce} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 614eac2f, StatelessResetToken: 0xab9e50092544feaae1b1c48d2cef8041} 2025/04/30 11:04:01 server Skipping packet number 15 2025/04/30 11:04:01 server -> Sending packet 17 (1045 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 Removing connection IDs [8862a0fe ffde4c3d e21f1da4] for a closed connection after it has been retired. 2025/04/30 11:04:01 server <- Reading packet 2 (32 bytes) for connection bb1930ab, 1-RTT 2025/04/30 11:04:01 server Short Header{DestConnectionID: bb1930ab, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.256ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:01 server newly acked packets (2): [0 1] 2025/04/30 11:04:01 server updated RTT: 36.235ms (σ: 18.196ms) 2025/04/30 11:04:01 server ECN capability confirmed. 2025/04/30 11:04:01 server Canceling loss detection timer. 2025/04/30 11:04:01 server Ignoring all packets below 1. 2025/04/30 11:04:01 Removing connection ID d95540b6 after it has been retired. 2025/04/30 11:04:01 Removing connection ID 39567dd5221aa0ced18aac6edae9713119833f after it has been retired. 2025/04/30 11:04:01 server <- Reading packet 4 (42 bytes) for connection bb1930ab, 1-RTT 2025/04/30 11:04:01 server Short Header{DestConnectionID: bb1930ab, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:01 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:01 server -> Sending packet 2 (29 bytes) for connection 4c33c5c57cc41724e60e41ab553f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 64.76µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:01 Received request: GET /axsykxkyju 2025/04/30 11:04:01 server -> Sending packet 3 (1045 bytes) for connection 4c33c5c57cc41724e60e41ab553f, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:04:01 server -> Sending packet 19 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:01 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:01 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:01 server -> Sending packet 20 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:01 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:01 server <- Reading packet 7 (26 bytes) for connection bb1930ab, 1-RTT 2025/04/30 11:04:01 server Short Header{DestConnectionID: bb1930ab, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:01 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:01 Replacing connection for connection IDs [bb1930ab 0b0a3500 a091019c] with a closed connection. 2025/04/30 11:04:01 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:01 server Connection 4c33c5c57cc41724e60e41ab553f closed. 2025/04/30 11:04:01 server <- Received Initial packet. 2025/04/30 11:04:01 Created qlog file: /logs/qlog/79a8d786d757b0ec0e8713.sqlog 2025/04/30 11:04:01 server Changing connection ID to cef8fbe2. 2025/04/30 11:04:01 Adding connection IDs 79a8d786d757b0ec0e8713 and cef8fbe2 for a new connection. 2025/04/30 11:04:01 server <- Reading packet 0 (1280 bytes) for connection 79a8d786d757b0ec0e8713, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: 79a8d786d757b0ec0e8713, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:04:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:04:01 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:01 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:01 Adding connection ID df0588b1. 2025/04/30 11:04:01 Adding connection ID b8d10eda. 2025/04/30 11:04:01 Adding connection ID 3230296f. 2025/04/30 11:04:01 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 79a8d786d757b0ec0e8713 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cef8fbe2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 427, Version: v1} 2025/04/30 11:04:01 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cef8fbe2, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3230296f, StatelessResetToken: 0x9a55804042b21eb969b06359bf7ea60a} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df0588b1, StatelessResetToken: 0x094efe029f1b29347d4f68a03859bd5f} 2025/04/30 11:04:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8d10eda, StatelessResetToken: 0x14a99bf35cc95931934808512bbd080b} 2025/04/30 11:04:01 Removing connection ID ffab97a8 after it has been retired. 2025/04/30 11:04:01 Removing connection ID b9607d3b15b8b7c8533b after it has been retired. 2025/04/30 11:04:01 Removing connection IDs [f991ea3a 9d15daed f1a43805] for a closed connection after it has been retired. 2025/04/30 11:04:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:01 server -> Sending packet 9 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 server -> Sending packet 10 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:01 server -> Sending packet 11 (1409 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:01 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:01 server -> &wire.PingFrame{} 2025/04/30 11:04:01 server <- Reading packet 1 (1280 bytes) for connection 79a8d786d757b0ec0e8713, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: 79a8d786d757b0ec0e8713, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:04:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:04:01 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:01 server -> Sending packet 1 (1280 bytes) for connection 79a8d786d757b0ec0e8713, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cef8fbe2, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:01 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:01 server -> Sending packet 2 (1280 bytes) for connection 79a8d786d757b0ec0e8713, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cef8fbe2, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:01 server <- Reading packet 3 (1280 bytes) for connection cef8fbe2, Initial 2025/04/30 11:04:01 server Long Header{Type: Initial, DestConnectionID: cef8fbe2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:01 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:01 server newly acked packets (1): [2] 2025/04/30 11:04:01 server updated RTT: 33.990287ms (σ: 16.995143ms) 2025/04/30 11:04:01 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:01 server -> Sending packet 1 (748 bytes) for connection 79a8d786d757b0ec0e8713, Handshake 2025/04/30 11:04:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cef8fbe2, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:01 server -> Sending packet 2 (748 bytes) for connection 79a8d786d757b0ec0e8713, Handshake 2025/04/30 11:04:01 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cef8fbe2, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:02 server <- Reading packet 0 (75 bytes) for connection cef8fbe2, Handshake 2025/04/30 11:04:02 server Long Header{Type: Handshake, DestConnectionID: cef8fbe2, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:02 server Dropping Initial keys. 2025/04/30 11:04:02 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:02 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 Retiring connection ID 79a8d786d757b0ec0e8713 in 5s. 2025/04/30 11:04:02 server Dropping Handshake keys. 2025/04/30 11:04:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:02 server -> Sending packet 2 (323 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.NewTokenFrame{Token: 0x3399b02e7f0004fd921964a8147012107c0e9f1d2150889a94d5aa99e7d461e6ecf7f4e280f3bb2e2e5f7ada7c062117b578b80636f7ddca7be50c9ce883d11d1ecbca68e43427701d1272ce7c9f26c62251223d914d} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3230296f, StatelessResetToken: 0x9a55804042b21eb969b06359bf7ea60a} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df0588b1, StatelessResetToken: 0x094efe029f1b29347d4f68a03859bd5f} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8d10eda, StatelessResetToken: 0x14a99bf35cc95931934808512bbd080b} 2025/04/30 11:04:02 server -> Sending packet 3 (323 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df0588b1, StatelessResetToken: 0x094efe029f1b29347d4f68a03859bd5f} 2025/04/30 11:04:02 server -> &wire.NewTokenFrame{Token: 0x3399b02e7f0004fd921964a8147012107c0e9f1d2150889a94d5aa99e7d461e6ecf7f4e280f3bb2e2e5f7ada7c062117b578b80636f7ddca7be50c9ce883d11d1ecbca68e43427701d1272ce7c9f26c62251223d914d} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3230296f, StatelessResetToken: 0x9a55804042b21eb969b06359bf7ea60a} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8d10eda, StatelessResetToken: 0x14a99bf35cc95931934808512bbd080b} 2025/04/30 11:04:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:02 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:04:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:02 server -> Sending packet 5 (323 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8d10eda, StatelessResetToken: 0x14a99bf35cc95931934808512bbd080b} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3230296f, StatelessResetToken: 0x9a55804042b21eb969b06359bf7ea60a} 2025/04/30 11:04:02 server -> &wire.NewTokenFrame{Token: 0x3399b02e7f0004fd921964a8147012107c0e9f1d2150889a94d5aa99e7d461e6ecf7f4e280f3bb2e2e5f7ada7c062117b578b80636f7ddca7be50c9ce883d11d1ecbca68e43427701d1272ce7c9f26c62251223d914d} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df0588b1, StatelessResetToken: 0x094efe029f1b29347d4f68a03859bd5f} 2025/04/30 11:04:02 server -> Sending packet 6 (323 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3230296f, StatelessResetToken: 0x9a55804042b21eb969b06359bf7ea60a} 2025/04/30 11:04:02 server -> &wire.NewTokenFrame{Token: 0x3399b02e7f0004fd921964a8147012107c0e9f1d2150889a94d5aa99e7d461e6ecf7f4e280f3bb2e2e5f7ada7c062117b578b80636f7ddca7be50c9ce883d11d1ecbca68e43427701d1272ce7c9f26c62251223d914d} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b8d10eda, StatelessResetToken: 0x14a99bf35cc95931934808512bbd080b} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df0588b1, StatelessResetToken: 0x094efe029f1b29347d4f68a03859bd5f} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 server -> Sending packet 7 (1366 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.PingFrame{} 2025/04/30 11:04:02 server <- Reading packet 4 (1366 bytes) for connection df0588b1, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: df0588b1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.PingFrame{} 2025/04/30 11:04:02 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:02 server -> Sending packet 8 (27 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 91.501µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:04:02 server -> Sending packet 13 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:02 server -> Sending packet 14 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:02 server -> Sending packet 22 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:02 server -> Sending packet 23 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:04:02 server -> Sending packet 19 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:02 server -> Sending packet 20 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:02 server <- Reading packet 6 (32 bytes) for connection df0588b1, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: df0588b1, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 25.192ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:02 server newly acked packets (2): [6 7] 2025/04/30 11:04:02 server updated RTT: 36.952ms (σ: 18.671ms) 2025/04/30 11:04:02 server ECN capability confirmed. 2025/04/30 11:04:02 server Canceling loss detection timer. 2025/04/30 11:04:02 server <- Reading packet 7 (44 bytes) for connection df0588b1, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: df0588b1, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:02 Retiring connection ID cef8fbe2 in 5s. 2025/04/30 11:04:02 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:02 Received request: GET /wawwcrdzgp 2025/04/30 11:04:02 server -> Sending packet 9 (1055 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 230.618µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:02 Removing connection ID aba5aca260a882f333a08623539a9c95 after it has been retired. 2025/04/30 11:04:02 server <- Received Initial packet. 2025/04/30 11:04:02 Created qlog file: /logs/qlog/014b2a4759b80e54b7b70c9b584fff09babcde.sqlog 2025/04/30 11:04:02 server Changing connection ID to 53d69d0a. 2025/04/30 11:04:02 Adding connection IDs 014b2a4759b80e54b7b70c9b584fff09babcde and 53d69d0a for a new connection. 2025/04/30 11:04:02 server <- Reading packet 0 (1280 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, Initial 2025/04/30 11:04:02 server Long Header{Type: Initial, DestConnectionID: 014b2a4759b80e54b7b70c9b584fff09babcde, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:02 server <- &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 11:04:02 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:02 Adding connection ID 76fa84e8. 2025/04/30 11:04:02 Adding connection ID b6a47be9. 2025/04/30 11:04:02 Adding connection ID fcd4f447. 2025/04/30 11:04:02 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde 2025/04/30 11:04:02 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 53d69d0a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 417, Version: v1} 2025/04/30 11:04:02 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:02 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 53d69d0a, PacketNumber: 0, PacketNumberLen: 2, Length: 745, Version: v1} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fcd4f447, StatelessResetToken: 0x28581769adbe7f7f6baa7e649b716e73} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6a47be9, StatelessResetToken: 0x843349f77e43d2dd64814bd837b770cd} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76fa84e8, StatelessResetToken: 0xdd2ae4257a07c71d2885f91af7c4491d} 2025/04/30 11:04:02 server <- Reading packet 1 (36 bytes) for connection 76fa84e8, Handshake 2025/04/30 11:04:02 server Long Header{Type: Handshake, DestConnectionID: 76fa84e8, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:02 server Dropping Initial keys. 2025/04/30 11:04:02 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 server newly acked packets (1): [0] 2025/04/30 11:04:02 server updated RTT: 33.443233ms (σ: 16.721616ms) 2025/04/30 11:04:02 server Canceling loss detection timer. 2025/04/30 11:04:02 server Queueing packet (29 bytes) for later decryption 2025/04/30 11:04:02 Tracking 77 connection IDs and 0 reset tokens. 2025/04/30 11:04:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:02 server -> Sending packet 11 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:02 server -> Sending packet 12 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:02 server -> Sending packet 13 (1409 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.PingFrame{} 2025/04/30 11:04:02 server <- Reading packet 3 (70 bytes) for connection 76fa84e8, Handshake 2025/04/30 11:04:02 server Long Header{Type: Handshake, DestConnectionID: 76fa84e8, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:02 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 Retiring connection ID 014b2a4759b80e54b7b70c9b584fff09babcde in 5s. 2025/04/30 11:04:02 server Dropping Handshake keys. 2025/04/30 11:04:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:02 server -> Sending packet 2 (323 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76fa84e8, StatelessResetToken: 0xdd2ae4257a07c71d2885f91af7c4491d} 2025/04/30 11:04:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fcd4f447, StatelessResetToken: 0x28581769adbe7f7f6baa7e649b716e73} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6a47be9, StatelessResetToken: 0x843349f77e43d2dd64814bd837b770cd} 2025/04/30 11:04:02 server -> &wire.NewTokenFrame{Token: 0x44362cb903cdaefd2ef9bff5f6f660cfe5a29e447d6aaf6904af3f809100921aadb8e26348a3bd7260866c9d89ee202d2c79ecc8b6ddd67de045651c25339795094ea55be07d49006000a630ace2201706101ae9dfe6} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 server -> Sending packet 3 (323 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 server -> &wire.NewTokenFrame{Token: 0x44362cb903cdaefd2ef9bff5f6f660cfe5a29e447d6aaf6904af3f809100921aadb8e26348a3bd7260866c9d89ee202d2c79ecc8b6ddd67de045651c25339795094ea55be07d49006000a630ace2201706101ae9dfe6} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76fa84e8, StatelessResetToken: 0xdd2ae4257a07c71d2885f91af7c4491d} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6a47be9, StatelessResetToken: 0x843349f77e43d2dd64814bd837b770cd} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fcd4f447, StatelessResetToken: 0x28581769adbe7f7f6baa7e649b716e73} 2025/04/30 11:04:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 server <- Reading packet 1 (29 bytes) for connection 76fa84e8, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: 76fa84e8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 752µs} 2025/04/30 11:04:02 server <- Reading packet 3 (54 bytes) for connection 76fa84e8, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: 76fa84e8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 128µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:02 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:02 Retiring connection ID 53d69d0a in 5s. 2025/04/30 11:04:02 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:02 server -> Sending packet 4 (29 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 Received request: GET /pkmgqtvigd 2025/04/30 11:04:02 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 105.727µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:02 server -> Sending packet 5 (1045 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:02 server -> Sending packet 6 (23 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:04:02 server <- Reading packet 5 (34 bytes) for connection 76fa84e8, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: 76fa84e8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.304ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:02 server newly acked packets (1): [3] 2025/04/30 11:04:02 server updated RTT: 36.335ms (σ: 18.325ms) 2025/04/30 11:04:02 server ECN capability confirmed. 2025/04/30 11:04:02 server <- Reading packet 6 (33 bytes) for connection 76fa84e8, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: 76fa84e8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:04:02 server newly acked packets (2): [5 6] 2025/04/30 11:04:02 server updated RTT: 35.764ms (σ: 14.884ms) 2025/04/30 11:04:02 server Canceling loss detection timer. 2025/04/30 11:04:02 server -> Sending packet 7 (22 bytes) for connection 014b2a4759b80e54b7b70c9b584fff09babcde, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:02 server <- Reading packet 7 (26 bytes) for connection 76fa84e8, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: 76fa84e8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:02 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:02 Replacing connection for connection IDs [76fa84e8 b6a47be9 fcd4f447] with a closed connection. 2025/04/30 11:04:02 server Connection 014b2a4759b80e54b7b70c9b584fff09babcde closed. 2025/04/30 11:04:02 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:02 server -> Sending packet 15 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:02 server -> Sending packet 16 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:02 server <- Received Initial packet. 2025/04/30 11:04:02 Created qlog file: /logs/qlog/37ddf460e962de632a94aafac7ecc57b.sqlog 2025/04/30 11:04:02 server Changing connection ID to 51b5fd94. 2025/04/30 11:04:02 Adding connection IDs 37ddf460e962de632a94aafac7ecc57b and 51b5fd94 for a new connection. 2025/04/30 11:04:02 server <- Reading packet 1 (1280 bytes) for connection 37ddf460e962de632a94aafac7ecc57b, Initial 2025/04/30 11:04:02 server Long Header{Type: Initial, DestConnectionID: 37ddf460e962de632a94aafac7ecc57b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:04:02 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:02 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:02 Adding connection ID 02397379. 2025/04/30 11:04:02 Adding connection ID c35e5546. 2025/04/30 11:04:02 Adding connection ID 509070ad. 2025/04/30 11:04:02 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 37ddf460e962de632a94aafac7ecc57b 2025/04/30 11:04:02 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 51b5fd94, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 423, Version: v1} 2025/04/30 11:04:02 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:02 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 51b5fd94, PacketNumber: 0, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 02397379, StatelessResetToken: 0x925d4599de077519a1e2eda72273e04b} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 509070ad, StatelessResetToken: 0x4ccb5ca613fbe222f0a1adeea02da6cd} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c35e5546, StatelessResetToken: 0x7d4434f2eb6520630bbd53c8195d9cef} 2025/04/30 11:04:02 server <- Reading packet 2 (1280 bytes) for connection 37ddf460e962de632a94aafac7ecc57b, Initial 2025/04/30 11:04:02 server Long Header{Type: Initial, DestConnectionID: 37ddf460e962de632a94aafac7ecc57b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:04:02 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:02 server -> Sending packet 1 (37 bytes) for connection 37ddf460e962de632a94aafac7ecc57b, Initial 2025/04/30 11:04:02 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 51b5fd94, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:02 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:02 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:04:02 server <- Reading packet 3 (1185 bytes) for connection 02397379, Initial 2025/04/30 11:04:02 server Long Header{Type: Initial, DestConnectionID: 02397379, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:02 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 server newly acked packets (1): [0] 2025/04/30 11:04:02 server updated RTT: 33.685067ms (σ: 16.842533ms) 2025/04/30 11:04:02 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:04:02 server <- Reading packet 0 (70 bytes) for connection 02397379, Handshake 2025/04/30 11:04:02 server Long Header{Type: Handshake, DestConnectionID: 02397379, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:02 server Dropping Initial keys. 2025/04/30 11:04:02 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 Retiring connection ID 37ddf460e962de632a94aafac7ecc57b in 5s. 2025/04/30 11:04:02 server Dropping Handshake keys. 2025/04/30 11:04:02 server <- Reading packet 0 (25 bytes) for connection 02397379, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: 02397379, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:02 Retiring connection ID 51b5fd94 in 5s. 2025/04/30 11:04:02 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:02 server -> Sending packet 1 (256 bytes) for connection 37ddf460e962de632a94aafac7ecc57b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 444.742µs} 2025/04/30 11:04:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 server -> &wire.NewTokenFrame{Token: 0x492ce34faf9409b334954f4ccdf17948f5e3ecec2b8a4418ab4552bccb4305d8726d40c91f434fa83e4f362570b373b54a9776a407665d9ba1c2d44085e0104af9f0bbb6bbaf07f61aefd5ace1faed553f6b3ffd768a} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:04:02 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:02 server <- Reading packet 1 (42 bytes) for connection 02397379, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: 02397379, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:02 Received request: GET /eqmnarwiyl 2025/04/30 11:04:02 server -> Sending packet 2 (1051 bytes) for connection 37ddf460e962de632a94aafac7ecc57b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 533.813µs} 2025/04/30 11:04:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:02 server <- Reading packet 3 (31 bytes) for connection 02397379, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: 02397379, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 72µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:02 server newly acked packets (3): [0 1 2] 2025/04/30 11:04:02 server updated RTT: 33.425ms (σ: 13.15ms) 2025/04/30 11:04:02 server ECN capability confirmed. 2025/04/30 11:04:02 server Canceling loss detection timer. 2025/04/30 11:04:02 server Ignoring all packets below 2. 2025/04/30 11:04:02 server <- Reading packet 4 (26 bytes) for connection 02397379, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: 02397379, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:02 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:02 Replacing connection for connection IDs [509070ad 02397379 c35e5546] with a closed connection. 2025/04/30 11:04:02 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:02 server Connection 37ddf460e962de632a94aafac7ecc57b closed. 2025/04/30 11:04:02 server <- Received Initial packet. 2025/04/30 11:04:02 Created qlog file: /logs/qlog/42d674afb3156a1517e1af.sqlog 2025/04/30 11:04:02 server Changing connection ID to 54f32acd. 2025/04/30 11:04:02 Adding connection IDs 42d674afb3156a1517e1af and 54f32acd for a new connection. 2025/04/30 11:04:02 server <- Reading packet 0 (1280 bytes) for connection 42d674afb3156a1517e1af, Initial 2025/04/30 11:04:02 server Long Header{Type: Initial, DestConnectionID: 42d674afb3156a1517e1af, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:04:02 server <- &wire.CryptoFrame{Offset: 0, Data length: 269, Offset + Data length: 269} 2025/04/30 11:04:02 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:02 Adding connection ID 811f5fc4. 2025/04/30 11:04:02 Adding connection ID 064f475d. 2025/04/30 11:04:02 Adding connection ID 5dc23813. 2025/04/30 11:04:02 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 42d674afb3156a1517e1af 2025/04/30 11:04:02 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 54f32acd, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:04:02 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:02 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 54f32acd, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5dc23813, StatelessResetToken: 0xb6ed21b580163ed741b8fc36115474f1} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 064f475d, StatelessResetToken: 0x04b640192126c8ad05cb0b0233ab1c36} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 811f5fc4, StatelessResetToken: 0xbb3bf00bcca2736074d32614cf55e879} 2025/04/30 11:04:02 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:04:02 server <- Reading packet 1 (36 bytes) for connection 811f5fc4, Handshake 2025/04/30 11:04:02 server Long Header{Type: Handshake, DestConnectionID: 811f5fc4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:02 server Dropping Initial keys. 2025/04/30 11:04:02 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:02 server newly acked packets (1): [0] 2025/04/30 11:04:02 server updated RTT: 33.521568ms (σ: 16.760784ms) 2025/04/30 11:04:02 server Canceling loss detection timer. 2025/04/30 11:04:02 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:04:02 Removing connection ID d67ee5ac708ffd47 after it has been retired. 2025/04/30 11:04:02 server <- Reading packet 2 (70 bytes) for connection 811f5fc4, Handshake 2025/04/30 11:04:02 server Long Header{Type: Handshake, DestConnectionID: 811f5fc4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:02 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:02 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:02 Retiring connection ID 42d674afb3156a1517e1af in 5s. 2025/04/30 11:04:02 server Dropping Handshake keys. 2025/04/30 11:04:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:02 server -> Sending packet 2 (323 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 server -> &wire.NewTokenFrame{Token: 0x95d2f426e5f66bcddf0a31c176d2d8b45d0660202bbe0992200d0975f9c35344acdeb2b716b76d939c77a67f7f7c2fc4f10c3ec10abfa96d99206920e02430cdd990ceceb1fd95d63277c11cd8f1b7c703d76dc20f19} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 811f5fc4, StatelessResetToken: 0xbb3bf00bcca2736074d32614cf55e879} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 064f475d, StatelessResetToken: 0x04b640192126c8ad05cb0b0233ab1c36} 2025/04/30 11:04:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5dc23813, StatelessResetToken: 0xb6ed21b580163ed741b8fc36115474f1} 2025/04/30 11:04:02 server -> Sending packet 3 (323 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 064f475d, StatelessResetToken: 0x04b640192126c8ad05cb0b0233ab1c36} 2025/04/30 11:04:02 server -> &wire.NewTokenFrame{Token: 0x95d2f426e5f66bcddf0a31c176d2d8b45d0660202bbe0992200d0975f9c35344acdeb2b716b76d939c77a67f7f7c2fc4f10c3ec10abfa96d99206920e02430cdd990ceceb1fd95d63277c11cd8f1b7c703d76dc20f19} 2025/04/30 11:04:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5dc23813, StatelessResetToken: 0xb6ed21b580163ed741b8fc36115474f1} 2025/04/30 11:04:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 811f5fc4, StatelessResetToken: 0xbb3bf00bcca2736074d32614cf55e879} 2025/04/30 11:04:02 server <- Reading packet 1 (42 bytes) for connection 811f5fc4, 1-RTT 2025/04/30 11:04:02 server Short Header{DestConnectionID: 811f5fc4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:02 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:02 server -> Sending packet 4 (25 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 100.228424ms} 2025/04/30 11:04:02 Received request: GET /phdrvjidgi 2025/04/30 11:04:02 server -> Sending packet 5 (1045 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:02 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 server <- Reading packet 4 (35 bytes) for connection 811f5fc4, 1-RTT 2025/04/30 11:04:03 server Short Header{DestConnectionID: 811f5fc4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 136µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:03 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:03 Retiring connection ID 54f32acd in 5s. 2025/04/30 11:04:03 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:03 server -> Sending packet 6 (29 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 91.781µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:03 server <- Received Initial packet. 2025/04/30 11:04:03 Created qlog file: /logs/qlog/02e5c78bc423fa151d2c1c29e1c084.sqlog 2025/04/30 11:04:03 server Changing connection ID to a6b0475a. 2025/04/30 11:04:03 Adding connection IDs 02e5c78bc423fa151d2c1c29e1c084 and a6b0475a for a new connection. 2025/04/30 11:04:03 server <- Reading packet 0 (1280 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, Initial 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: 02e5c78bc423fa151d2c1c29e1c084, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:04:03 server <- &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:04:03 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:03 Adding connection ID 01955f8e. 2025/04/30 11:04:03 Adding connection ID 12e3f608. 2025/04/30 11:04:03 Adding connection ID 5c449df3. 2025/04/30 11:04:03 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a6b0475a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 421, Version: v1} 2025/04/30 11:04:03 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:03 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a6b0475a, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01955f8e, StatelessResetToken: 0xf6e98f36c008fef6dc26d52733bf37d3} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c449df3, StatelessResetToken: 0x8347d72905dc5204c5a2324dd7fe9fc4} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 12e3f608, StatelessResetToken: 0x729b2ef011e4d9cb782219a1a40a0c34} 2025/04/30 11:04:03 server Parsed a coalesced packet. Part 1: 1166 bytes. Remaining: 114 bytes. 2025/04/30 11:04:03 server <- Reading packet 1 (1166 bytes) for connection 01955f8e, Initial 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: 01955f8e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:04:03 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:03 server newly acked packets (1): [0] 2025/04/30 11:04:03 server updated RTT: 33.608817ms (σ: 16.804408ms) 2025/04/30 11:04:03 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 44 bytes. 2025/04/30 11:04:03 server <- Reading packet 0 (70 bytes) for connection 01955f8e, Handshake 2025/04/30 11:04:03 server Long Header{Type: Handshake, DestConnectionID: 01955f8e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:03 server Dropping Initial keys. 2025/04/30 11:04:03 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:03 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 Retiring connection ID 02e5c78bc423fa151d2c1c29e1c084 in 5s. 2025/04/30 11:04:03 server Dropping Handshake keys. 2025/04/30 11:04:03 server <- Reading packet 0 (44 bytes) for connection 01955f8e, 1-RTT 2025/04/30 11:04:03 server Short Header{DestConnectionID: 01955f8e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:03 Retiring connection ID a6b0475a in 5s. 2025/04/30 11:04:03 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:03 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:03 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:03 server -> Sending packet 1 (256 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 382.774µs} 2025/04/30 11:04:03 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:03 server -> &wire.NewTokenFrame{Token: 0x612832872b7598c05ccd35534722f61eebf605c15d59bcdb6f7474bbf21f73cc954927ddf454247ecb369b701b8473b7a78e526b052e9629877e798314541b116de21b1560f79994008202c94948c2ca672a622c30e6} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:03 Received request: GET /jdarlldhgi 2025/04/30 11:04:03 server -> Sending packet 2 (1045 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 server <- Reading packet 2 (31 bytes) for connection 01955f8e, 1-RTT 2025/04/30 11:04:03 server Short Header{DestConnectionID: 01955f8e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:03 server newly acked packets (3): [0 1 2] 2025/04/30 11:04:03 server updated RTT: 33.353ms (σ: 13.112ms) 2025/04/30 11:04:03 server ECN capability confirmed. 2025/04/30 11:04:03 server Canceling loss detection timer. 2025/04/30 11:04:03 server Ignoring all packets below 1. 2025/04/30 11:04:03 server -> Sending packet 3 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:03 server <- Received Initial packet. 2025/04/30 11:04:03 Created qlog file: /logs/qlog/b13c21df9046da12848ef769d2d70ccddf.sqlog 2025/04/30 11:04:03 server Changing connection ID to f28cd4ec. 2025/04/30 11:04:03 Adding connection IDs b13c21df9046da12848ef769d2d70ccddf and f28cd4ec for a new connection. 2025/04/30 11:04:03 server <- Reading packet 0 (1280 bytes) for connection b13c21df9046da12848ef769d2d70ccddf, Initial 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: b13c21df9046da12848ef769d2d70ccddf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:04:03 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 11:04:03 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:03 Adding connection ID c9d8462e. 2025/04/30 11:04:03 Adding connection ID 70320f6b. 2025/04/30 11:04:03 Adding connection ID 814c8c28. 2025/04/30 11:04:03 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b13c21df9046da12848ef769d2d70ccddf 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f28cd4ec, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:04:03 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:03 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f28cd4ec, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 814c8c28, StatelessResetToken: 0x7e897e70457334a6f5520015b2ff34b2} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c9d8462e, StatelessResetToken: 0xe2d022e6b0a3f46ab574c9206fe47c46} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 70320f6b, StatelessResetToken: 0x40cd2f6d1633df560476d2683aae4712} 2025/04/30 11:04:03 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:04:03 server <- Reading packet 1 (1185 bytes) for connection c9d8462e, Initial 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: c9d8462e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:03 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:03 server newly acked packets (1): [0] 2025/04/30 11:04:03 server updated RTT: 33.615376ms (σ: 16.807688ms) 2025/04/30 11:04:03 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:04:03 server <- Reading packet 0 (70 bytes) for connection c9d8462e, Handshake 2025/04/30 11:04:03 server Long Header{Type: Handshake, DestConnectionID: c9d8462e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:03 server Dropping Initial keys. 2025/04/30 11:04:03 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:03 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 Retiring connection ID b13c21df9046da12848ef769d2d70ccddf in 5s. 2025/04/30 11:04:03 server Dropping Handshake keys. 2025/04/30 11:04:03 server <- Reading packet 0 (25 bytes) for connection c9d8462e, 1-RTT 2025/04/30 11:04:03 server Short Header{DestConnectionID: c9d8462e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:03 Retiring connection ID f28cd4ec in 5s. 2025/04/30 11:04:03 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:03 server <- Reading packet 2 (29 bytes) for connection c9d8462e, 1-RTT 2025/04/30 11:04:03 server Short Header{DestConnectionID: c9d8462e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 872µs} 2025/04/30 11:04:03 server newly acked packets (1): [0] 2025/04/30 11:04:03 server updated RTT: 33.617ms (σ: 12.609ms) 2025/04/30 11:04:03 server Canceling loss detection timer. 2025/04/30 11:04:03 server -> Sending packet 1 (261 bytes) for connection b13c21df9046da12848ef769d2d70ccddf, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 387.032µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:03 server -> &wire.NewTokenFrame{Token: 0xbbcc92747f70b9c0667a28807448475cfc2f39a47dd38a3aff187de064cba7c470c764f1a520a53ffde080a1d6fc7882fb6674ff825b956eb4d6c8d3e98c075dcc9e5172f831769f5d8accda072b1eb60dc4383934b5} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:03 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:03 server <- Reading packet 3 (51 bytes) for connection c9d8462e, 1-RTT 2025/04/30 11:04:03 server Short Header{DestConnectionID: c9d8462e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 6.296ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:03 server newly acked packets (1): [1] 2025/04/30 11:04:03 server updated RTT: 34.06ms (σ: 10.343ms) 2025/04/30 11:04:03 server ECN capability confirmed. 2025/04/30 11:04:03 server Canceling loss detection timer. 2025/04/30 11:04:03 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:03 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:03 server Ignoring all packets below 3. 2025/04/30 11:04:03 Received request: GET /nnbtfkdaoz 2025/04/30 11:04:03 server -> Sending packet 2 (1053 bytes) for connection b13c21df9046da12848ef769d2d70ccddf, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 252.48µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 server <- Reading packet 4 (26 bytes) for connection c9d8462e, 1-RTT 2025/04/30 11:04:03 server Short Header{DestConnectionID: c9d8462e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:03 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:03 Replacing connection for connection IDs [70320f6b 814c8c28 c9d8462e] with a closed connection. 2025/04/30 11:04:03 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:03 server Connection b13c21df9046da12848ef769d2d70ccddf closed. 2025/04/30 11:04:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:03 server -> Sending packet 5 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:03 server -> Sending packet 6 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:04:03 server -> Sending packet 16 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 server -> Sending packet 17 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:03 server -> Sending packet 8 (323 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 811f5fc4, StatelessResetToken: 0xbb3bf00bcca2736074d32614cf55e879} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 064f475d, StatelessResetToken: 0x04b640192126c8ad05cb0b0233ab1c36} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5dc23813, StatelessResetToken: 0xb6ed21b580163ed741b8fc36115474f1} 2025/04/30 11:04:03 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:03 server -> &wire.NewTokenFrame{Token: 0x95d2f426e5f66bcddf0a31c176d2d8b45d0660202bbe0992200d0975f9c35344acdeb2b716b76d939c77a67f7f7c2fc4f10c3ec10abfa96d99206920e02430cdd990ceceb1fd95d63277c11cd8f1b7c703d76dc20f19} 2025/04/30 11:04:03 server Skipping packet number 7 2025/04/30 11:04:03 server -> Sending packet 9 (1045 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 server -> Sending packet 10 (1366 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.PingFrame{} 2025/04/30 11:04:03 Removing connection ID 59994b531dd076da after it has been retired. 2025/04/30 11:04:03 Removing connection ID 34f1db42 after it has been retired. 2025/04/30 11:04:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:04:03 server -> Sending packet 18 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 server -> Sending packet 19 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:03 server -> Sending packet 22 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:03 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:03 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:03 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:03 server -> Sending packet 23 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:03 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:03 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:03 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:03 server <- Received Initial packet. 2025/04/30 11:04:03 Created qlog file: /logs/qlog/5c15ff8e6eb603503a.sqlog 2025/04/30 11:04:03 server Changing connection ID to b8e83c99. 2025/04/30 11:04:03 Adding connection IDs 5c15ff8e6eb603503a and b8e83c99 for a new connection. 2025/04/30 11:04:03 server <- Reading packet 1 (1280 bytes) for connection 5c15ff8e6eb603503a, Initial 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: 5c15ff8e6eb603503a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:03 server <- &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:03 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 Removing connection IDs [1234b61c 7dffab58 c5aeb7e1] for a closed connection after it has been retired. 2025/04/30 11:04:03 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:03 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:03 Adding connection ID 3d7412f5. 2025/04/30 11:04:03 Adding connection ID 4f50378f. 2025/04/30 11:04:03 Adding connection ID 7f285fee. 2025/04/30 11:04:03 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5c15ff8e6eb603503a 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b8e83c99, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 427, Version: v1} 2025/04/30 11:04:03 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:03 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b8e83c99, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f50378f, StatelessResetToken: 0x09313ad615b4cc3fda21d0138a8d4c21} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7f285fee, StatelessResetToken: 0x11056c3a071e1fea54a7f4eab65549db} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3d7412f5, StatelessResetToken: 0xf88c52c5ea04156df4565c6888ed18d0} 2025/04/30 11:04:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:03 server -> Sending packet 8 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:03 server -> Sending packet 9 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:03 server -> Sending packet 10 (1366 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.PingFrame{} 2025/04/30 11:04:03 Removing connection ID 9dfed28f after it has been retired. 2025/04/30 11:04:03 Removing connection ID f908be740ec22be506c1f812ab37e5adf589d274 after it has been retired. 2025/04/30 11:04:03 Removing connection IDs [8428fff6 aaf109ae f85c12bd] for a closed connection after it has been retired. 2025/04/30 11:04:03 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:03 server -> Sending packet 1 (1280 bytes) for connection 5c15ff8e6eb603503a, Initial 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b8e83c99, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:03 server -> Sending packet 2 (1280 bytes) for connection 5c15ff8e6eb603503a, Initial 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b8e83c99, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:03 server Canceling loss detection timer. 2025/04/30 11:04:03 server Amplification window limited. Received 1280 bytes, already sent out 3840 bytes 2025/04/30 11:04:03 server <- Reading packet 3 (1280 bytes) for connection b8e83c99, Initial 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: b8e83c99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:03 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:03 server -> Sending packet 21 (1045 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 server Skipping packet number 20 2025/04/30 11:04:03 server -> Sending packet 22 (23 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 11:04:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:04:03 server -> Sending packet 12 (323 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 064f475d, StatelessResetToken: 0x04b640192126c8ad05cb0b0233ab1c36} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 811f5fc4, StatelessResetToken: 0xbb3bf00bcca2736074d32614cf55e879} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5dc23813, StatelessResetToken: 0xb6ed21b580163ed741b8fc36115474f1} 2025/04/30 11:04:03 server -> &wire.NewTokenFrame{Token: 0x95d2f426e5f66bcddf0a31c176d2d8b45d0660202bbe0992200d0975f9c35344acdeb2b716b76d939c77a67f7f7c2fc4f10c3ec10abfa96d99206920e02430cdd990ceceb1fd95d63277c11cd8f1b7c703d76dc20f19} 2025/04/30 11:04:03 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:03 server Skipping packet number 11 2025/04/30 11:04:03 server -> Sending packet 13 (1045 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:03 server <- Reading packet 5 (1280 bytes) for connection b8e83c99, Initial 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: b8e83c99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:03 server <- &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:03 server -> Sending packet 3 (41 bytes) for connection 5c15ff8e6eb603503a, Initial 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b8e83c99, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 27, Version: v1} 2025/04/30 11:04:03 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:04:03 server <- Reading packet 6 (1280 bytes) for connection b8e83c99, Initial 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: b8e83c99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:03 server <- &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:03 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:04:03 server -> Sending packet 1 (748 bytes) for connection 5c15ff8e6eb603503a, Handshake 2025/04/30 11:04:03 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b8e83c99, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:03 server -> Sending packet 2 (748 bytes) for connection 5c15ff8e6eb603503a, Handshake 2025/04/30 11:04:03 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b8e83c99, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 11:04:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 11:04:03 server -> Sending packet 4 (41 bytes) for connection 5c15ff8e6eb603503a, Initial 2025/04/30 11:04:03 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b8e83c99, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 27, Version: v1} 2025/04/30 11:04:03 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:04:03 server <- Reading packet 1 (36 bytes) for connection b8e83c99, Handshake 2025/04/30 11:04:03 server Long Header{Type: Handshake, DestConnectionID: b8e83c99, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:03 server Dropping Initial keys. 2025/04/30 11:04:03 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:03 server newly acked packets (1): [2] 2025/04/30 11:04:03 server updated RTT: 31.961371ms (σ: 15.980685ms) 2025/04/30 11:04:03 server Canceling loss detection timer. 2025/04/30 11:04:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:04:03 server -> Sending packet 12 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:03 server -> Sending packet 13 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:03 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:03 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:04 Removing connection ID 5c706d7fcb8a3a075cea75f5d3 after it has been retired. 2025/04/30 11:04:04 server <- Reading packet 3 (70 bytes) for connection b8e83c99, Handshake 2025/04/30 11:04:04 server Long Header{Type: Handshake, DestConnectionID: b8e83c99, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:04 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 Retiring connection ID 5c15ff8e6eb603503a in 5s. 2025/04/30 11:04:04 server Dropping Handshake keys. 2025/04/30 11:04:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:04 server -> Sending packet 2 (323 bytes) for connection 5c15ff8e6eb603503a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7f285fee, StatelessResetToken: 0x11056c3a071e1fea54a7f4eab65549db} 2025/04/30 11:04:04 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f50378f, StatelessResetToken: 0x09313ad615b4cc3fda21d0138a8d4c21} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3d7412f5, StatelessResetToken: 0xf88c52c5ea04156df4565c6888ed18d0} 2025/04/30 11:04:04 server -> &wire.NewTokenFrame{Token: 0xb0d353efd728bdf306d4ebf345fba7771ee8896ec18aee329d92abfadfe35f7abfb0e6b9325498c39b7b14b277759c27db9b0262847770f0dba40320f6e7130d0d4c4a434d28218cb5a77525200a3912db21db881ae6} 2025/04/30 11:04:04 server -> Sending packet 3 (323 bytes) for connection 5c15ff8e6eb603503a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7f285fee, StatelessResetToken: 0x11056c3a071e1fea54a7f4eab65549db} 2025/04/30 11:04:04 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3d7412f5, StatelessResetToken: 0xf88c52c5ea04156df4565c6888ed18d0} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f50378f, StatelessResetToken: 0x09313ad615b4cc3fda21d0138a8d4c21} 2025/04/30 11:04:04 server -> &wire.NewTokenFrame{Token: 0xb0d353efd728bdf306d4ebf345fba7771ee8896ec18aee329d92abfadfe35f7abfb0e6b9325498c39b7b14b277759c27db9b0262847770f0dba40320f6e7130d0d4c4a434d28218cb5a77525200a3912db21db881ae6} 2025/04/30 11:04:04 Removing connection ID 90be1d07 after it has been retired. 2025/04/30 11:04:04 server <- Reading packet 2 (52 bytes) for connection 3d7412f5, 1-RTT 2025/04/30 11:04:04 server Short Header{DestConnectionID: 3d7412f5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 176µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:04 server newly acked packets (1): [3] 2025/04/30 11:04:04 server updated RTT: 31.913ms (σ: 12.079ms) 2025/04/30 11:04:04 server ECN capability confirmed. 2025/04/30 11:04:04 server Canceling loss detection timer. 2025/04/30 11:04:04 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:04 Retiring connection ID b8e83c99 in 5s. 2025/04/30 11:04:04 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:04 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:04 server <- Reading packet 3 (44 bytes) for connection 3d7412f5, 1-RTT 2025/04/30 11:04:04 server Short Header{DestConnectionID: 3d7412f5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:04 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:04 server -> Sending packet 4 (27 bytes) for connection 5c15ff8e6eb603503a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 161.952µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:04 Received request: GET /smlriangdh 2025/04/30 11:04:04 server -> Sending packet 5 (1045 bytes) for connection 5c15ff8e6eb603503a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 server <- Reading packet 4 (1366 bytes) for connection 3d7412f5, 1-RTT 2025/04/30 11:04:04 server Short Header{DestConnectionID: 3d7412f5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server <- &wire.PingFrame{} 2025/04/30 11:04:04 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:04 server Sending ACK because the ACK timer expired. 2025/04/30 11:04:04 server -> Sending packet 6 (28 bytes) for connection 5c15ff8e6eb603503a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 25.237405ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:04 server <- Reading packet 5 (26 bytes) for connection 3d7412f5, 1-RTT 2025/04/30 11:04:04 server Short Header{DestConnectionID: 3d7412f5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:04 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:04 Replacing connection for connection IDs [3d7412f5 4f50378f 7f285fee] with a closed connection. 2025/04/30 11:04:04 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:04 server Connection 5c15ff8e6eb603503a closed. 2025/04/30 11:04:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:04 server -> Sending packet 22 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:04 server -> Sending packet 23 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:04 Removing connection ID 2c13f762 after it has been retired. 2025/04/30 11:04:04 Removing connection ID 5b1c333a32e6b2269ec7eba8af35b8 after it has been retired. 2025/04/30 11:04:04 server <- Received Initial packet. 2025/04/30 11:04:04 Created qlog file: /logs/qlog/416fb4e109fc0dad981233c17b.sqlog 2025/04/30 11:04:04 server Changing connection ID to d34a5e8f. 2025/04/30 11:04:04 Adding connection IDs 416fb4e109fc0dad981233c17b and d34a5e8f for a new connection. 2025/04/30 11:04:04 server <- Reading packet 1 (1280 bytes) for connection 416fb4e109fc0dad981233c17b, Initial 2025/04/30 11:04:04 server Long Header{Type: Initial, DestConnectionID: 416fb4e109fc0dad981233c17b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:04:04 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:04 Adding connection ID 4c6df4de. 2025/04/30 11:04:04 Adding connection ID a8d937ad. 2025/04/30 11:04:04 Adding connection ID e78f2792. 2025/04/30 11:04:04 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 416fb4e109fc0dad981233c17b 2025/04/30 11:04:04 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d34a5e8f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 435, Version: v1} 2025/04/30 11:04:04 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:04 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d34a5e8f, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e78f2792, StatelessResetToken: 0x54259b660e6ef763f50014e9ed71d58d} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c6df4de, StatelessResetToken: 0xda9332d6c40e30ae833e01b45406eb50} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a8d937ad, StatelessResetToken: 0x75ce03a09d7a392886734a8d11e0efb7} 2025/04/30 11:04:04 server <- Reading packet 2 (1280 bytes) for connection 416fb4e109fc0dad981233c17b, Initial 2025/04/30 11:04:04 server Long Header{Type: Initial, DestConnectionID: 416fb4e109fc0dad981233c17b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:04:04 server -> Sending packet 1 (37 bytes) for connection 416fb4e109fc0dad981233c17b, Initial 2025/04/30 11:04:04 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d34a5e8f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:04 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:04 server Queueing packet (29 bytes) for later decryption 2025/04/30 11:04:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:04:04 server -> Sending packet 21 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 server -> Sending packet 22 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 Tracking 92 connection IDs and 0 reset tokens. 2025/04/30 11:04:04 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:04 server -> Sending packet 2 (1280 bytes) for connection 416fb4e109fc0dad981233c17b, Initial 2025/04/30 11:04:04 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d34a5e8f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:04 server -> Sending packet 3 (1280 bytes) for connection 416fb4e109fc0dad981233c17b, Initial 2025/04/30 11:04:04 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d34a5e8f, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:04 Removing connection IDs [65671eca e5ab06ae 768acd7a] for a closed connection after it has been retired. 2025/04/30 11:04:04 server <- Reading packet 2 (70 bytes) for connection 4c6df4de, Handshake 2025/04/30 11:04:04 server Long Header{Type: Handshake, DestConnectionID: 4c6df4de, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:04 server Dropping Initial keys. 2025/04/30 11:04:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:04 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 Retiring connection ID 416fb4e109fc0dad981233c17b in 5s. 2025/04/30 11:04:04 server Dropping Handshake keys. 2025/04/30 11:04:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:04 server -> Sending packet 2 (320 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c6df4de, StatelessResetToken: 0xda9332d6c40e30ae833e01b45406eb50} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e78f2792, StatelessResetToken: 0x54259b660e6ef763f50014e9ed71d58d} 2025/04/30 11:04:04 server -> &wire.NewTokenFrame{Token: 0xf50de0ace8ce87c2acfa261ee7553a7769f542d42b7cdd02069b7185cb72fd479195c7f1f5dd62283e80d93d5ab909654b6bf6a6ca054e751e6fb8a5324d0cbab664f6502313284ae23734e708d0be8c53744d242709} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a8d937ad, StatelessResetToken: 0x75ce03a09d7a392886734a8d11e0efb7} 2025/04/30 11:04:04 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:04 server -> Sending packet 3 (320 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.NewTokenFrame{Token: 0xf50de0ace8ce87c2acfa261ee7553a7769f542d42b7cdd02069b7185cb72fd479195c7f1f5dd62283e80d93d5ab909654b6bf6a6ca054e751e6fb8a5324d0cbab664f6502313284ae23734e708d0be8c53744d242709} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c6df4de, StatelessResetToken: 0xda9332d6c40e30ae833e01b45406eb50} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a8d937ad, StatelessResetToken: 0x75ce03a09d7a392886734a8d11e0efb7} 2025/04/30 11:04:04 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e78f2792, StatelessResetToken: 0x54259b660e6ef763f50014e9ed71d58d} 2025/04/30 11:04:04 server -> Sending packet 4 (1366 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.PingFrame{} 2025/04/30 11:04:04 server <- Reading packet 1 (29 bytes) for connection 4c6df4de, 1-RTT 2025/04/30 11:04:04 server Short Header{DestConnectionID: 4c6df4de, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 920µs} 2025/04/30 11:04:04 Removing connection ID bce00a68 after it has been retired. 2025/04/30 11:04:04 Removing connection ID c42cc020e7d7eb5f144813c50b91666675 after it has been retired. 2025/04/30 11:04:04 server <- Reading packet 3 (54 bytes) for connection 4c6df4de, 1-RTT 2025/04/30 11:04:04 server Short Header{DestConnectionID: 4c6df4de, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 120µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:04 server newly acked packets (1): [3] 2025/04/30 11:04:04 server updated RTT: 31.507173ms (σ: 15.753586ms) 2025/04/30 11:04:04 server ECN capability confirmed. 2025/04/30 11:04:04 server Canceling loss detection timer. 2025/04/30 11:04:04 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:04 Retiring connection ID d34a5e8f in 5s. 2025/04/30 11:04:04 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:04 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:04 server -> Sending packet 5 (29 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 Received request: GET /fowffbpfbz 2025/04/30 11:04:04 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 195.695µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:04 server -> Sending packet 6 (1045 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:04 server -> Sending packet 8 (1045 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 server -> Sending packet 9 (1045 bytes) for connection 416fb4e109fc0dad981233c17b, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 server <- Reading packet 7 (35 bytes) for connection 4c6df4de, 1-RTT 2025/04/30 11:04:04 server Short Header{DestConnectionID: 4c6df4de, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 96µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:04:04 server newly acked packets (2): [4 9] 2025/04/30 11:04:04 server updated RTT: 31.638ms (σ: 12.078ms) 2025/04/30 11:04:04 server Canceling loss detection timer. 2025/04/30 11:04:04 server <- Reading packet 8 (26 bytes) for connection 4c6df4de, 1-RTT 2025/04/30 11:04:04 server Short Header{DestConnectionID: 4c6df4de, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:04 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:04 Replacing connection for connection IDs [4c6df4de a8d937ad e78f2792] with a closed connection. 2025/04/30 11:04:04 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:04 server Connection 416fb4e109fc0dad981233c17b closed. 2025/04/30 11:04:04 server <- Received Initial packet. 2025/04/30 11:04:04 Created qlog file: /logs/qlog/8c746c22f0fc03dc2ab12c98.sqlog 2025/04/30 11:04:04 server Changing connection ID to 4d4595fd. 2025/04/30 11:04:04 Adding connection IDs 8c746c22f0fc03dc2ab12c98 and 4d4595fd for a new connection. 2025/04/30 11:04:04 server <- Reading packet 0 (1280 bytes) for connection 8c746c22f0fc03dc2ab12c98, Initial 2025/04/30 11:04:04 server Long Header{Type: Initial, DestConnectionID: 8c746c22f0fc03dc2ab12c98, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:04 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:04 Adding connection ID d1a15c7b. 2025/04/30 11:04:04 Adding connection ID def9f1ff. 2025/04/30 11:04:04 Adding connection ID 1b25d1b1. 2025/04/30 11:04:04 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8c746c22f0fc03dc2ab12c98 2025/04/30 11:04:04 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4d4595fd, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 429, Version: v1} 2025/04/30 11:04:04 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:04 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4d4595fd, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1b25d1b1, StatelessResetToken: 0xf7189365ba8dc274280df0bd9f9a99be} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d1a15c7b, StatelessResetToken: 0x23387058c65bba87ceeee2bd4ef35ecf} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: def9f1ff, StatelessResetToken: 0xb255f4ef5d7cff43c6ff7229796e7ca9} 2025/04/30 11:04:04 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:04:04 server <- Reading packet 1 (36 bytes) for connection d1a15c7b, Handshake 2025/04/30 11:04:04 server Long Header{Type: Handshake, DestConnectionID: d1a15c7b, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:04 server Dropping Initial keys. 2025/04/30 11:04:04 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:04 server newly acked packets (1): [0] 2025/04/30 11:04:04 server updated RTT: 33.464183ms (σ: 16.732091ms) 2025/04/30 11:04:04 server Canceling loss detection timer. 2025/04/30 11:04:04 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:04:04 server Queueing packet (29 bytes) for later decryption 2025/04/30 11:04:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:04:04 server -> Sending packet 15 (323 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:04 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5dc23813, StatelessResetToken: 0xb6ed21b580163ed741b8fc36115474f1} 2025/04/30 11:04:04 server -> &wire.NewTokenFrame{Token: 0x95d2f426e5f66bcddf0a31c176d2d8b45d0660202bbe0992200d0975f9c35344acdeb2b716b76d939c77a67f7f7c2fc4f10c3ec10abfa96d99206920e02430cdd990ceceb1fd95d63277c11cd8f1b7c703d76dc20f19} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 064f475d, StatelessResetToken: 0x04b640192126c8ad05cb0b0233ab1c36} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 811f5fc4, StatelessResetToken: 0xbb3bf00bcca2736074d32614cf55e879} 2025/04/30 11:04:04 server Skipping packet number 14 2025/04/30 11:04:04 server -> Sending packet 16 (1045 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:04:04 server -> Sending packet 15 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:04 server -> Sending packet 16 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:04 server <- Reading packet 2 (70 bytes) for connection d1a15c7b, Handshake 2025/04/30 11:04:04 server Long Header{Type: Handshake, DestConnectionID: d1a15c7b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:04 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 Retiring connection ID 8c746c22f0fc03dc2ab12c98 in 5s. 2025/04/30 11:04:04 server Dropping Handshake keys. 2025/04/30 11:04:04 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:04:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:04 server -> Sending packet 2 (323 bytes) for connection 8c746c22f0fc03dc2ab12c98, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d1a15c7b, StatelessResetToken: 0x23387058c65bba87ceeee2bd4ef35ecf} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1b25d1b1, StatelessResetToken: 0xf7189365ba8dc274280df0bd9f9a99be} 2025/04/30 11:04:04 server -> &wire.NewTokenFrame{Token: 0x7251d768848d09b641bd7b7e3066f664a19fe4d45008b3857c5dcfe1633e265d260a17a473f794b18978d680977353c8eb63fcacbddcb5d35b66a503377f2094f85e904a8175f60fd0daf1ec8204622683b4f8181653} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: def9f1ff, StatelessResetToken: 0xb255f4ef5d7cff43c6ff7229796e7ca9} 2025/04/30 11:04:04 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:04 server -> Sending packet 3 (323 bytes) for connection 8c746c22f0fc03dc2ab12c98, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1b25d1b1, StatelessResetToken: 0xf7189365ba8dc274280df0bd9f9a99be} 2025/04/30 11:04:04 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d1a15c7b, StatelessResetToken: 0x23387058c65bba87ceeee2bd4ef35ecf} 2025/04/30 11:04:04 server -> &wire.NewTokenFrame{Token: 0x7251d768848d09b641bd7b7e3066f664a19fe4d45008b3857c5dcfe1633e265d260a17a473f794b18978d680977353c8eb63fcacbddcb5d35b66a503377f2094f85e904a8175f60fd0daf1ec8204622683b4f8181653} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: def9f1ff, StatelessResetToken: 0xb255f4ef5d7cff43c6ff7229796e7ca9} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:04 server <- Reading packet 1 (42 bytes) for connection d1a15c7b, 1-RTT 2025/04/30 11:04:04 server Short Header{DestConnectionID: d1a15c7b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:04 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:04 server <- Reading packet 2 (29 bytes) for connection d1a15c7b, 1-RTT 2025/04/30 11:04:04 server Short Header{DestConnectionID: d1a15c7b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 776µs} 2025/04/30 11:04:04 server -> Sending packet 4 (28 bytes) for connection 8c746c22f0fc03dc2ab12c98, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 99.988717ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:04 Received request: GET /bqqtsekeua 2025/04/30 11:04:04 server -> Sending packet 5 (1045 bytes) for connection 8c746c22f0fc03dc2ab12c98, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 server Parsed a coalesced packet. Part 1: 35 bytes. Remaining: 26 bytes. 2025/04/30 11:04:04 server Dropping %!s(logging.PacketType=1) packet (35 bytes) because we already dropped the keys. 2025/04/30 11:04:04 server <- Reading packet 4 (26 bytes) for connection d1a15c7b, 1-RTT 2025/04/30 11:04:04 server Short Header{DestConnectionID: d1a15c7b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:04 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:04 Replacing connection for connection IDs [def9f1ff 1b25d1b1 4d4595fd d1a15c7b] with a closed connection. 2025/04/30 11:04:04 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:04 server Connection 8c746c22f0fc03dc2ab12c98 closed. 2025/04/30 11:04:04 server <- Received Initial packet. 2025/04/30 11:04:04 Created qlog file: /logs/qlog/1d8f8b2e316e48107d30e89cf8.sqlog 2025/04/30 11:04:04 server Changing connection ID to b1cf4dae. 2025/04/30 11:04:04 Adding connection IDs 1d8f8b2e316e48107d30e89cf8 and b1cf4dae for a new connection. 2025/04/30 11:04:04 server <- Reading packet 0 (1280 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Initial 2025/04/30 11:04:04 server Long Header{Type: Initial, DestConnectionID: 1d8f8b2e316e48107d30e89cf8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:04 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:04 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:04 Adding connection ID 4d3048a1. 2025/04/30 11:04:04 Adding connection ID dcedb29b. 2025/04/30 11:04:04 Adding connection ID e4c6706d. 2025/04/30 11:04:04 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1d8f8b2e316e48107d30e89cf8 2025/04/30 11:04:04 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b1cf4dae, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:04:04 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:04 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b1cf4dae, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:04:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dcedb29b, StatelessResetToken: 0x24a961678ea39ff00455307ce4946518} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e4c6706d, StatelessResetToken: 0x068e8ef0a9bc61233ac7ea2881f56c30} 2025/04/30 11:04:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d3048a1, StatelessResetToken: 0x050dad76c19cc2008ee6ec9754070efb} 2025/04/30 11:04:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:04 server -> Sending packet 19 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 server -> Sending packet 20 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:04 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:04 Removing connection IDs [8674b766 aaa65bec 5f81316b] for a closed connection after it has been retired. 2025/04/30 11:04:05 Removing connection ID 4a599647 after it has been retired. 2025/04/30 11:04:05 Removing connection ID 23d0d3cddf0ff9c2b25a5164bcd9b529c3da after it has been retired. 2025/04/30 11:04:05 server <- Reading packet 1 (1280 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: 1d8f8b2e316e48107d30e89cf8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:05 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:05 server -> Sending packet 1 (1280 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b1cf4dae, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:05 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:05 server -> Sending packet 2 (1280 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b1cf4dae, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:05 server <- Reading packet 2 (1280 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: 1d8f8b2e316e48107d30e89cf8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:05 server -> Sending packet 3 (37 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b1cf4dae, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:05 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:05 server <- Reading packet 3 (1280 bytes) for connection b1cf4dae, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: b1cf4dae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:05 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:05 server <- Reading packet 4 (1280 bytes) for connection b1cf4dae, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: b1cf4dae, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:05 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:05 server newly acked packets (1): [2] 2025/04/30 11:04:05 server updated RTT: 34.077075ms (σ: 17.038537ms) 2025/04/30 11:04:05 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:05 server -> Sending packet 1 (739 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Handshake 2025/04/30 11:04:05 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b1cf4dae, PacketNumber: 1, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:04:05 server -> Sending packet 2 (739 bytes) for connection 1d8f8b2e316e48107d30e89cf8, Handshake 2025/04/30 11:04:05 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b1cf4dae, PacketNumber: 2, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:04:05 server <- Reading packet 0 (75 bytes) for connection b1cf4dae, Handshake 2025/04/30 11:04:05 server Long Header{Type: Handshake, DestConnectionID: b1cf4dae, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:05 server Dropping Initial keys. 2025/04/30 11:04:05 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:05 server newly acked packets (1): [2] 2025/04/30 11:04:05 server updated RTT: 33.846ms (σ: 13.239ms) 2025/04/30 11:04:05 server Canceling loss detection timer. 2025/04/30 11:04:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:05 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 Retiring connection ID 1d8f8b2e316e48107d30e89cf8 in 5s. 2025/04/30 11:04:05 server Dropping Handshake keys. 2025/04/30 11:04:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:05 server -> Sending packet 2 (323 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dcedb29b, StatelessResetToken: 0x24a961678ea39ff00455307ce4946518} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d3048a1, StatelessResetToken: 0x050dad76c19cc2008ee6ec9754070efb} 2025/04/30 11:04:05 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e4c6706d, StatelessResetToken: 0x068e8ef0a9bc61233ac7ea2881f56c30} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:05 server -> &wire.NewTokenFrame{Token: 0x15aaebb7ab8cb8794af850109377e93cff90033cb6c2a029519e0d72aae68358a99026b5ad6122d4f2a7b890eda92477e6efd85312f32fe15798e654ac2b4b90efe0b62dc44528627a97825f25f3721d73f1515999fc} 2025/04/30 11:04:05 server -> Sending packet 3 (323 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d3048a1, StatelessResetToken: 0x050dad76c19cc2008ee6ec9754070efb} 2025/04/30 11:04:05 server -> &wire.NewTokenFrame{Token: 0x15aaebb7ab8cb8794af850109377e93cff90033cb6c2a029519e0d72aae68358a99026b5ad6122d4f2a7b890eda92477e6efd85312f32fe15798e654ac2b4b90efe0b62dc44528627a97825f25f3721d73f1515999fc} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e4c6706d, StatelessResetToken: 0x068e8ef0a9bc61233ac7ea2881f56c30} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dcedb29b, StatelessResetToken: 0x24a961678ea39ff00455307ce4946518} 2025/04/30 11:04:05 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:05 server <- Reading packet 0 (42 bytes) for connection b1cf4dae, 1-RTT 2025/04/30 11:04:05 server Short Header{DestConnectionID: b1cf4dae, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:05 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:05 server -> Sending packet 4 (27 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 255.099µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:05 Received request: GET /ergdkzbhtn 2025/04/30 11:04:05 server -> Sending packet 5 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 server <- Reading packet 4 (25 bytes) for connection 4d3048a1, 1-RTT 2025/04/30 11:04:05 server Short Header{DestConnectionID: 4d3048a1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:05 Retiring connection ID b1cf4dae in 5s. 2025/04/30 11:04:05 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:05 server <- Reading packet 5 (25 bytes) for connection 4d3048a1, 1-RTT 2025/04/30 11:04:05 server Short Header{DestConnectionID: 4d3048a1, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:05 server -> Sending packet 6 (29 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 160.609µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:05 server -> Sending packet 8 (323 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e4c6706d, StatelessResetToken: 0x068e8ef0a9bc61233ac7ea2881f56c30} 2025/04/30 11:04:05 server -> &wire.NewTokenFrame{Token: 0x15aaebb7ab8cb8794af850109377e93cff90033cb6c2a029519e0d72aae68358a99026b5ad6122d4f2a7b890eda92477e6efd85312f32fe15798e654ac2b4b90efe0b62dc44528627a97825f25f3721d73f1515999fc} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dcedb29b, StatelessResetToken: 0x24a961678ea39ff00455307ce4946518} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:05 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4d3048a1, StatelessResetToken: 0x050dad76c19cc2008ee6ec9754070efb} 2025/04/30 11:04:05 server Skipping packet number 7 2025/04/30 11:04:05 server -> Sending packet 9 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 server -> Sending packet 10 (1366 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.PingFrame{} 2025/04/30 11:04:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:05 server -> Sending packet 24 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 server -> Sending packet 25 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 server <- Reading packet 6 (1366 bytes) for connection 4d3048a1, 1-RTT 2025/04/30 11:04:05 server Short Header{DestConnectionID: 4d3048a1, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server <- &wire.PingFrame{} 2025/04/30 11:04:05 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:05 server <- Reading packet 7 (35 bytes) for connection 4d3048a1, 1-RTT 2025/04/30 11:04:05 server Short Header{DestConnectionID: 4d3048a1, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 184µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:04:05 server newly acked packets (1): [8] 2025/04/30 11:04:05 server updated RTT: 33.649ms (σ: 10.322ms) 2025/04/30 11:04:05 server ECN capability confirmed. 2025/04/30 11:04:05 server <- Received Initial packet. 2025/04/30 11:04:05 Created qlog file: /logs/qlog/7fe3ac196fef8486de73cb.sqlog 2025/04/30 11:04:05 server Changing connection ID to 7b336f3a. 2025/04/30 11:04:05 Adding connection IDs 7fe3ac196fef8486de73cb and 7b336f3a for a new connection. 2025/04/30 11:04:05 server <- Reading packet 0 (1280 bytes) for connection 7fe3ac196fef8486de73cb, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: 7fe3ac196fef8486de73cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1259, Version: v1} 2025/04/30 11:04:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 274, Offset + Data length: 274} 2025/04/30 11:04:05 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:05 Adding connection ID c8541efc. 2025/04/30 11:04:05 Adding connection ID d8ab1bc0. 2025/04/30 11:04:05 Adding connection ID 1df0c416. 2025/04/30 11:04:05 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7fe3ac196fef8486de73cb 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7b336f3a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 425, Version: v1} 2025/04/30 11:04:05 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:05 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7b336f3a, PacketNumber: 0, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c8541efc, StatelessResetToken: 0xb1ef48c463fc3f9fe87a6a46dd974315} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1df0c416, StatelessResetToken: 0xfc4969397c28478a8a0d50e592a9a3b8} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d8ab1bc0, StatelessResetToken: 0xe5503eef5c959abc56e8dd2f0776e51e} 2025/04/30 11:04:05 server Sending ACK because the ACK timer expired. 2025/04/30 11:04:05 server -> Sending packet 11 (30 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 25.308139ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:04:05 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:04:05 server <- Reading packet 1 (1185 bytes) for connection c8541efc, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: c8541efc, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:05 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:05 server newly acked packets (1): [0] 2025/04/30 11:04:05 server updated RTT: 33.476516ms (σ: 16.738258ms) 2025/04/30 11:04:05 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:04:05 server <- Reading packet 0 (70 bytes) for connection c8541efc, Handshake 2025/04/30 11:04:05 server Long Header{Type: Handshake, DestConnectionID: c8541efc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:05 server Dropping Initial keys. 2025/04/30 11:04:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:05 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 Retiring connection ID 7fe3ac196fef8486de73cb in 5s. 2025/04/30 11:04:05 server Dropping Handshake keys. 2025/04/30 11:04:05 server <- Reading packet 0 (25 bytes) for connection c8541efc, 1-RTT 2025/04/30 11:04:05 server Short Header{DestConnectionID: c8541efc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:05 Retiring connection ID 7b336f3a in 5s. 2025/04/30 11:04:05 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:05 server <- Reading packet 2 (29 bytes) for connection c8541efc, 1-RTT 2025/04/30 11:04:05 server Short Header{DestConnectionID: c8541efc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 832µs} 2025/04/30 11:04:05 server newly acked packets (1): [0] 2025/04/30 11:04:05 server updated RTT: 33.477ms (σ: 12.556ms) 2025/04/30 11:04:05 server Canceling loss detection timer. 2025/04/30 11:04:05 server -> Sending packet 1 (261 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 331.168µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:05 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:05 server -> &wire.NewTokenFrame{Token: 0x8a2ba5708e53a7b24bb073e3c84ac6f193da6df2e6cbc094dba6cda049413ee543ceba88811689a760f6ad7ec7e68b22da2f7bb369f181cc3192985781380d2410a15583baebc9030bfb70d1777a62fc438c41e9515f} 2025/04/30 11:04:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:05 server -> Sending packet 13 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 server -> Sending packet 14 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 server <- Reading packet 3 (51 bytes) for connection c8541efc, 1-RTT 2025/04/30 11:04:05 server Short Header{DestConnectionID: c8541efc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 6.312ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:05 server newly acked packets (1): [1] 2025/04/30 11:04:05 server updated RTT: 33.939ms (σ: 10.341ms) 2025/04/30 11:04:05 server ECN capability confirmed. 2025/04/30 11:04:05 server Canceling loss detection timer. 2025/04/30 11:04:05 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:05 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:05 server Ignoring all packets below 3. 2025/04/30 11:04:05 Received request: GET /ynpohrxvow 2025/04/30 11:04:05 server -> Sending packet 2 (1053 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 281.835µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:05 server -> Sending packet 4 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 server -> Sending packet 5 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 Removing connection ID 917a91516493bd0ee1806e20e028bf7d7db271 after it has been retired. 2025/04/30 11:04:05 server <- Reading packet 6 (42 bytes) for connection c8541efc, 1-RTT 2025/04/30 11:04:05 server Short Header{DestConnectionID: c8541efc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:05 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:05 server -> Sending packet 6 (29 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 85.69µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:05 server <- Reading packet 7 (33 bytes) for connection c8541efc, 1-RTT 2025/04/30 11:04:05 server Short Header{DestConnectionID: c8541efc, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 64µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:05 server -> Sending packet 7 (1366 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.PingFrame{} 2025/04/30 11:04:05 server <- Received Initial packet. 2025/04/30 11:04:05 Created qlog file: /logs/qlog/dd9f272266176abdf2c64c85.sqlog 2025/04/30 11:04:05 server Changing connection ID to 612a2dea. 2025/04/30 11:04:05 Adding connection IDs dd9f272266176abdf2c64c85 and 612a2dea for a new connection. 2025/04/30 11:04:05 server <- Reading packet 0 (1280 bytes) for connection dd9f272266176abdf2c64c85, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: dd9f272266176abdf2c64c85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 11:04:05 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:05 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:05 Adding connection ID f9155ed9. 2025/04/30 11:04:05 Adding connection ID cae53611. 2025/04/30 11:04:05 Adding connection ID c6025be0. 2025/04/30 11:04:05 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection dd9f272266176abdf2c64c85 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 612a2dea, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:04:05 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:05 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 612a2dea, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cae53611, StatelessResetToken: 0x70881b1b0343975d2ace3b7a2752a279} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6025be0, StatelessResetToken: 0xf6a0532469045e40c6d19bf7dea4e7d5} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f9155ed9, StatelessResetToken: 0x5fdfb1a0de86a9ab1366e79caf83e671} 2025/04/30 11:04:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:05 server -> Sending packet 19 (323 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 614eac2f, StatelessResetToken: 0xab9e50092544feaae1b1c48d2cef8041} 2025/04/30 11:04:05 server -> &wire.NewTokenFrame{Token: 0x42432b220a65aad352c01503df415b82eb209d62dd7b9c54df3224dcd02d020b45cc93103bb3b15bfb435a5f48c9613dbb86b81620158aff151b88e4f3fdec1d1105c3d8f8fa4c9f5f35b72b4d82877e5e6b8573b7ce} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b81e58d, StatelessResetToken: 0x77e22a63e85540a98d55eb11f603a9e0} 2025/04/30 11:04:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a941edda, StatelessResetToken: 0x5387d68c19a68fb386bde14992e7448f} 2025/04/30 11:04:05 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:05 server Skipping packet number 18 2025/04/30 11:04:05 server -> Sending packet 20 (1045 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 Removing connection ID f6c249cb after it has been retired. 2025/04/30 11:04:05 Removing connection ID 3cf24690 after it has been retired. 2025/04/30 11:04:05 Removing connection ID 3ef79d885f1aff45a5 after it has been retired. 2025/04/30 11:04:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:05 server -> Sending packet 16 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 server -> Sending packet 17 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:05 server -> Sending packet 25 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:05 server -> Sending packet 26 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:05 server <- Reading packet 1 (1280 bytes) for connection dd9f272266176abdf2c64c85, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: dd9f272266176abdf2c64c85, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 275, Offset + Data length: 275} 2025/04/30 11:04:05 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:05 server -> Sending packet 1 (1280 bytes) for connection dd9f272266176abdf2c64c85, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 612a2dea, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:05 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:05 server -> Sending packet 9 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server -> Sending packet 2 (1280 bytes) for connection dd9f272266176abdf2c64c85, Initial 2025/04/30 11:04:05 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 612a2dea, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 server -> Sending packet 10 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:05 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:05 Removing connection IDs [1e570113 8924c447 b0f8115b] for a closed connection after it has been retired. 2025/04/30 11:04:06 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:04:06 server -> Sending packet 1 (744 bytes) for connection dd9f272266176abdf2c64c85, Handshake 2025/04/30 11:04:06 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 612a2dea, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:04:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:04:06 server -> Sending packet 2 (744 bytes) for connection dd9f272266176abdf2c64c85, Handshake 2025/04/30 11:04:06 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 612a2dea, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:04:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:04:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:04:06 server -> Sending packet 19 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:06 server -> Sending packet 20 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:04:06 server -> Sending packet 12 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:06 server -> Sending packet 13 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:06 Removing connection ID 4cc86ef10ebe1e1333cf31992fb08fd81f after it has been retired. 2025/04/30 11:04:06 Removing connection IDs [31790e6e de71c778 cf30effe acf62c98] for a closed connection after it has been retired. 2025/04/30 11:04:06 Tracking 90 connection IDs and 0 reset tokens. 2025/04/30 11:04:06 Removing connection ID f15686a4bb087d195aa53accedb2 after it has been retired. 2025/04/30 11:04:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:06 server -> Sending packet 18 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:06 server -> Sending packet 19 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:06 Removing connection ID 5754677b after it has been retired. 2025/04/30 11:04:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:06 server -> Sending packet 25 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:06 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:06 server -> Sending packet 26 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:06 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:06 Removing connection ID de4b35f6 after it has been retired. 2025/04/30 11:04:06 Removing connection ID 4c33c5c57cc41724e60e41ab553f after it has been retired. 2025/04/30 11:04:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:06 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:04:06 server -> Sending packet 24 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server -> Sending packet 3 (1280 bytes) for connection dd9f272266176abdf2c64c85, Initial 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 612a2dea, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:06 server -> Sending packet 4 (1280 bytes) for connection dd9f272266176abdf2c64c85, Initial 2025/04/30 11:04:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 612a2dea, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:06 server -> Sending packet 25 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:06 server Canceling loss detection timer. 2025/04/30 11:04:06 server Amplification window limited. Received 2560 bytes, already sent out 7888 bytes 2025/04/30 11:04:06 server <- Reading packet 5 (1280 bytes) for connection 612a2dea, Initial 2025/04/30 11:04:06 server Long Header{Type: Initial, DestConnectionID: 612a2dea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:06 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:04:06 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:04:06 Removing connection IDs [bb1930ab 0b0a3500 a091019c] for a closed connection after it has been retired. 2025/04/30 11:04:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:06 server -> Sending packet 18 (323 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 064f475d, StatelessResetToken: 0x04b640192126c8ad05cb0b0233ab1c36} 2025/04/30 11:04:06 server -> &wire.NewTokenFrame{Token: 0x95d2f426e5f66bcddf0a31c176d2d8b45d0660202bbe0992200d0975f9c35344acdeb2b716b76d939c77a67f7f7c2fc4f10c3ec10abfa96d99206920e02430cdd990ceceb1fd95d63277c11cd8f1b7c703d76dc20f19} 2025/04/30 11:04:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5dc23813, StatelessResetToken: 0xb6ed21b580163ed741b8fc36115474f1} 2025/04/30 11:04:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 811f5fc4, StatelessResetToken: 0xbb3bf00bcca2736074d32614cf55e879} 2025/04/30 11:04:06 server Skipping packet number 17 2025/04/30 11:04:06 server -> Sending packet 19 (1045 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:06 server <- Reading packet 1 (70 bytes) for connection 612a2dea, Handshake 2025/04/30 11:04:06 server Long Header{Type: Handshake, DestConnectionID: 612a2dea, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:06 server Dropping Initial keys. 2025/04/30 11:04:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:06 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:06 Retiring connection ID dd9f272266176abdf2c64c85 in 5s. 2025/04/30 11:04:06 server Dropping Handshake keys. 2025/04/30 11:04:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:06 server -> Sending packet 2 (320 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cae53611, StatelessResetToken: 0x70881b1b0343975d2ace3b7a2752a279} 2025/04/30 11:04:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6025be0, StatelessResetToken: 0xf6a0532469045e40c6d19bf7dea4e7d5} 2025/04/30 11:04:06 server -> &wire.NewTokenFrame{Token: 0xca41edc06115b248568e1bffd5f50d1bd2f28b58a287828e4e77376b06840d4445798a877c93e086f19ee43e9cfe7260be5f21787a520ffda000f54b5a14bd7b3eb64a8c6ce110df559966286e6f0f86b042525a2208} 2025/04/30 11:04:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f9155ed9, StatelessResetToken: 0x5fdfb1a0de86a9ab1366e79caf83e671} 2025/04/30 11:04:06 server -> Sending packet 3 (320 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cae53611, StatelessResetToken: 0x70881b1b0343975d2ace3b7a2752a279} 2025/04/30 11:04:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6025be0, StatelessResetToken: 0xf6a0532469045e40c6d19bf7dea4e7d5} 2025/04/30 11:04:06 server -> &wire.NewTokenFrame{Token: 0xca41edc06115b248568e1bffd5f50d1bd2f28b58a287828e4e77376b06840d4445798a877c93e086f19ee43e9cfe7260be5f21787a520ffda000f54b5a14bd7b3eb64a8c6ce110df559966286e6f0f86b042525a2208} 2025/04/30 11:04:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f9155ed9, StatelessResetToken: 0x5fdfb1a0de86a9ab1366e79caf83e671} 2025/04/30 11:04:06 server -> Sending packet 4 (1366 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.PingFrame{} 2025/04/30 11:04:06 server <- Reading packet 0 (42 bytes) for connection 612a2dea, 1-RTT 2025/04/30 11:04:06 server Short Header{DestConnectionID: 612a2dea, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:06 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:06 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:04:06 server -> Sending packet 5 (30 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.291642ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:06 Received request: GET /scqxybdgwa 2025/04/30 11:04:06 server -> Sending packet 6 (1045 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:06 server <- Reading packet 5 (31 bytes) for connection f9155ed9, 1-RTT 2025/04/30 11:04:06 server Short Header{DestConnectionID: f9155ed9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 144µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:06 server newly acked packets (1): [3] 2025/04/30 11:04:06 server updated RTT: 32.495577ms (σ: 16.247788ms) 2025/04/30 11:04:06 server ECN capability confirmed. 2025/04/30 11:04:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:04:06 server -> Sending packet 22 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:06 server -> Sending packet 23 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:06 server <- Reading packet 6 (32 bytes) for connection f9155ed9, 1-RTT 2025/04/30 11:04:06 server Short Header{DestConnectionID: f9155ed9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 25.208ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:04:06 server newly acked packets (1): [4] 2025/04/30 11:04:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:06 server -> Sending packet 8 (1045 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:06 server -> Sending packet 9 (1045 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:06 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:07 server <- Reading packet 7 (33 bytes) for connection f9155ed9, 1-RTT 2025/04/30 11:04:07 server Short Header{DestConnectionID: f9155ed9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 2}}, DelayTime: 104µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:04:07 server newly acked packets (1): [9] 2025/04/30 11:04:07 server updated RTT: 32.497ms (σ: 12.19ms) 2025/04/30 11:04:07 server Canceling loss detection timer. 2025/04/30 11:04:07 server -> Sending packet 10 (22 bytes) for connection dd9f272266176abdf2c64c85, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:07 server <- Reading packet 8 (26 bytes) for connection f9155ed9, 1-RTT 2025/04/30 11:04:07 server Short Header{DestConnectionID: f9155ed9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:07 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:07 Replacing connection for connection IDs [612a2dea f9155ed9 cae53611 c6025be0] with a closed connection. 2025/04/30 11:04:07 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:07 server Connection dd9f272266176abdf2c64c85 closed. 2025/04/30 11:04:07 server <- Received Initial packet. 2025/04/30 11:04:07 Created qlog file: /logs/qlog/a21221f5eea20ee19f9c.sqlog 2025/04/30 11:04:07 server Changing connection ID to 2b4c673d. 2025/04/30 11:04:07 Adding connection IDs a21221f5eea20ee19f9c and 2b4c673d for a new connection. 2025/04/30 11:04:07 server <- Reading packet 0 (1280 bytes) for connection a21221f5eea20ee19f9c, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: a21221f5eea20ee19f9c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:04:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 262, Offset + Data length: 262} 2025/04/30 11:04:07 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:07 Adding connection ID 95ae4624. 2025/04/30 11:04:07 Adding connection ID 4fdb4868. 2025/04/30 11:04:07 Adding connection ID 12cce69d. 2025/04/30 11:04:07 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a21221f5eea20ee19f9c 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2b4c673d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:04:07 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:07 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2b4c673d, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4fdb4868, StatelessResetToken: 0x7e27afdf08fe6ad8659eb8e7fcc940b7} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 12cce69d, StatelessResetToken: 0x722584e1216b851cd8436503979561b1} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 95ae4624, StatelessResetToken: 0x4baafba5766dbb46c83135b404b730a7} 2025/04/30 11:04:07 Removing connection ID 79a8d786d757b0ec0e8713 after it has been retired. 2025/04/30 11:04:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:04:07 server -> Sending packet 15 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:07 server -> Sending packet 16 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:07 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:04:07 server <- Reading packet 1 (1185 bytes) for connection 95ae4624, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: 95ae4624, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:07 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:07 server newly acked packets (1): [0] 2025/04/30 11:04:07 server updated RTT: 33.348582ms (σ: 16.674291ms) 2025/04/30 11:04:07 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:04:07 server <- Reading packet 0 (70 bytes) for connection 95ae4624, Handshake 2025/04/30 11:04:07 server Long Header{Type: Handshake, DestConnectionID: 95ae4624, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:07 server Dropping Initial keys. 2025/04/30 11:04:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:07 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 Retiring connection ID a21221f5eea20ee19f9c in 5s. 2025/04/30 11:04:07 server Dropping Handshake keys. 2025/04/30 11:04:07 server <- Reading packet 0 (25 bytes) for connection 95ae4624, 1-RTT 2025/04/30 11:04:07 server Short Header{DestConnectionID: 95ae4624, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:07 Retiring connection ID 2b4c673d in 5s. 2025/04/30 11:04:07 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:07 server -> Sending packet 1 (256 bytes) for connection a21221f5eea20ee19f9c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 324.996µs} 2025/04/30 11:04:07 server -> &wire.NewTokenFrame{Token: 0xa618091de518a2f1a4be61575363ed4fa8c9812a35f2797f8b9bd98ab06ddee6d57ab91611d2a4cf8e696125979c109c8ecbda5c829d6f820bbc49f34862bb626bb817c9738ddd2d66c3b7a44535cc99eac5ef7c36e8} 2025/04/30 11:04:07 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:07 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:04:07 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:07 server <- Reading packet 1 (42 bytes) for connection 95ae4624, 1-RTT 2025/04/30 11:04:07 server Short Header{DestConnectionID: 95ae4624, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:07 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:07 server <- Reading packet 2 (29 bytes) for connection 95ae4624, 1-RTT 2025/04/30 11:04:07 server Short Header{DestConnectionID: 95ae4624, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 656µs} 2025/04/30 11:04:07 server newly acked packets (1): [0] 2025/04/30 11:04:07 Received request: GET /zymnxputuk 2025/04/30 11:04:07 server updated RTT: 33.364ms (σ: 12.537ms) 2025/04/30 11:04:07 server -> Sending packet 2 (1053 bytes) for connection a21221f5eea20ee19f9c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 422.448µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:07 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:04:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:07 server -> Sending packet 4 (251 bytes) for connection a21221f5eea20ee19f9c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.NewTokenFrame{Token: 0xa618091de518a2f1a4be61575363ed4fa8c9812a35f2797f8b9bd98ab06ddee6d57ab91611d2a4cf8e696125979c109c8ecbda5c829d6f820bbc49f34862bb626bb817c9738ddd2d66c3b7a44535cc99eac5ef7c36e8} 2025/04/30 11:04:07 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:07 server Skipping packet number 3 2025/04/30 11:04:07 server -> Sending packet 5 (1045 bytes) for connection a21221f5eea20ee19f9c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:07 server Parsed a coalesced packet. Part 1: 35 bytes. Remaining: 26 bytes. 2025/04/30 11:04:07 server Dropping %!s(logging.PacketType=1) packet (35 bytes) because we already dropped the keys. 2025/04/30 11:04:07 server <- Reading packet 4 (26 bytes) for connection 95ae4624, 1-RTT 2025/04/30 11:04:07 server Short Header{DestConnectionID: 95ae4624, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:07 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:07 Replacing connection for connection IDs [95ae4624 4fdb4868 12cce69d] with a closed connection. 2025/04/30 11:04:07 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:07 server Connection a21221f5eea20ee19f9c closed. 2025/04/30 11:04:07 server <- Received Initial packet. 2025/04/30 11:04:07 Created qlog file: /logs/qlog/4670bb1fdbf8f724cae6.sqlog 2025/04/30 11:04:07 server Changing connection ID to 18bb1122. 2025/04/30 11:04:07 Adding connection IDs 4670bb1fdbf8f724cae6 and 18bb1122 for a new connection. 2025/04/30 11:04:07 server <- Reading packet 0 (1280 bytes) for connection 4670bb1fdbf8f724cae6, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: 4670bb1fdbf8f724cae6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:04:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:07 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:07 Adding connection ID 4f8bb9a8. 2025/04/30 11:04:07 Adding connection ID bbf5b04d. 2025/04/30 11:04:07 Adding connection ID 31b3655e. 2025/04/30 11:04:07 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4670bb1fdbf8f724cae6 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 18bb1122, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 439, Version: v1} 2025/04/30 11:04:07 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:07 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 18bb1122, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bbf5b04d, StatelessResetToken: 0x34bc937c3b05bc1f736647896cf6573a} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 31b3655e, StatelessResetToken: 0x3bb4bf90ea29f98254438a731a5364e6} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4f8bb9a8, StatelessResetToken: 0x02db8a84244c3ed45d1b178a2dffa0eb} 2025/04/30 11:04:07 Removing connection ID cef8fbe2 after it has been retired. 2025/04/30 11:04:07 server <- Reading packet 1 (1280 bytes) for connection 4670bb1fdbf8f724cae6, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: 4670bb1fdbf8f724cae6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:04:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:07 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:07 server -> Sending packet 1 (1280 bytes) for connection 4670bb1fdbf8f724cae6, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 18bb1122, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:07 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:07 server -> Sending packet 2 (1280 bytes) for connection 4670bb1fdbf8f724cae6, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 18bb1122, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:07 server <- Reading packet 2 (1280 bytes) for connection 4670bb1fdbf8f724cae6, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: 4670bb1fdbf8f724cae6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/04/30 11:04:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:07 server -> Sending packet 3 (37 bytes) for connection 4670bb1fdbf8f724cae6, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 18bb1122, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:07 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:07 server <- Reading packet 3 (1280 bytes) for connection 18bb1122, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: 18bb1122, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:07 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:07 Removing connection ID 014b2a4759b80e54b7b70c9b584fff09babcde after it has been retired. 2025/04/30 11:04:07 Removing connection ID 53d69d0a after it has been retired. 2025/04/30 11:04:07 Removing connection IDs [76fa84e8 b6a47be9 fcd4f447] for a closed connection after it has been retired. 2025/04/30 11:04:07 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:04:07 server -> Sending packet 1 (736 bytes) for connection 4670bb1fdbf8f724cae6, Handshake 2025/04/30 11:04:07 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 18bb1122, PacketNumber: 1, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:04:07 server -> Sending packet 2 (736 bytes) for connection 4670bb1fdbf8f724cae6, Handshake 2025/04/30 11:04:07 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 18bb1122, PacketNumber: 2, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 11:04:07 server <- Reading packet 1 (70 bytes) for connection 18bb1122, Handshake 2025/04/30 11:04:07 server Long Header{Type: Handshake, DestConnectionID: 18bb1122, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:07 server Dropping Initial keys. 2025/04/30 11:04:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:07 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 Retiring connection ID 4670bb1fdbf8f724cae6 in 5s. 2025/04/30 11:04:07 server Dropping Handshake keys. 2025/04/30 11:04:07 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:04:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:07 server -> Sending packet 2 (320 bytes) for connection 4670bb1fdbf8f724cae6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4f8bb9a8, StatelessResetToken: 0x02db8a84244c3ed45d1b178a2dffa0eb} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:07 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:07 server -> &wire.NewTokenFrame{Token: 0xb52c4e105c8ba4e37aeae191a31be4f65f835b1ab50859b34fb6cfcac5f501cddf3fd6003e4abba4d9e07491f825a85dd6690d1e08061d4582bf3e06f1c5d309991c6bca04b31b0d1adc26199e79b69e36e23f6b3772} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bbf5b04d, StatelessResetToken: 0x34bc937c3b05bc1f736647896cf6573a} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 31b3655e, StatelessResetToken: 0x3bb4bf90ea29f98254438a731a5364e6} 2025/04/30 11:04:07 server -> Sending packet 3 (320 bytes) for connection 4670bb1fdbf8f724cae6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:07 server -> &wire.NewTokenFrame{Token: 0xb52c4e105c8ba4e37aeae191a31be4f65f835b1ab50859b34fb6cfcac5f501cddf3fd6003e4abba4d9e07491f825a85dd6690d1e08061d4582bf3e06f1c5d309991c6bca04b31b0d1adc26199e79b69e36e23f6b3772} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bbf5b04d, StatelessResetToken: 0x34bc937c3b05bc1f736647896cf6573a} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4f8bb9a8, StatelessResetToken: 0x02db8a84244c3ed45d1b178a2dffa0eb} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 31b3655e, StatelessResetToken: 0x3bb4bf90ea29f98254438a731a5364e6} 2025/04/30 11:04:07 server -> Sending packet 4 (1366 bytes) for connection 4670bb1fdbf8f724cae6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.PingFrame{} 2025/04/30 11:04:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:07 server -> Sending packet 25 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:07 server -> Sending packet 26 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:07 server <- Reading packet 3 (44 bytes) for connection 4f8bb9a8, 1-RTT 2025/04/30 11:04:07 server Short Header{DestConnectionID: 4f8bb9a8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:07 Retiring connection ID 18bb1122 in 5s. 2025/04/30 11:04:07 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:07 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:07 server -> Sending packet 5 (27 bytes) for connection 4670bb1fdbf8f724cae6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 88.215µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:07 Received request: GET /kodqbvewyo 2025/04/30 11:04:07 server -> Sending packet 6 (1045 bytes) for connection 4670bb1fdbf8f724cae6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:07 server <- Reading packet 4 (32 bytes) for connection 4f8bb9a8, 1-RTT 2025/04/30 11:04:07 server Short Header{DestConnectionID: 4f8bb9a8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 25.208ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:07 server newly acked packets (2): [3 4] 2025/04/30 11:04:07 server updated RTT: 57.615229ms (σ: 28.807614ms) 2025/04/30 11:04:07 server ECN capability confirmed. 2025/04/30 11:04:07 server <- Reading packet 5 (26 bytes) for connection 4f8bb9a8, 1-RTT 2025/04/30 11:04:07 server Short Header{DestConnectionID: 4f8bb9a8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:07 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:07 Replacing connection for connection IDs [4f8bb9a8 bbf5b04d 31b3655e] with a closed connection. 2025/04/30 11:04:07 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:07 server Connection 4670bb1fdbf8f724cae6 closed. 2025/04/30 11:04:07 server <- Received Initial packet. 2025/04/30 11:04:07 Created qlog file: /logs/qlog/6ec9690979fcebd791b92edc150869.sqlog 2025/04/30 11:04:07 server Changing connection ID to 9dd2bcb9. 2025/04/30 11:04:07 Adding connection IDs 6ec9690979fcebd791b92edc150869 and 9dd2bcb9 for a new connection. 2025/04/30 11:04:07 server <- Reading packet 0 (1280 bytes) for connection 6ec9690979fcebd791b92edc150869, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: 6ec9690979fcebd791b92edc150869, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:04:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:07 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:07 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:07 Adding connection ID d44b72ba. 2025/04/30 11:04:07 Adding connection ID 8001e0f3. 2025/04/30 11:04:07 Adding connection ID 99cb0fb5. 2025/04/30 11:04:07 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6ec9690979fcebd791b92edc150869 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9dd2bcb9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 433, Version: v1} 2025/04/30 11:04:07 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:07 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9dd2bcb9, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:04:07 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 99cb0fb5, StatelessResetToken: 0x34445ffd7425f9900f0f4fa96abfe83d} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8001e0f3, StatelessResetToken: 0x2fbe236dac15bf2ca45e9ca30585c95b} 2025/04/30 11:04:07 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d44b72ba, StatelessResetToken: 0xec3ff271cd7bafbebfad84ed914b1411} 2025/04/30 11:04:07 Removing connection ID 51b5fd94 after it has been retired. 2025/04/30 11:04:07 Removing connection ID 37ddf460e962de632a94aafac7ecc57b after it has been retired. 2025/04/30 11:04:07 Removing connection IDs [509070ad 02397379 c35e5546] for a closed connection after it has been retired. 2025/04/30 11:04:07 Removing connection ID 42d674afb3156a1517e1af after it has been retired. 2025/04/30 11:04:07 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:07 server -> Sending packet 1 (1280 bytes) for connection 6ec9690979fcebd791b92edc150869, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9dd2bcb9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:07 server -> Sending packet 2 (1280 bytes) for connection 6ec9690979fcebd791b92edc150869, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9dd2bcb9, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:07 server Canceling loss detection timer. 2025/04/30 11:04:07 server Amplification window limited. Received 1280 bytes, already sent out 3840 bytes 2025/04/30 11:04:07 server <- Reading packet 1 (1280 bytes) for connection 6ec9690979fcebd791b92edc150869, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: 6ec9690979fcebd791b92edc150869, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/04/30 11:04:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:07 server -> Sending packet 3 (37 bytes) for connection 6ec9690979fcebd791b92edc150869, Initial 2025/04/30 11:04:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9dd2bcb9, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:07 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 Removing connection ID 54f32acd after it has been retired. 2025/04/30 11:04:08 server <- Reading packet 3 (1280 bytes) for connection 9dd2bcb9, Initial 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: 9dd2bcb9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:08 server <- Reading packet 4 (1280 bytes) for connection 9dd2bcb9, Initial 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: 9dd2bcb9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:08 server newly acked packets (1): [2] 2025/04/30 11:04:08 server updated RTT: 34.408791ms (σ: 17.204395ms) 2025/04/30 11:04:08 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:08 server -> Sending packet 1 (742 bytes) for connection 6ec9690979fcebd791b92edc150869, Handshake 2025/04/30 11:04:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9dd2bcb9, PacketNumber: 1, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:04:08 server -> Sending packet 2 (742 bytes) for connection 6ec9690979fcebd791b92edc150869, Handshake 2025/04/30 11:04:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9dd2bcb9, PacketNumber: 2, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 11:04:08 Removing connection ID 02e5c78bc423fa151d2c1c29e1c084 after it has been retired. 2025/04/30 11:04:08 Removing connection ID a6b0475a after it has been retired. 2025/04/30 11:04:08 server <- Reading packet 0 (75 bytes) for connection 9dd2bcb9, Handshake 2025/04/30 11:04:08 server Long Header{Type: Handshake, DestConnectionID: 9dd2bcb9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:08 server Dropping Initial keys. 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:08 server newly acked packets (1): [2] 2025/04/30 11:04:08 server updated RTT: 34.156ms (σ: 13.405ms) 2025/04/30 11:04:08 server Canceling loss detection timer. 2025/04/30 11:04:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:08 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 Retiring connection ID 6ec9690979fcebd791b92edc150869 in 5s. 2025/04/30 11:04:08 server Dropping Handshake keys. 2025/04/30 11:04:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:08 server -> Sending packet 2 (323 bytes) for connection 6ec9690979fcebd791b92edc150869, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.NewTokenFrame{Token: 0xba69b44f2d59d99e6f6cf4a634d712cce0130996e915cf7f957b016c29e4e643082b06156e07c0b41a01faf0fd47b36bd67ba70eae4b1c3befdf5d2ff48074f0c084f19dff95585665ccfee9fbce59068b908ebb8994} 2025/04/30 11:04:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d44b72ba, StatelessResetToken: 0xec3ff271cd7bafbebfad84ed914b1411} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 99cb0fb5, StatelessResetToken: 0x34445ffd7425f9900f0f4fa96abfe83d} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8001e0f3, StatelessResetToken: 0x2fbe236dac15bf2ca45e9ca30585c95b} 2025/04/30 11:04:08 server -> Sending packet 3 (323 bytes) for connection 6ec9690979fcebd791b92edc150869, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 99cb0fb5, StatelessResetToken: 0x34445ffd7425f9900f0f4fa96abfe83d} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d44b72ba, StatelessResetToken: 0xec3ff271cd7bafbebfad84ed914b1411} 2025/04/30 11:04:08 server -> &wire.NewTokenFrame{Token: 0xba69b44f2d59d99e6f6cf4a634d712cce0130996e915cf7f957b016c29e4e643082b06156e07c0b41a01faf0fd47b36bd67ba70eae4b1c3befdf5d2ff48074f0c084f19dff95585665ccfee9fbce59068b908ebb8994} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8001e0f3, StatelessResetToken: 0x2fbe236dac15bf2ca45e9ca30585c95b} 2025/04/30 11:04:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 server <- Reading packet 0 (42 bytes) for connection 9dd2bcb9, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: 9dd2bcb9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:08 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:08 server -> Sending packet 4 (27 bytes) for connection 6ec9690979fcebd791b92edc150869, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 469.088µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:08 Received request: GET /nijxbpjyfi 2025/04/30 11:04:08 server -> Sending packet 5 (1045 bytes) for connection 6ec9690979fcebd791b92edc150869, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:08 server <- Reading packet 1 (1366 bytes) for connection d44b72ba, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: d44b72ba, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.PingFrame{} 2025/04/30 11:04:08 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:08 server <- Reading packet 2 (33 bytes) for connection d44b72ba, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: d44b72ba, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 184µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:08 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:08 Retiring connection ID 9dd2bcb9 in 5s. 2025/04/30 11:04:08 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 11:04:08 server -> Sending packet 6 (27 bytes) for connection 6ec9690979fcebd791b92edc150869, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 84.233µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:08 server <- Reading packet 3 (31 bytes) for connection d44b72ba, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: d44b72ba, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 64µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:04:08 server newly acked packets (2): [3 5] 2025/04/30 11:04:08 server updated RTT: 33.894ms (σ: 10.577ms) 2025/04/30 11:04:08 server ECN capability confirmed. 2025/04/30 11:04:08 server Canceling loss detection timer. 2025/04/30 11:04:08 server <- Reading packet 4 (26 bytes) for connection d44b72ba, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: d44b72ba, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:08 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:08 Replacing connection for connection IDs [8001e0f3 99cb0fb5 d44b72ba] with a closed connection. 2025/04/30 11:04:08 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:08 server Connection 6ec9690979fcebd791b92edc150869 closed. 2025/04/30 11:04:08 server <- Received Initial packet. 2025/04/30 11:04:08 Created qlog file: /logs/qlog/5ade30b441ea3a109dae95043013babc02c9.sqlog 2025/04/30 11:04:08 server Changing connection ID to 16cc2fa7. 2025/04/30 11:04:08 Adding connection IDs 5ade30b441ea3a109dae95043013babc02c9 and 16cc2fa7 for a new connection. 2025/04/30 11:04:08 server <- Reading packet 0 (1280 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, Initial 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: 5ade30b441ea3a109dae95043013babc02c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:04:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:08 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:08 Adding connection ID e4c3f5a5. 2025/04/30 11:04:08 Adding connection ID 05efd8f2. 2025/04/30 11:04:08 Adding connection ID 9cf2ab29. 2025/04/30 11:04:08 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 16cc2fa7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 421, Version: v1} 2025/04/30 11:04:08 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 16cc2fa7, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 05efd8f2, StatelessResetToken: 0xd8e5e8ac4a97ce2e3c5c8e3de6d10ea5} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e4c3f5a5, StatelessResetToken: 0xa1fa59150ee8d5b24bedb9902318ed4c} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9cf2ab29, StatelessResetToken: 0x04c7404c6e7d580b66b2ee6d927bda77} 2025/04/30 11:04:08 Removing connection ID f28cd4ec after it has been retired. 2025/04/30 11:04:08 Removing connection ID b13c21df9046da12848ef769d2d70ccddf after it has been retired. 2025/04/30 11:04:08 Removing connection IDs [70320f6b 814c8c28 c9d8462e] for a closed connection after it has been retired. 2025/04/30 11:04:08 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:08 server -> Sending packet 1 (1280 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, Initial 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 16cc2fa7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:08 server -> Sending packet 2 (1280 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, Initial 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 16cc2fa7, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:08 server Canceling loss detection timer. 2025/04/30 11:04:08 server Amplification window limited. Received 1280 bytes, already sent out 3840 bytes 2025/04/30 11:04:08 server <- Reading packet 3 (1280 bytes) for connection 16cc2fa7, Initial 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: 16cc2fa7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:08 server newly acked packets (1): [2] 2025/04/30 11:04:08 server updated RTT: 34.084122ms (σ: 17.042061ms) 2025/04/30 11:04:08 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:08 server -> Sending packet 1 (754 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, Handshake 2025/04/30 11:04:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 16cc2fa7, PacketNumber: 1, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 11:04:08 server -> Sending packet 2 (754 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, Handshake 2025/04/30 11:04:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 16cc2fa7, PacketNumber: 2, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 11:04:08 server <- Reading packet 0 (75 bytes) for connection 16cc2fa7, Handshake 2025/04/30 11:04:08 server Long Header{Type: Handshake, DestConnectionID: 16cc2fa7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:08 server Dropping Initial keys. 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:08 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 Retiring connection ID 5ade30b441ea3a109dae95043013babc02c9 in 5s. 2025/04/30 11:04:08 server Dropping Handshake keys. 2025/04/30 11:04:08 server <- Reading packet 0 (42 bytes) for connection 16cc2fa7, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: 16cc2fa7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:08 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:08 server -> Sending packet 2 (331 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 260.145µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 05efd8f2, StatelessResetToken: 0xd8e5e8ac4a97ce2e3c5c8e3de6d10ea5} 2025/04/30 11:04:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 server -> &wire.NewTokenFrame{Token: 0x429da7c19d05b92d5710ad3486989a8f80d5d73807452b1d98c426bfaca6d59ed484b66cb4f2091a9656775d0fd31af6ece45b5b79b4416a251b695baf768fc7f81f3732ec21d4572f68a9af901ce887bfd0fc3c2726} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9cf2ab29, StatelessResetToken: 0x04c7404c6e7d580b66b2ee6d927bda77} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e4c3f5a5, StatelessResetToken: 0xa1fa59150ee8d5b24bedb9902318ed4c} 2025/04/30 11:04:08 server -> Sending packet 3 (323 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 05efd8f2, StatelessResetToken: 0xd8e5e8ac4a97ce2e3c5c8e3de6d10ea5} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9cf2ab29, StatelessResetToken: 0x04c7404c6e7d580b66b2ee6d927bda77} 2025/04/30 11:04:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e4c3f5a5, StatelessResetToken: 0xa1fa59150ee8d5b24bedb9902318ed4c} 2025/04/30 11:04:08 server -> &wire.NewTokenFrame{Token: 0x429da7c19d05b92d5710ad3486989a8f80d5d73807452b1d98c426bfaca6d59ed484b66cb4f2091a9656775d0fd31af6ece45b5b79b4416a251b695baf768fc7f81f3732ec21d4572f68a9af901ce887bfd0fc3c2726} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:08 Received request: GET /zrwvozvweb 2025/04/30 11:04:08 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:08 server -> Sending packet 4 (1045 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:08 server <- Reading packet 1 (33 bytes) for connection e4c3f5a5, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: e4c3f5a5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 232µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:08 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:08 Retiring connection ID 16cc2fa7 in 5s. 2025/04/30 11:04:08 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:08 server <- Reading packet 2 (31 bytes) for connection e4c3f5a5, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: e4c3f5a5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 56µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:08 server newly acked packets (2): [3 4] 2025/04/30 11:04:08 server updated RTT: 33.815ms (σ: 13.318ms) 2025/04/30 11:04:08 server ECN capability confirmed. 2025/04/30 11:04:08 server Canceling loss detection timer. 2025/04/30 11:04:08 server -> Sending packet 5 (30 bytes) for connection 5ade30b441ea3a109dae95043013babc02c9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 88.225µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:08 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:08 server <- Reading packet 3 (26 bytes) for connection e4c3f5a5, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: e4c3f5a5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:08 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:08 Replacing connection for connection IDs [e4c3f5a5 05efd8f2 9cf2ab29] with a closed connection. 2025/04/30 11:04:08 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:08 server Connection 5ade30b441ea3a109dae95043013babc02c9 closed. 2025/04/30 11:04:08 Tracking 82 connection IDs and 0 reset tokens. 2025/04/30 11:04:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:08 server -> Sending packet 25 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:08 server -> Sending packet 26 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:08 server -> Sending packet 22 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:08 server -> Sending packet 23 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:08 server <- Received Initial packet. 2025/04/30 11:04:08 Created qlog file: /logs/qlog/ee0990a6f33a324c6bfb231ef350bc5d392ce9.sqlog 2025/04/30 11:04:08 server Changing connection ID to d8e356a6. 2025/04/30 11:04:08 Adding connection IDs ee0990a6f33a324c6bfb231ef350bc5d392ce9 and d8e356a6 for a new connection. 2025/04/30 11:04:08 server <- Reading packet 1 (1280 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, Initial 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: ee0990a6f33a324c6bfb231ef350bc5d392ce9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:04:08 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:08 Adding connection ID 6b506de4. 2025/04/30 11:04:08 Adding connection ID 193c5d1b. 2025/04/30 11:04:08 Adding connection ID 8c2a387e. 2025/04/30 11:04:08 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d8e356a6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 432, Version: v1} 2025/04/30 11:04:08 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d8e356a6, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8c2a387e, StatelessResetToken: 0xba4d4f48e9fd9c18e65b57ce8bf78375} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 193c5d1b, StatelessResetToken: 0x1243b4892fe723c2bbf73bff2500c6f1} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6b506de4, StatelessResetToken: 0x11eda3697e6e1fc805696ac657c801b8} 2025/04/30 11:04:08 server <- Reading packet 2 (1280 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, Initial 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: ee0990a6f33a324c6bfb231ef350bc5d392ce9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:04:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 267, Offset + Data length: 267} 2025/04/30 11:04:08 server -> Sending packet 1 (37 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, Initial 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d8e356a6, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:08 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:08 server Parsed a coalesced packet. Part 1: 1166 bytes. Remaining: 114 bytes. 2025/04/30 11:04:08 server <- Reading packet 3 (1166 bytes) for connection 6b506de4, Initial 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: 6b506de4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 server newly acked packets (1): [0] 2025/04/30 11:04:08 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 44 bytes. 2025/04/30 11:04:08 server <- Reading packet 0 (70 bytes) for connection 6b506de4, Handshake 2025/04/30 11:04:08 server Long Header{Type: Handshake, DestConnectionID: 6b506de4, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:08 server Dropping Initial keys. 2025/04/30 11:04:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:08 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 Retiring connection ID ee0990a6f33a324c6bfb231ef350bc5d392ce9 in 5s. 2025/04/30 11:04:08 server Dropping Handshake keys. 2025/04/30 11:04:08 server <- Reading packet 0 (44 bytes) for connection 6b506de4, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: 6b506de4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:08 Retiring connection ID d8e356a6 in 5s. 2025/04/30 11:04:08 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:08 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:08 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:08 server -> Sending packet 1 (1366 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.PingFrame{} 2025/04/30 11:04:08 server <- Reading packet 1 (29 bytes) for connection 6b506de4, 1-RTT 2025/04/30 11:04:08 Received request: GET /ecjczmgdsp 2025/04/30 11:04:08 server Short Header{DestConnectionID: 6b506de4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 776µs} 2025/04/30 11:04:08 server newly acked packets (1): [0] 2025/04/30 11:04:08 server updated RTT: 33.670298ms (σ: 16.835149ms) 2025/04/30 11:04:08 server Canceling loss detection timer. 2025/04/30 11:04:08 server -> Sending packet 2 (1280 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 486.861µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:08 server -> &wire.NewTokenFrame{Token: 0xb02c96bb36f8d2cb39c71291a351408a1ccce6c11eba3172c644535e12f360547477c93b9fa8b4852d730e71238c65b1d9721f5b0d5dfb70770e03fe4587ccf200f7a7f39ab23e63217e2abcee71dab6397363e5c06b} 2025/04/30 11:04:08 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1022, Offset + Data length: 1022} 2025/04/30 11:04:08 server -> Sending packet 3 (25 bytes) for connection ee0990a6f33a324c6bfb231ef350bc5d392ce9, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1022, Data length: 2, Offset + Data length: 1024} 2025/04/30 11:04:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:08 server -> Sending packet 18 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:08 server -> Sending packet 19 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:08 server <- Reading packet 2 (33 bytes) for connection 6b506de4, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: 6b506de4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 104µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:08 server newly acked packets (1): [2] 2025/04/30 11:04:08 server updated RTT: 33.548ms (σ: 12.868ms) 2025/04/30 11:04:08 server ECN capability confirmed. 2025/04/30 11:04:08 server setting loss timer for packet 1 (1-RTT) to 37.7415ms (in 2025-04-30 11:04:08.672988939 +0000 UTC m=+14.196710832) 2025/04/30 11:04:08 server Ignoring all packets below 2. 2025/04/30 11:04:08 server <- Reading packet 3 (26 bytes) for connection 6b506de4, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: 6b506de4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:08 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:08 Replacing connection for connection IDs [6b506de4 193c5d1b 8c2a387e] with a closed connection. 2025/04/30 11:04:08 server Connection ee0990a6f33a324c6bfb231ef350bc5d392ce9 closed. 2025/04/30 11:04:08 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:08 server <- Received Initial packet. 2025/04/30 11:04:08 Created qlog file: /logs/qlog/f8f6acd80593a60aeea19d8f22.sqlog 2025/04/30 11:04:08 server Changing connection ID to 17147fc6. 2025/04/30 11:04:08 Adding connection IDs f8f6acd80593a60aeea19d8f22 and 17147fc6 for a new connection. 2025/04/30 11:04:08 server <- Reading packet 0 (1280 bytes) for connection f8f6acd80593a60aeea19d8f22, Initial 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: f8f6acd80593a60aeea19d8f22, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:08 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:08 Adding connection ID e5cd7462. 2025/04/30 11:04:08 Adding connection ID 5d81b959. 2025/04/30 11:04:08 Adding connection ID 283a1c0a. 2025/04/30 11:04:08 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f8f6acd80593a60aeea19d8f22 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 17147fc6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 435, Version: v1} 2025/04/30 11:04:08 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 17147fc6, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5d81b959, StatelessResetToken: 0x48d139cd59af78f42831f1613c4a1775} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e5cd7462, StatelessResetToken: 0x5b22f7ab56e43e5ad552c0cd4208de69} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 283a1c0a, StatelessResetToken: 0x4795334667cfacf91282ae1d28308377} 2025/04/30 11:04:08 server Queueing packet (29 bytes) for later decryption 2025/04/30 11:04:08 server <- Reading packet 3 (70 bytes) for connection e5cd7462, Handshake 2025/04/30 11:04:08 server Long Header{Type: Handshake, DestConnectionID: e5cd7462, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:08 server Dropping Initial keys. 2025/04/30 11:04:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:08 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 Retiring connection ID f8f6acd80593a60aeea19d8f22 in 5s. 2025/04/30 11:04:08 server Dropping Handshake keys. 2025/04/30 11:04:08 server -> Sending packet 1 (1366 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.PingFrame{} 2025/04/30 11:04:08 server <- Reading packet 2 (29 bytes) for connection e5cd7462, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: e5cd7462, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 744µs} 2025/04/30 11:04:08 server newly acked packets (1): [0] 2025/04/30 11:04:08 server updated RTT: 33.464039ms (σ: 16.732019ms) 2025/04/30 11:04:08 server Canceling loss detection timer. 2025/04/30 11:04:08 server -> Sending packet 2 (248 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 server -> &wire.NewTokenFrame{Token: 0x8856b8f8d149f2fd1c1de6ef5b1a738b690fc9d9c2c50ebf2e4bb258205754902410452937a266071b322fbe69e78b73836b5b4a0f713dfe3a076785d2b041ce074eb2eafc115f6d250b3244ad00672019368c34becf} 2025/04/30 11:04:08 server <- Reading packet 5 (42 bytes) for connection e5cd7462, 1-RTT 2025/04/30 11:04:08 server Short Header{DestConnectionID: e5cd7462, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:08 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:08 server -> Sending packet 3 (29 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 78.416µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:08 Received request: GET /dgztpfetks 2025/04/30 11:04:08 server -> Sending packet 4 (1045 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:08 server <- Received Initial packet. 2025/04/30 11:04:08 Created qlog file: /logs/qlog/617bf09eb577ad67717d44977d9868538b15.sqlog 2025/04/30 11:04:08 server Changing connection ID to 23d1f896. 2025/04/30 11:04:08 Adding connection IDs 617bf09eb577ad67717d44977d9868538b15 and 23d1f896 for a new connection. 2025/04/30 11:04:08 server <- Reading packet 0 (1280 bytes) for connection 617bf09eb577ad67717d44977d9868538b15, Initial 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: 617bf09eb577ad67717d44977d9868538b15, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/04/30 11:04:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:08 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:08 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:08 Adding connection ID 819f89bf. 2025/04/30 11:04:08 Adding connection ID 8cb88032. 2025/04/30 11:04:08 Adding connection ID dbce0abb. 2025/04/30 11:04:08 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 617bf09eb577ad67717d44977d9868538b15 2025/04/30 11:04:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 23d1f896, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 422, Version: v1} 2025/04/30 11:04:08 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:08 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 23d1f896, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 819f89bf, StatelessResetToken: 0x25cec408181bdd8d57216707a838c509} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8cb88032, StatelessResetToken: 0x499f56ca97f885ce6c67da01282d620b} 2025/04/30 11:04:08 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dbce0abb, StatelessResetToken: 0x41238c4e7becf55670206cfee1695d13} 2025/04/30 11:04:08 server Queueing packet (48 bytes) for later decryption 2025/04/30 11:04:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:08 server -> Sending packet 6 (248 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:08 server -> &wire.NewTokenFrame{Token: 0x8856b8f8d149f2fd1c1de6ef5b1a738b690fc9d9c2c50ebf2e4bb258205754902410452937a266071b322fbe69e78b73836b5b4a0f713dfe3a076785d2b041ce074eb2eafc115f6d250b3244ad00672019368c34becf} 2025/04/30 11:04:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:08 server Skipping packet number 5 2025/04/30 11:04:08 server -> Sending packet 7 (1045 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:08 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:09 server <- Reading packet 2 (70 bytes) for connection 819f89bf, Handshake 2025/04/30 11:04:09 server Long Header{Type: Handshake, DestConnectionID: 819f89bf, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:09 server Dropping Initial keys. 2025/04/30 11:04:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:09 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 Retiring connection ID 617bf09eb577ad67717d44977d9868538b15 in 5s. 2025/04/30 11:04:09 server Dropping Handshake keys. 2025/04/30 11:04:09 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:04:09 server -> Sending packet 1 (1366 bytes) for connection 617bf09eb577ad67717d44977d9868538b15, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.PingFrame{} 2025/04/30 11:04:09 server <- Reading packet 1 (48 bytes) for connection 819f89bf, 1-RTT 2025/04/30 11:04:09 server Short Header{DestConnectionID: 819f89bf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 648µs} 2025/04/30 11:04:09 server newly acked packets (1): [0] 2025/04/30 11:04:09 server updated RTT: 33.374076ms (σ: 16.687038ms) 2025/04/30 11:04:09 server Canceling loss detection timer. 2025/04/30 11:04:09 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:09 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:09 server -> Sending packet 2 (257 bytes) for connection 617bf09eb577ad67717d44977d9868538b15, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 99.697218ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:09 server -> &wire.NewTokenFrame{Token: 0xd002cd57087749c5e76e13cb804aa854fd2dc19ada1c81db1e4f420031261c117f744e24836e1c7073264e1bfc296e02bed42adc2f73037b8fffc057ab31b02a6c4956d94779335faaa4d03161769e489314a6475774} 2025/04/30 11:04:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:09 Received request: GET /tskoxxvlbj 2025/04/30 11:04:09 server -> Sending packet 3 (1045 bytes) for connection 617bf09eb577ad67717d44977d9868538b15, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:09 Removing connection ID 5c15ff8e6eb603503a after it has been retired. 2025/04/30 11:04:09 server <- Reading packet 2 (33 bytes) for connection 819f89bf, 1-RTT 2025/04/30 11:04:09 server Short Header{DestConnectionID: 819f89bf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:09 server newly acked packets (2): [1 3] 2025/04/30 11:04:09 server updated RTT: 33.282ms (σ: 12.698ms) 2025/04/30 11:04:09 server ECN capability confirmed. 2025/04/30 11:04:09 server setting loss timer for packet 2 (1-RTT) to 37.44225ms (in 2025-04-30 11:04:09.042113163 +0000 UTC m=+14.565835046) 2025/04/30 11:04:09 server -> Sending packet 4 (22 bytes) for connection 617bf09eb577ad67717d44977d9868538b15, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:09 server Parsed a coalesced packet. Part 1: 35 bytes. Remaining: 26 bytes. 2025/04/30 11:04:09 server Dropping %!s(logging.PacketType=1) packet (35 bytes) because we already dropped the keys. 2025/04/30 11:04:09 server <- Reading packet 3 (26 bytes) for connection 819f89bf, 1-RTT 2025/04/30 11:04:09 server Short Header{DestConnectionID: 819f89bf, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:09 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:09 Replacing connection for connection IDs [23d1f896 819f89bf 8cb88032 dbce0abb] with a closed connection. 2025/04/30 11:04:09 server Connection 617bf09eb577ad67717d44977d9868538b15 closed. 2025/04/30 11:04:09 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:09 Removing connection ID b8e83c99 after it has been retired. 2025/04/30 11:04:09 Removing connection IDs [3d7412f5 4f50378f 7f285fee] for a closed connection after it has been retired. 2025/04/30 11:04:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:09 server -> Sending packet 9 (248 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:09 server -> &wire.NewTokenFrame{Token: 0x8856b8f8d149f2fd1c1de6ef5b1a738b690fc9d9c2c50ebf2e4bb258205754902410452937a266071b322fbe69e78b73836b5b4a0f713dfe3a076785d2b041ce074eb2eafc115f6d250b3244ad00672019368c34becf} 2025/04/30 11:04:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:09 server Skipping packet number 8 2025/04/30 11:04:09 server -> Sending packet 10 (1045 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:09 Removing connection ID 416fb4e109fc0dad981233c17b after it has been retired. 2025/04/30 11:04:09 Removing connection ID d34a5e8f after it has been retired. 2025/04/30 11:04:09 server <- Received Initial packet. 2025/04/30 11:04:09 Created qlog file: /logs/qlog/00628a2e17ff4e531c22ca73aeea.sqlog 2025/04/30 11:04:09 server Changing connection ID to e5d7c5f6. 2025/04/30 11:04:09 Adding connection IDs 00628a2e17ff4e531c22ca73aeea and e5d7c5f6 for a new connection. 2025/04/30 11:04:09 server <- Reading packet 3 (1280 bytes) for connection 00628a2e17ff4e531c22ca73aeea, Initial 2025/04/30 11:04:09 server Long Header{Type: Initial, DestConnectionID: 00628a2e17ff4e531c22ca73aeea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:09 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:09 Adding connection ID 34c25270. 2025/04/30 11:04:09 Adding connection ID 7c7acec9. 2025/04/30 11:04:09 Adding connection ID 5bb510fe. 2025/04/30 11:04:09 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 00628a2e17ff4e531c22ca73aeea 2025/04/30 11:04:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e5d7c5f6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 432, Version: v1} 2025/04/30 11:04:09 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:04:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:09 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e5d7c5f6, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:04:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5bb510fe, StatelessResetToken: 0x50bffd150d96a3e80eb6b29c68b097bf} 2025/04/30 11:04:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7c7acec9, StatelessResetToken: 0xd1aa9d1739f25cdb52315b14538bde49} 2025/04/30 11:04:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 34c25270, StatelessResetToken: 0x98e17ce5e438307976be9361950409f6} 2025/04/30 11:04:09 server <- Reading packet 4 (1280 bytes) for connection 00628a2e17ff4e531c22ca73aeea, Initial 2025/04/30 11:04:09 server Long Header{Type: Initial, DestConnectionID: 00628a2e17ff4e531c22ca73aeea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 268, Offset + Data length: 268} 2025/04/30 11:04:09 server -> Sending packet 1 (37 bytes) for connection 00628a2e17ff4e531c22ca73aeea, Initial 2025/04/30 11:04:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e5d7c5f6, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:09 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 11:04:09 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:04:09 server <- Reading packet 5 (1185 bytes) for connection 34c25270, Initial 2025/04/30 11:04:09 server Long Header{Type: Initial, DestConnectionID: 34c25270, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:09 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:09 server newly acked packets (1): [0] 2025/04/30 11:04:09 server updated RTT: 33.486917ms (σ: 16.743458ms) 2025/04/30 11:04:09 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:04:09 server <- Reading packet 0 (70 bytes) for connection 34c25270, Handshake 2025/04/30 11:04:09 server Long Header{Type: Handshake, DestConnectionID: 34c25270, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:09 server Dropping Initial keys. 2025/04/30 11:04:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:09 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 Retiring connection ID 00628a2e17ff4e531c22ca73aeea in 5s. 2025/04/30 11:04:09 server Dropping Handshake keys. 2025/04/30 11:04:09 server <- Reading packet 0 (25 bytes) for connection 34c25270, 1-RTT 2025/04/30 11:04:09 server Short Header{DestConnectionID: 34c25270, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:09 Retiring connection ID e5d7c5f6 in 5s. 2025/04/30 11:04:09 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:09 server -> Sending packet 1 (256 bytes) for connection 00628a2e17ff4e531c22ca73aeea, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 298.036µs} 2025/04/30 11:04:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:09 server -> &wire.NewTokenFrame{Token: 0x200323f4cc5694b233ddb03230d1a41a42bce1edbd60e8793270a95967b9e46ef6eed95c4334dea332df3a33de38735c86eb33b1766f29dc83ab744735eff1228040e3c1587b51fc3b9df426beaf3c178b93dd454104} 2025/04/30 11:04:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:09 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:09 server <- Reading packet 1 (48 bytes) for connection 34c25270, 1-RTT 2025/04/30 11:04:09 server Short Header{DestConnectionID: 34c25270, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 776µs} 2025/04/30 11:04:09 server newly acked packets (1): [0] 2025/04/30 11:04:09 server updated RTT: 33.496ms (σ: 12.577ms) 2025/04/30 11:04:09 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:09 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:09 Received request: GET /osoxapkxrz 2025/04/30 11:04:09 server -> Sending packet 2 (1053 bytes) for connection 00628a2e17ff4e531c22ca73aeea, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 490.131µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:09 server <- Reading packet 2 (31 bytes) for connection 34c25270, 1-RTT 2025/04/30 11:04:09 server Short Header{DestConnectionID: 34c25270, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 112µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:09 server newly acked packets (2): [1 2] 2025/04/30 11:04:09 server updated RTT: 33.256ms (σ: 9.912ms) 2025/04/30 11:04:09 server ECN capability confirmed. 2025/04/30 11:04:09 server Canceling loss detection timer. 2025/04/30 11:04:09 server Ignoring all packets below 2. 2025/04/30 11:04:09 server -> Sending packet 3 (22 bytes) for connection 00628a2e17ff4e531c22ca73aeea, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:09 server <- Reading packet 3 (26 bytes) for connection 34c25270, 1-RTT 2025/04/30 11:04:09 server Short Header{DestConnectionID: 34c25270, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:09 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:09 Replacing connection for connection IDs [34c25270 7c7acec9 5bb510fe] with a closed connection. 2025/04/30 11:04:09 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:09 server Connection 00628a2e17ff4e531c22ca73aeea closed. 2025/04/30 11:04:09 server <- Received Initial packet. 2025/04/30 11:04:09 Created qlog file: /logs/qlog/43afd600d848a2694a.sqlog 2025/04/30 11:04:09 server Changing connection ID to afa23e99. 2025/04/30 11:04:09 Adding connection IDs 43afd600d848a2694a and afa23e99 for a new connection. 2025/04/30 11:04:09 server <- Reading packet 0 (1280 bytes) for connection 43afd600d848a2694a, Initial 2025/04/30 11:04:09 server Long Header{Type: Initial, DestConnectionID: 43afd600d848a2694a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:09 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:09 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:09 Adding connection ID 469d5a52. 2025/04/30 11:04:09 Adding connection ID e59a810b. 2025/04/30 11:04:09 Adding connection ID 6f2a23bd. 2025/04/30 11:04:09 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 43afd600d848a2694a 2025/04/30 11:04:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: afa23e99, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 437, Version: v1} 2025/04/30 11:04:09 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:09 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: afa23e99, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 11:04:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f2a23bd, StatelessResetToken: 0xcbb055aecf685330cbbc33f9634b108b} 2025/04/30 11:04:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e59a810b, StatelessResetToken: 0x5b7161ee7446695ce7986ba088a37471} 2025/04/30 11:04:09 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 469d5a52, StatelessResetToken: 0x1d518f06155e9333ce4cab7354661bd5} 2025/04/30 11:04:09 Removing connection IDs [4c6df4de a8d937ad e78f2792] for a closed connection after it has been retired. 2025/04/30 11:04:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:04:09 server -> Sending packet 12 (248 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:09 server -> &wire.NewTokenFrame{Token: 0x8856b8f8d149f2fd1c1de6ef5b1a738b690fc9d9c2c50ebf2e4bb258205754902410452937a266071b322fbe69e78b73836b5b4a0f713dfe3a076785d2b041ce074eb2eafc115f6d250b3244ad00672019368c34becf} 2025/04/30 11:04:09 server Skipping packet number 11 2025/04/30 11:04:09 server -> Sending packet 13 (1045 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:09 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:09 Removing connection ID 8c746c22f0fc03dc2ab12c98 after it has been retired. 2025/04/30 11:04:09 Removing connection IDs [def9f1ff 1b25d1b1 4d4595fd d1a15c7b] for a closed connection after it has been retired. 2025/04/30 11:04:09 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:09 server -> Sending packet 1 (1280 bytes) for connection 43afd600d848a2694a, Initial 2025/04/30 11:04:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: afa23e99, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:09 server -> Sending packet 2 (1280 bytes) for connection 43afd600d848a2694a, Initial 2025/04/30 11:04:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: afa23e99, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:09 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:09 server Canceling loss detection timer. 2025/04/30 11:04:09 server Amplification window limited. Received 1280 bytes, already sent out 3840 bytes 2025/04/30 11:04:09 server <- Reading packet 2 (1280 bytes) for connection 43afd600d848a2694a, Initial 2025/04/30 11:04:09 server Long Header{Type: Initial, DestConnectionID: 43afd600d848a2694a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:09 server <- &wire.CryptoFrame{Offset: 0, Data length: 263, Offset + Data length: 263} 2025/04/30 11:04:09 server -> Sending packet 3 (39 bytes) for connection 43afd600d848a2694a, Initial 2025/04/30 11:04:09 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: afa23e99, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:04:09 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:04:09 server <- Reading packet 3 (1280 bytes) for connection afa23e99, Initial 2025/04/30 11:04:09 server Long Header{Type: Initial, DestConnectionID: afa23e99, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:09 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:10 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:04:10 server -> Sending packet 1 (738 bytes) for connection 43afd600d848a2694a, Handshake 2025/04/30 11:04:10 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: afa23e99, PacketNumber: 1, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 11:04:10 server -> Sending packet 2 (738 bytes) for connection 43afd600d848a2694a, Handshake 2025/04/30 11:04:10 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: afa23e99, PacketNumber: 2, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 11:04:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:10 server -> Sending packet 21 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:10 server -> Sending packet 22 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:10 server <- Reading packet 0 (75 bytes) for connection afa23e99, Handshake 2025/04/30 11:04:10 server Long Header{Type: Handshake, DestConnectionID: afa23e99, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:10 server Dropping Initial keys. 2025/04/30 11:04:10 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:10 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 Retiring connection ID 43afd600d848a2694a in 5s. 2025/04/30 11:04:10 server Dropping Handshake keys. 2025/04/30 11:04:10 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:10 server -> Sending packet 2 (320 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.NewTokenFrame{Token: 0x20eedb1a5f6b70ae8455db7495193203031e940006c976b7875661b5dc9d3be591807b86a1d9a303fe61b166ae6dc85567fec3ab8ff6b8e1d8cd703a58fe9c6a9274f8386b525a6532866625e95c06a86567e14f3d69} 2025/04/30 11:04:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e59a810b, StatelessResetToken: 0x5b7161ee7446695ce7986ba088a37471} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 469d5a52, StatelessResetToken: 0x1d518f06155e9333ce4cab7354661bd5} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f2a23bd, StatelessResetToken: 0xcbb055aecf685330cbbc33f9634b108b} 2025/04/30 11:04:10 server -> Sending packet 3 (320 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 469d5a52, StatelessResetToken: 0x1d518f06155e9333ce4cab7354661bd5} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e59a810b, StatelessResetToken: 0x5b7161ee7446695ce7986ba088a37471} 2025/04/30 11:04:10 server -> &wire.NewTokenFrame{Token: 0x20eedb1a5f6b70ae8455db7495193203031e940006c976b7875661b5dc9d3be591807b86a1d9a303fe61b166ae6dc85567fec3ab8ff6b8e1d8cd703a58fe9c6a9274f8386b525a6532866625e95c06a86567e14f3d69} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f2a23bd, StatelessResetToken: 0xcbb055aecf685330cbbc33f9634b108b} 2025/04/30 11:04:10 server -> Sending packet 4 (1366 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.PingFrame{} 2025/04/30 11:04:10 Removing connection ID 1d8f8b2e316e48107d30e89cf8 after it has been retired. 2025/04/30 11:04:10 server <- Reading packet 1 (33 bytes) for connection 469d5a52, 1-RTT 2025/04/30 11:04:10 server Short Header{DestConnectionID: 469d5a52, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 112µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:10 server newly acked packets (1): [3] 2025/04/30 11:04:10 server updated RTT: 31.365297ms (σ: 15.682648ms) 2025/04/30 11:04:10 server ECN capability confirmed. 2025/04/30 11:04:10 server Canceling loss detection timer. 2025/04/30 11:04:10 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:10 Retiring connection ID afa23e99 in 5s. 2025/04/30 11:04:10 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:10 server -> Sending packet 5 (27 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 144.971µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:10 Removing connection ID b1cf4dae after it has been retired. 2025/04/30 11:04:10 server <- Reading packet 4 (42 bytes) for connection 469d5a52, 1-RTT 2025/04/30 11:04:10 server Short Header{DestConnectionID: 469d5a52, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:10 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:10 server -> Sending packet 6 (29 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 Received request: GET /pqqrrogwhr 2025/04/30 11:04:10 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 109.965µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:10 server <- Reading packet 5 (25 bytes) for connection 469d5a52, 1-RTT 2025/04/30 11:04:10 server Short Header{DestConnectionID: 469d5a52, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:10 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:10 server -> Sending packet 7 (1055 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 139.79µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:10 server <- Reading packet 6 (33 bytes) for connection 469d5a52, 1-RTT 2025/04/30 11:04:10 server Short Header{DestConnectionID: 469d5a52, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 144µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:10 server newly acked packets (2): [4 7] 2025/04/30 11:04:10 server updated RTT: 31.378ms (σ: 11.787ms) 2025/04/30 11:04:10 server Canceling loss detection timer. 2025/04/30 11:04:10 server Ignoring all packets below 6. 2025/04/30 11:04:10 server -> Sending packet 8 (1409 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.PingFrame{} 2025/04/30 11:04:10 server -> Sending packet 9 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:10 server <- Received Initial packet. 2025/04/30 11:04:10 Created qlog file: /logs/qlog/962b1b5198ee6b2a70539b2f33dde1211d.sqlog 2025/04/30 11:04:10 server Changing connection ID to 3f0a3e78. 2025/04/30 11:04:10 Adding connection IDs 962b1b5198ee6b2a70539b2f33dde1211d and 3f0a3e78 for a new connection. 2025/04/30 11:04:10 server <- Reading packet 0 (1280 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Initial 2025/04/30 11:04:10 server Long Header{Type: Initial, DestConnectionID: 962b1b5198ee6b2a70539b2f33dde1211d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:04:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:04:10 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:10 Adding connection ID be298371. 2025/04/30 11:04:10 Adding connection ID cad309a2. 2025/04/30 11:04:10 Adding connection ID 01b5ab7f. 2025/04/30 11:04:10 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d 2025/04/30 11:04:10 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3f0a3e78, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 430, Version: v1} 2025/04/30 11:04:10 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:10 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3f0a3e78, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: be298371, StatelessResetToken: 0x4e2975a292ae4e2dc1907e42e335b35e} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 01b5ab7f, StatelessResetToken: 0x2ea8edefaeaebb3d78f789d216fbfff1} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cad309a2, StatelessResetToken: 0x32923d357b2475cc4dc08363a4c3e94d} 2025/04/30 11:04:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:10 server -> Sending packet 11 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:10 server -> Sending packet 12 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:10 Removing connection ID 7b336f3a after it has been retired. 2025/04/30 11:04:10 Removing connection ID 7fe3ac196fef8486de73cb after it has been retired. 2025/04/30 11:04:10 Tracking 93 connection IDs and 0 reset tokens. 2025/04/30 11:04:10 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:10 server -> Sending packet 1 (1280 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Initial 2025/04/30 11:04:10 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3f0a3e78, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:10 server -> Sending packet 2 (1280 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Initial 2025/04/30 11:04:10 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3f0a3e78, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:10 server Canceling loss detection timer. 2025/04/30 11:04:10 server Amplification window limited. Received 1280 bytes, already sent out 3840 bytes 2025/04/30 11:04:10 server <- Reading packet 2 (1280 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Initial 2025/04/30 11:04:10 server Long Header{Type: Initial, DestConnectionID: 962b1b5198ee6b2a70539b2f33dde1211d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/04/30 11:04:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 264, Offset + Data length: 264} 2025/04/30 11:04:10 server -> Sending packet 3 (39 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Initial 2025/04/30 11:04:10 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3f0a3e78, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:04:10 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 11:04:10 server <- Reading packet 4 (1280 bytes) for connection 3f0a3e78, Initial 2025/04/30 11:04:10 server Long Header{Type: Initial, DestConnectionID: 3f0a3e78, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:10 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:10 server newly acked packets (1): [2] 2025/04/30 11:04:10 server updated RTT: 34.109183ms (σ: 17.054591ms) 2025/04/30 11:04:10 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 11:04:10 server -> Sending packet 1 (745 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Handshake 2025/04/30 11:04:10 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3f0a3e78, PacketNumber: 1, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:04:10 server -> Sending packet 2 (745 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, Handshake 2025/04/30 11:04:10 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3f0a3e78, PacketNumber: 2, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 11:04:10 server <- Reading packet 0 (75 bytes) for connection 3f0a3e78, Handshake 2025/04/30 11:04:10 server Long Header{Type: Handshake, DestConnectionID: 3f0a3e78, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:10 server Dropping Initial keys. 2025/04/30 11:04:10 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:10 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 Retiring connection ID 962b1b5198ee6b2a70539b2f33dde1211d in 5s. 2025/04/30 11:04:10 server Dropping Handshake keys. 2025/04/30 11:04:10 server <- Reading packet 0 (42 bytes) for connection 3f0a3e78, 1-RTT 2025/04/30 11:04:10 server Short Header{DestConnectionID: 3f0a3e78, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:10 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:10 server -> Sending packet 2 (331 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 281.565µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:10 Received request: GET /usatfeydkb 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: be298371, StatelessResetToken: 0x4e2975a292ae4e2dc1907e42e335b35e} 2025/04/30 11:04:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:10 server -> &wire.NewTokenFrame{Token: 0xf3f1223d13bb5f374c6d2889c9ffe3e147f0e9d50e63d7ceb381e84bf2a0aebfb05ac6e652f2a2c98748f91bc67e613f89cc9b715e8da9daf8795fb2fb3db7eefb83467b5527b4f2919b2122e37937df8a4efb889e87} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 01b5ab7f, StatelessResetToken: 0x2ea8edefaeaebb3d78f789d216fbfff1} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cad309a2, StatelessResetToken: 0x32923d357b2475cc4dc08363a4c3e94d} 2025/04/30 11:04:10 server -> Sending packet 3 (323 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.NewTokenFrame{Token: 0xf3f1223d13bb5f374c6d2889c9ffe3e147f0e9d50e63d7ceb381e84bf2a0aebfb05ac6e652f2a2c98748f91bc67e613f89cc9b715e8da9daf8795fb2fb3db7eefb83467b5527b4f2919b2122e37937df8a4efb889e87} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: be298371, StatelessResetToken: 0x4e2975a292ae4e2dc1907e42e335b35e} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cad309a2, StatelessResetToken: 0x32923d357b2475cc4dc08363a4c3e94d} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 01b5ab7f, StatelessResetToken: 0x2ea8edefaeaebb3d78f789d216fbfff1} 2025/04/30 11:04:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:10 server -> Sending packet 4 (1045 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:10 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:10 server <- Reading packet 1 (33 bytes) for connection be298371, 1-RTT 2025/04/30 11:04:10 server Short Header{DestConnectionID: be298371, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 176µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:10 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:10 Retiring connection ID 3f0a3e78 in 5s. 2025/04/30 11:04:10 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:10 server <- Reading packet 2 (31 bytes) for connection be298371, 1-RTT 2025/04/30 11:04:10 server Short Header{DestConnectionID: be298371, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 64µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:10 server newly acked packets (2): [3 4] 2025/04/30 11:04:10 server updated RTT: 33.864ms (σ: 13.278ms) 2025/04/30 11:04:10 server ECN capability confirmed. 2025/04/30 11:04:10 server Canceling loss detection timer. 2025/04/30 11:04:10 server -> Sending packet 5 (30 bytes) for connection 962b1b5198ee6b2a70539b2f33dde1211d, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 249.337µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:10 server <- Reading packet 3 (26 bytes) for connection be298371, 1-RTT 2025/04/30 11:04:10 server Short Header{DestConnectionID: be298371, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:10 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:10 Replacing connection for connection IDs [be298371 cad309a2 01b5ab7f] with a closed connection. 2025/04/30 11:04:10 server Connection 962b1b5198ee6b2a70539b2f33dde1211d closed. 2025/04/30 11:04:10 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:10 server -> Sending packet 14 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:10 server -> Sending packet 15 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:10 server -> Sending packet 24 (251 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:10 server -> &wire.NewTokenFrame{Token: 0xae1fd7e4aa5c046ed55eb95c26470625dd9e2c0d30826fe137dbefc0c61c3a5eb1fea6bdb76189c8867fdbc46850ebc2d0768eb8029e6f00578e9651f7e54db47f1caca1bf8eaa3b54f3dc458784b5ef5ff540635f27} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:10 server Skipping packet number 23 2025/04/30 11:04:10 server -> Sending packet 25 (1045 bytes) for connection 39567dd5221aa0ced18aac6edae9713119833f, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:04:10 server -> Sending packet 15 (248 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:10 server -> &wire.NewTokenFrame{Token: 0x8856b8f8d149f2fd1c1de6ef5b1a738b690fc9d9c2c50ebf2e4bb258205754902410452937a266071b322fbe69e78b73836b5b4a0f713dfe3a076785d2b041ce074eb2eafc115f6d250b3244ad00672019368c34becf} 2025/04/30 11:04:10 server Skipping packet number 14 2025/04/30 11:04:10 server -> Sending packet 16 (1045 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:10 server -> Sending packet 21 (323 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 811f5fc4, StatelessResetToken: 0xbb3bf00bcca2736074d32614cf55e879} 2025/04/30 11:04:10 server -> &wire.NewTokenFrame{Token: 0x95d2f426e5f66bcddf0a31c176d2d8b45d0660202bbe0992200d0975f9c35344acdeb2b716b76d939c77a67f7f7c2fc4f10c3ec10abfa96d99206920e02430cdd990ceceb1fd95d63277c11cd8f1b7c703d76dc20f19} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 064f475d, StatelessResetToken: 0x04b640192126c8ad05cb0b0233ab1c36} 2025/04/30 11:04:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5dc23813, StatelessResetToken: 0xb6ed21b580163ed741b8fc36115474f1} 2025/04/30 11:04:10 server Skipping packet number 20 2025/04/30 11:04:10 server -> Sending packet 22 (1045 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:10 server <- Received Initial packet. 2025/04/30 11:04:10 Created qlog file: /logs/qlog/6732ec28cba69c12f4105de2.sqlog 2025/04/30 11:04:10 server Changing connection ID to 5421e18c. 2025/04/30 11:04:10 Adding connection IDs 6732ec28cba69c12f4105de2 and 5421e18c for a new connection. 2025/04/30 11:04:10 server <- Reading packet 1 (1280 bytes) for connection 6732ec28cba69c12f4105de2, Initial 2025/04/30 11:04:10 server Long Header{Type: Initial, DestConnectionID: 6732ec28cba69c12f4105de2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 11:04:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 265, Offset + Data length: 265} 2025/04/30 11:04:10 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:10 Adding connection ID 34dec8ed. 2025/04/30 11:04:10 Adding connection ID 56e9a0be. 2025/04/30 11:04:10 Adding connection ID f4f8cb14. 2025/04/30 11:04:10 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6732ec28cba69c12f4105de2 2025/04/30 11:04:10 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5421e18c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 424, Version: v1} 2025/04/30 11:04:10 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:10 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5421e18c, PacketNumber: 0, PacketNumberLen: 2, Length: 738, Version: v1} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 56e9a0be, StatelessResetToken: 0xa6477f047beeabfd6c23b4dcda3800cd} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f4f8cb14, StatelessResetToken: 0xf4460a88a2439bf589073f6a5faa71f6} 2025/04/30 11:04:10 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 34dec8ed, StatelessResetToken: 0xd8c3d2c6c7df36db5ff5a4cc2ec0edfd} 2025/04/30 11:04:10 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:04:10 server <- Reading packet 3 (1185 bytes) for connection 34dec8ed, Initial 2025/04/30 11:04:10 server Long Header{Type: Initial, DestConnectionID: 34dec8ed, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:10 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:10 server newly acked packets (1): [0] 2025/04/30 11:04:10 server updated RTT: 33.306542ms (σ: 16.653271ms) 2025/04/30 11:04:10 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:04:10 server <- Reading packet 0 (70 bytes) for connection 34dec8ed, Handshake 2025/04/30 11:04:10 server Long Header{Type: Handshake, DestConnectionID: 34dec8ed, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:10 server Dropping Initial keys. 2025/04/30 11:04:10 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:10 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:10 Retiring connection ID 6732ec28cba69c12f4105de2 in 5s. 2025/04/30 11:04:10 server Dropping Handshake keys. 2025/04/30 11:04:10 server <- Reading packet 0 (25 bytes) for connection 34dec8ed, 1-RTT 2025/04/30 11:04:10 server Short Header{DestConnectionID: 34dec8ed, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:10 Retiring connection ID 5421e18c in 5s. 2025/04/30 11:04:10 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:10 server -> Sending packet 1 (256 bytes) for connection 6732ec28cba69c12f4105de2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 304.147µs} 2025/04/30 11:04:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:10 server -> &wire.NewTokenFrame{Token: 0x0eccc7eb3cb73842ba245fdfe824ec905e34cf39057517e2685f822add231a856209bfeb75f144b452cbcde1bad08cde7da52d6fca3f4135889f3710ec3a2f6405e2c327165c2ce255b8847740d0b1c00c26c44ba7ed} 2025/04/30 11:04:10 server <- Reading packet 2 (32 bytes) for connection 34dec8ed, 1-RTT 2025/04/30 11:04:10 server Short Header{DestConnectionID: 34dec8ed, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.376ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:10 server newly acked packets (2): [0 1] 2025/04/30 11:04:10 server updated RTT: 36.182ms (σ: 18.242ms) 2025/04/30 11:04:10 server ECN capability confirmed. 2025/04/30 11:04:10 server Canceling loss detection timer. 2025/04/30 11:04:10 server Ignoring all packets below 1. 2025/04/30 11:04:10 server <- Reading packet 4 (42 bytes) for connection 34dec8ed, 1-RTT 2025/04/30 11:04:10 server Short Header{DestConnectionID: 34dec8ed, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:10 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:10 server <- Reading packet 5 (42 bytes) for connection 34dec8ed, 1-RTT 2025/04/30 11:04:10 server Short Header{DestConnectionID: 34dec8ed, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:10 server -> Sending packet 2 (29 bytes) for connection 6732ec28cba69c12f4105de2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 Received request: GET /fytpweqqzv 2025/04/30 11:04:10 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 134.881µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:10 server -> Sending packet 3 (1045 bytes) for connection 6732ec28cba69c12f4105de2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:10 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:11 server -> Sending packet 27 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:11 server -> Sending packet 28 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:11 server <- Reading packet 6 (26 bytes) for connection 34dec8ed, 1-RTT 2025/04/30 11:04:11 server Short Header{DestConnectionID: 34dec8ed, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:11 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:11 Replacing connection for connection IDs [34dec8ed 56e9a0be f4f8cb14] with a closed connection. 2025/04/30 11:04:11 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:11 server Connection 6732ec28cba69c12f4105de2 closed. 2025/04/30 11:04:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:04:11 server -> Sending packet 17 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:11 server -> Sending packet 18 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:11 server <- Received Initial packet. 2025/04/30 11:04:11 Created qlog file: /logs/qlog/060663489778f634f053ebc6b3189fc7.sqlog 2025/04/30 11:04:11 server Changing connection ID to 4f9b94d2. 2025/04/30 11:04:11 Adding connection IDs 060663489778f634f053ebc6b3189fc7 and 4f9b94d2 for a new connection. 2025/04/30 11:04:11 server <- Reading packet 2 (1280 bytes) for connection 060663489778f634f053ebc6b3189fc7, Initial 2025/04/30 11:04:11 server Long Header{Type: Initial, DestConnectionID: 060663489778f634f053ebc6b3189fc7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/04/30 11:04:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:11 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:11 Adding connection ID 7e5d0f19. 2025/04/30 11:04:11 Adding connection ID ca606cb3. 2025/04/30 11:04:11 Adding connection ID 9f615409. 2025/04/30 11:04:11 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 060663489778f634f053ebc6b3189fc7 2025/04/30 11:04:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4f9b94d2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 422, Version: v1} 2025/04/30 11:04:11 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4f9b94d2, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 11:04:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ca606cb3, StatelessResetToken: 0x72592254afa8e79344ef2f2f0548e489} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7e5d0f19, StatelessResetToken: 0x9a777fda5ef13a2e0d6dbb7a69d9b33f} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9f615409, StatelessResetToken: 0x474bdf9b712a69cf246ad26185edd12a} 2025/04/30 11:04:11 server Parsed a coalesced packet. Part 1: 1166 bytes. Remaining: 114 bytes. 2025/04/30 11:04:11 server <- Reading packet 3 (1166 bytes) for connection 7e5d0f19, Initial 2025/04/30 11:04:11 server Long Header{Type: Initial, DestConnectionID: 7e5d0f19, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/04/30 11:04:11 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:11 server newly acked packets (1): [0] 2025/04/30 11:04:11 server updated RTT: 33.599054ms (σ: 16.799527ms) 2025/04/30 11:04:11 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 44 bytes. 2025/04/30 11:04:11 server <- Reading packet 0 (70 bytes) for connection 7e5d0f19, Handshake 2025/04/30 11:04:11 server Long Header{Type: Handshake, DestConnectionID: 7e5d0f19, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:11 server Dropping Initial keys. 2025/04/30 11:04:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:11 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 Retiring connection ID 060663489778f634f053ebc6b3189fc7 in 5s. 2025/04/30 11:04:11 server Dropping Handshake keys. 2025/04/30 11:04:11 server <- Reading packet 0 (44 bytes) for connection 7e5d0f19, 1-RTT 2025/04/30 11:04:11 server Short Header{DestConnectionID: 7e5d0f19, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:11 Retiring connection ID 4f9b94d2 in 5s. 2025/04/30 11:04:11 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:11 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:11 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:11 server -> Sending packet 1 (256 bytes) for connection 060663489778f634f053ebc6b3189fc7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 440.03µs} 2025/04/30 11:04:11 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:11 server -> &wire.NewTokenFrame{Token: 0xc6a43d016718f4b457bc355da9a19206dcbc64f21bc106e2cd458b3bbefb390b93cf9adc0117b35854ad7ccb55bc2ac7f49b9ca72f3f1afa803f7fa45e666af9b3f2873106591b9766eaab75d19c92a69e81cf9f1216} 2025/04/30 11:04:11 Received request: GET /dtoqhmgbot 2025/04/30 11:04:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:11 server <- Reading packet 1 (29 bytes) for connection 7e5d0f19, 1-RTT 2025/04/30 11:04:11 server Short Header{DestConnectionID: 7e5d0f19, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 816µs} 2025/04/30 11:04:11 server newly acked packets (1): [0] 2025/04/30 11:04:11 server updated RTT: 33.614ms (σ: 12.629ms) 2025/04/30 11:04:11 server -> Sending packet 2 (1045 bytes) for connection 060663489778f634f053ebc6b3189fc7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:11 server <- Reading packet 2 (31 bytes) for connection 7e5d0f19, 1-RTT 2025/04/30 11:04:11 server Short Header{DestConnectionID: 7e5d0f19, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 64µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:11 server newly acked packets (2): [1 2] 2025/04/30 11:04:11 server updated RTT: 33.383ms (σ: 9.931ms) 2025/04/30 11:04:11 server ECN capability confirmed. 2025/04/30 11:04:11 server Canceling loss detection timer. 2025/04/30 11:04:11 server Ignoring all packets below 1. 2025/04/30 11:04:11 server <- Reading packet 3 (26 bytes) for connection 7e5d0f19, 1-RTT 2025/04/30 11:04:11 server Short Header{DestConnectionID: 7e5d0f19, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:11 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:11 Replacing connection for connection IDs [7e5d0f19 ca606cb3 9f615409] with a closed connection. 2025/04/30 11:04:11 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:11 server Connection 060663489778f634f053ebc6b3189fc7 closed. 2025/04/30 11:04:11 server <- Received Initial packet. 2025/04/30 11:04:11 Created qlog file: /logs/qlog/3978336264ec6417.sqlog 2025/04/30 11:04:11 server Changing connection ID to 8cf1ea6e. 2025/04/30 11:04:11 Adding connection IDs 3978336264ec6417 and 8cf1ea6e for a new connection. 2025/04/30 11:04:11 server <- Reading packet 0 (1280 bytes) for connection 3978336264ec6417, Initial 2025/04/30 11:04:11 server Long Header{Type: Initial, DestConnectionID: 3978336264ec6417, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/04/30 11:04:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:11 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:11 Adding connection ID 0d0eb9df. 2025/04/30 11:04:11 Adding connection ID 55d57cff. 2025/04/30 11:04:11 Adding connection ID c765aa66. 2025/04/30 11:04:11 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3978336264ec6417 2025/04/30 11:04:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8cf1ea6e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 434, Version: v1} 2025/04/30 11:04:11 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8cf1ea6e, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:04:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0d0eb9df, StatelessResetToken: 0x4a071ce59ecc09d3fed6936e9530175b} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c765aa66, StatelessResetToken: 0xd9753aef21497d932573093d111c2432} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 55d57cff, StatelessResetToken: 0xda1d92f140bfd94c3d66c1ddec131063} 2025/04/30 11:04:11 server <- Reading packet 1 (36 bytes) for connection 0d0eb9df, Handshake 2025/04/30 11:04:11 server Long Header{Type: Handshake, DestConnectionID: 0d0eb9df, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:11 server Dropping Initial keys. 2025/04/30 11:04:11 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:11 server newly acked packets (1): [0] 2025/04/30 11:04:11 server updated RTT: 33.445862ms (σ: 16.722931ms) 2025/04/30 11:04:11 server Canceling loss detection timer. 2025/04/30 11:04:11 server Queueing packet (48 bytes) for later decryption 2025/04/30 11:04:11 server <- Reading packet 3 (70 bytes) for connection 0d0eb9df, Handshake 2025/04/30 11:04:11 server Long Header{Type: Handshake, DestConnectionID: 0d0eb9df, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:11 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 Retiring connection ID 3978336264ec6417 in 5s. 2025/04/30 11:04:11 server Dropping Handshake keys. 2025/04/30 11:04:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:11 server -> Sending packet 2 (323 bytes) for connection 3978336264ec6417, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c765aa66, StatelessResetToken: 0xd9753aef21497d932573093d111c2432} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0d0eb9df, StatelessResetToken: 0x4a071ce59ecc09d3fed6936e9530175b} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 55d57cff, StatelessResetToken: 0xda1d92f140bfd94c3d66c1ddec131063} 2025/04/30 11:04:11 server -> &wire.NewTokenFrame{Token: 0x3a0e06e180e4c11a28815e2aa0a3cefce5826ed460e7f5086bbf1f6b2ca60c3e80f05fbc531bec643e8a0cc2d68ebace01bfaa927fa76cb702f38143d8568cce0185043a399a137067ce1dda362812ad880864acc9cb} 2025/04/30 11:04:11 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:11 server -> Sending packet 3 (323 bytes) for connection 3978336264ec6417, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0d0eb9df, StatelessResetToken: 0x4a071ce59ecc09d3fed6936e9530175b} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 55d57cff, StatelessResetToken: 0xda1d92f140bfd94c3d66c1ddec131063} 2025/04/30 11:04:11 server -> &wire.NewTokenFrame{Token: 0x3a0e06e180e4c11a28815e2aa0a3cefce5826ed460e7f5086bbf1f6b2ca60c3e80f05fbc531bec643e8a0cc2d68ebace01bfaa927fa76cb702f38143d8568cce0185043a399a137067ce1dda362812ad880864acc9cb} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c765aa66, StatelessResetToken: 0xd9753aef21497d932573093d111c2432} 2025/04/30 11:04:11 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:11 server <- Reading packet 1 (48 bytes) for connection 0d0eb9df, 1-RTT 2025/04/30 11:04:11 server Short Header{DestConnectionID: 0d0eb9df, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 784µs} 2025/04/30 11:04:11 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:11 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:11 server -> Sending packet 4 (28 bytes) for connection 3978336264ec6417, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 100.121229ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:11 Received request: GET /nihiovkmyl 2025/04/30 11:04:11 server -> Sending packet 5 (1045 bytes) for connection 3978336264ec6417, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:11 server <- Reading packet 4 (42 bytes) for connection 0d0eb9df, 1-RTT 2025/04/30 11:04:11 server Short Header{DestConnectionID: 0d0eb9df, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:11 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:11 server -> Sending packet 6 (29 bytes) for connection 3978336264ec6417, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 72.465µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:11 server <- Reading packet 6 (26 bytes) for connection 0d0eb9df, 1-RTT 2025/04/30 11:04:11 server Short Header{DestConnectionID: 0d0eb9df, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:11 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:11 Replacing connection for connection IDs [55d57cff c765aa66 8cf1ea6e 0d0eb9df] with a closed connection. 2025/04/30 11:04:11 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:11 server Connection 3978336264ec6417 closed. 2025/04/30 11:04:11 server <- Received Initial packet. 2025/04/30 11:04:11 Created qlog file: /logs/qlog/d9b0ac925103b4dff54931ccc8d6.sqlog 2025/04/30 11:04:11 server Changing connection ID to 587bc373. 2025/04/30 11:04:11 Adding connection IDs d9b0ac925103b4dff54931ccc8d6 and 587bc373 for a new connection. 2025/04/30 11:04:11 server <- Reading packet 1 (1280 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Initial 2025/04/30 11:04:11 server Long Header{Type: Initial, DestConnectionID: d9b0ac925103b4dff54931ccc8d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:11 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:11 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:11 Adding connection ID 0f7d70c9. 2025/04/30 11:04:11 Adding connection ID 358576eb. 2025/04/30 11:04:11 Adding connection ID adca383d. 2025/04/30 11:04:11 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d9b0ac925103b4dff54931ccc8d6 2025/04/30 11:04:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 587bc373, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 432, Version: v1} 2025/04/30 11:04:11 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:11 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 587bc373, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:04:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: adca383d, StatelessResetToken: 0x1eb9a14ed0dfbc10def8e8711a505821} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0f7d70c9, StatelessResetToken: 0xfc2d7c7db00b8533b9e5955befbef69d} 2025/04/30 11:04:11 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 358576eb, StatelessResetToken: 0x7a8493f73958d5c182a577c745925b57} 2025/04/30 11:04:11 server <- Reading packet 2 (1280 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Initial 2025/04/30 11:04:11 server Long Header{Type: Initial, DestConnectionID: d9b0ac925103b4dff54931ccc8d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:11 server <- &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:11 server -> Sending packet 1 (37 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Initial 2025/04/30 11:04:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 587bc373, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:11 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:11 server -> Sending packet 28 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:11 server -> Sending packet 29 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:11 Removing connection ID dd9f272266176abdf2c64c85 after it has been retired. 2025/04/30 11:04:11 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:11 server -> Sending packet 2 (1280 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Initial 2025/04/30 11:04:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 587bc373, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:11 server -> Sending packet 3 (1280 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Initial 2025/04/30 11:04:11 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 587bc373, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:11 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:11 server -> Sending packet 21 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:11 server -> Sending packet 22 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:11 server <- Reading packet 3 (1280 bytes) for connection 587bc373, Initial 2025/04/30 11:04:11 server Long Header{Type: Initial, DestConnectionID: 587bc373, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:11 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:11 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:04:11 server -> Sending packet 20 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:11 server -> Sending packet 21 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:11 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:11 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:12 Removing connection IDs [612a2dea f9155ed9 cae53611 c6025be0] for a closed connection after it has been retired. 2025/04/30 11:04:12 Removing connection ID 2b4c673d after it has been retired. 2025/04/30 11:04:12 Removing connection ID a21221f5eea20ee19f9c after it has been retired. 2025/04/30 11:04:12 server <- Reading packet 5 (1280 bytes) for connection 587bc373, Initial 2025/04/30 11:04:12 server Long Header{Type: Initial, DestConnectionID: 587bc373, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:12 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:04:12 server -> Sending packet 1 (743 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Handshake 2025/04/30 11:04:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 587bc373, PacketNumber: 1, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:04:12 server -> Sending packet 2 (743 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Handshake 2025/04/30 11:04:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 587bc373, PacketNumber: 2, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 11:04:12 server -> Sending packet 4 (39 bytes) for connection d9b0ac925103b4dff54931ccc8d6, Initial 2025/04/30 11:04:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 587bc373, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 11:04:12 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 1}}, DelayTime: 0s} 2025/04/30 11:04:12 server Queueing packet (42 bytes) for later decryption 2025/04/30 11:04:12 Removing connection IDs [95ae4624 4fdb4868 12cce69d] for a closed connection after it has been retired. 2025/04/30 11:04:12 server <- Reading packet 2 (70 bytes) for connection 587bc373, Handshake 2025/04/30 11:04:12 server Long Header{Type: Handshake, DestConnectionID: 587bc373, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:12 server Dropping Initial keys. 2025/04/30 11:04:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:12 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 Retiring connection ID d9b0ac925103b4dff54931ccc8d6 in 5s. 2025/04/30 11:04:12 server Dropping Handshake keys. 2025/04/30 11:04:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:12 server -> Sending packet 2 (320 bytes) for connection d9b0ac925103b4dff54931ccc8d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: adca383d, StatelessResetToken: 0x1eb9a14ed0dfbc10def8e8711a505821} 2025/04/30 11:04:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0f7d70c9, StatelessResetToken: 0xfc2d7c7db00b8533b9e5955befbef69d} 2025/04/30 11:04:12 server -> &wire.NewTokenFrame{Token: 0x13011de6ee9c86661522ea30369a8fa6c68e6ba6faa14873ab4a12acfabed2253718c7b37ce4f4af141c5b79eea484b686e220e4e773dc1fb0d2ed4767c73797f702851dbc0d6c9d3053f138289a1f40199a845b73e2} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 358576eb, StatelessResetToken: 0x7a8493f73958d5c182a577c745925b57} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:12 server -> Sending packet 3 (320 bytes) for connection d9b0ac925103b4dff54931ccc8d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: adca383d, StatelessResetToken: 0x1eb9a14ed0dfbc10def8e8711a505821} 2025/04/30 11:04:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 358576eb, StatelessResetToken: 0x7a8493f73958d5c182a577c745925b57} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0f7d70c9, StatelessResetToken: 0xfc2d7c7db00b8533b9e5955befbef69d} 2025/04/30 11:04:12 server -> &wire.NewTokenFrame{Token: 0x13011de6ee9c86661522ea30369a8fa6c68e6ba6faa14873ab4a12acfabed2253718c7b37ce4f4af141c5b79eea484b686e220e4e773dc1fb0d2ed4767c73797f702851dbc0d6c9d3053f138289a1f40199a845b73e2} 2025/04/30 11:04:12 server -> Sending packet 4 (1366 bytes) for connection d9b0ac925103b4dff54931ccc8d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.PingFrame{} 2025/04/30 11:04:12 server <- Reading packet 0 (42 bytes) for connection 587bc373, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: 587bc373, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:12 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:12 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:04:12 server -> Sending packet 5 (30 bytes) for connection d9b0ac925103b4dff54931ccc8d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.123251ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:12 Received request: GET /kolkvyfphm 2025/04/30 11:04:12 server -> Sending packet 6 (1045 bytes) for connection d9b0ac925103b4dff54931ccc8d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:12 server <- Reading packet 3 (44 bytes) for connection 0f7d70c9, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: 0f7d70c9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:12 Retiring connection ID 587bc373 in 5s. 2025/04/30 11:04:12 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:12 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:12 server -> Sending packet 7 (29 bytes) for connection d9b0ac925103b4dff54931ccc8d6, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 92.893µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:12 server <- Reading packet 5 (31 bytes) for connection 0f7d70c9, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: 0f7d70c9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 64µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:12 server newly acked packets (2): [3 4] 2025/04/30 11:04:12 server updated RTT: 32.49833ms (σ: 16.249165ms) 2025/04/30 11:04:12 server ECN capability confirmed. 2025/04/30 11:04:12 server <- Reading packet 6 (26 bytes) for connection 0f7d70c9, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: 0f7d70c9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:12 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:12 Replacing connection for connection IDs [adca383d 0f7d70c9 358576eb] with a closed connection. 2025/04/30 11:04:12 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:12 server Connection d9b0ac925103b4dff54931ccc8d6 closed. 2025/04/30 11:04:12 server <- Received Initial packet. 2025/04/30 11:04:12 Created qlog file: /logs/qlog/f1ccc4c9e5c1c8a98c.sqlog 2025/04/30 11:04:12 server Changing connection ID to a5363214. 2025/04/30 11:04:12 Adding connection IDs f1ccc4c9e5c1c8a98c and a5363214 for a new connection. 2025/04/30 11:04:12 server <- Reading packet 0 (1280 bytes) for connection f1ccc4c9e5c1c8a98c, Initial 2025/04/30 11:04:12 server Long Header{Type: Initial, DestConnectionID: f1ccc4c9e5c1c8a98c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:12 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:12 Adding connection ID 41c36c73. 2025/04/30 11:04:12 Adding connection ID b5c0eda1. 2025/04/30 11:04:12 Adding connection ID 23d53dc8. 2025/04/30 11:04:12 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f1ccc4c9e5c1c8a98c 2025/04/30 11:04:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a5363214, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 440, Version: v1} 2025/04/30 11:04:12 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a5363214, PacketNumber: 0, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b5c0eda1, StatelessResetToken: 0x446694fae15e86c2af8e8c4a38c4abd0} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 23d53dc8, StatelessResetToken: 0x45e1cee2d9004ecb06cfb627a87f24a2} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 41c36c73, StatelessResetToken: 0xa22cac2d063890d001e277b63b59a385} 2025/04/30 11:04:12 server <- Reading packet 2 (70 bytes) for connection 41c36c73, Handshake 2025/04/30 11:04:12 server Long Header{Type: Handshake, DestConnectionID: 41c36c73, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:12 server Dropping Initial keys. 2025/04/30 11:04:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:12 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 Retiring connection ID f1ccc4c9e5c1c8a98c in 5s. 2025/04/30 11:04:12 server Dropping Handshake keys. 2025/04/30 11:04:12 server -> Sending packet 1 (1366 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.PingFrame{} 2025/04/30 11:04:12 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:04:12 server -> Sending packet 2 (248 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.NewTokenFrame{Token: 0xfa6b05bbb532988ed8be8ce9a43b12d0dc6600fe0ded47c5465a9d8a255a71469ffdc349268bfbbe50e9be6601c1d27b278d1312784446f1a123faec599977be44ef4ceade51c23906d46915748db34aaef3aed6abdf} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:12 Tracking 108 connection IDs and 0 reset tokens. 2025/04/30 11:04:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:12 server -> Sending packet 28 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:12 server -> Sending packet 29 (22 bytes) for connection 5c706d7fcb8a3a075cea75f5d3, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:12 server -> Sending packet 4 (91 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 41c36c73, StatelessResetToken: 0xa22cac2d063890d001e277b63b59a385} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b5c0eda1, StatelessResetToken: 0x446694fae15e86c2af8e8c4a38c4abd0} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 23d53dc8, StatelessResetToken: 0x45e1cee2d9004ecb06cfb627a87f24a2} 2025/04/30 11:04:12 server Skipping packet number 3 2025/04/30 11:04:12 server -> Sending packet 5 (248 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:12 server -> &wire.NewTokenFrame{Token: 0xfa6b05bbb532988ed8be8ce9a43b12d0dc6600fe0ded47c5465a9d8a255a71469ffdc349268bfbbe50e9be6601c1d27b278d1312784446f1a123faec599977be44ef4ceade51c23906d46915748db34aaef3aed6abdf} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:12 server <- Reading packet 5 (1366 bytes) for connection 41c36c73, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: 41c36c73, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.PingFrame{} 2025/04/30 11:04:12 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:12 server <- Reading packet 6 (35 bytes) for connection 41c36c73, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: 41c36c73, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:12 server newly acked packets (2): [4 5] 2025/04/30 11:04:12 server updated RTT: 32.336391ms (σ: 16.168195ms) 2025/04/30 11:04:12 server ECN capability confirmed. 2025/04/30 11:04:12 server lost packet 1 (time threshold) 2025/04/30 11:04:12 server Canceling loss detection timer. 2025/04/30 11:04:12 server -> Sending packet 6 (1323 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.PingFrame{} 2025/04/30 11:04:12 server -> Sending packet 7 (27 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 208.328µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:12 Removing connection ID 4670bb1fdbf8f724cae6 after it has been retired. 2025/04/30 11:04:12 server <- Reading packet 7 (56 bytes) for connection 41c36c73, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: 41c36c73, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 152µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 11:04:12 server newly acked packets (1): [6] 2025/04/30 11:04:12 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:12 Retiring connection ID a5363214 in 5s. 2025/04/30 11:04:12 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:12 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:12 Received request: GET /nnplcdywsk 2025/04/30 11:04:12 server -> Sending packet 8 (1053 bytes) for connection f1ccc4c9e5c1c8a98c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 288.321µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:12 server -> Sending packet 18 (248 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.NewTokenFrame{Token: 0x8856b8f8d149f2fd1c1de6ef5b1a738b690fc9d9c2c50ebf2e4bb258205754902410452937a266071b322fbe69e78b73836b5b4a0f713dfe3a076785d2b041ce074eb2eafc115f6d250b3244ad00672019368c34becf} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:12 server Skipping packet number 17 2025/04/30 11:04:12 server -> Sending packet 19 (1045 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:12 Removing connection ID 18bb1122 after it has been retired. 2025/04/30 11:04:12 server <- Reading packet 8 (26 bytes) for connection 41c36c73, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: 41c36c73, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:12 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:12 Replacing connection for connection IDs [41c36c73 b5c0eda1 23d53dc8] with a closed connection. 2025/04/30 11:04:12 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:12 server Connection f1ccc4c9e5c1c8a98c closed. 2025/04/30 11:04:12 server <- Received Initial packet. 2025/04/30 11:04:12 Created qlog file: /logs/qlog/a45c9e1b711dbac6fb.sqlog 2025/04/30 11:04:12 server Changing connection ID to 8c65fcd5. 2025/04/30 11:04:12 Adding connection IDs a45c9e1b711dbac6fb and 8c65fcd5 for a new connection. 2025/04/30 11:04:12 server <- Reading packet 0 (1280 bytes) for connection a45c9e1b711dbac6fb, Initial 2025/04/30 11:04:12 server Long Header{Type: Initial, DestConnectionID: a45c9e1b711dbac6fb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/04/30 11:04:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:12 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:12 Adding connection ID ab90a3c0. 2025/04/30 11:04:12 Adding connection ID 890e23cd. 2025/04/30 11:04:12 Adding connection ID d436e6b8. 2025/04/30 11:04:12 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a45c9e1b711dbac6fb 2025/04/30 11:04:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8c65fcd5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:04:12 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8c65fcd5, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d436e6b8, StatelessResetToken: 0xaadd669a9ff2ad100076077f5f1a1008} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 890e23cd, StatelessResetToken: 0x59307af6beaacf097ea5c75ad4b3f286} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ab90a3c0, StatelessResetToken: 0xd43b95a03c35ebf4cb4748e6ff6578f1} 2025/04/30 11:04:12 Removing connection IDs [4f8bb9a8 bbf5b04d 31b3655e] for a closed connection after it has been retired. 2025/04/30 11:04:12 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:04:12 server <- Reading packet 1 (1185 bytes) for connection ab90a3c0, Initial 2025/04/30 11:04:12 server Long Header{Type: Initial, DestConnectionID: ab90a3c0, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:12 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:12 server newly acked packets (1): [0] 2025/04/30 11:04:12 server updated RTT: 33.404159ms (σ: 16.702079ms) 2025/04/30 11:04:12 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:04:12 server <- Reading packet 0 (70 bytes) for connection ab90a3c0, Handshake 2025/04/30 11:04:12 server Long Header{Type: Handshake, DestConnectionID: ab90a3c0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:12 server Dropping Initial keys. 2025/04/30 11:04:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:12 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 Retiring connection ID a45c9e1b711dbac6fb in 5s. 2025/04/30 11:04:12 server Dropping Handshake keys. 2025/04/30 11:04:12 server <- Reading packet 0 (25 bytes) for connection ab90a3c0, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: ab90a3c0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:12 Retiring connection ID 8c65fcd5 in 5s. 2025/04/30 11:04:12 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:12 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:04:12 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:12 server <- Reading packet 1 (42 bytes) for connection ab90a3c0, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: ab90a3c0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:12 server -> Sending packet 1 (256 bytes) for connection a45c9e1b711dbac6fb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 357.407µs} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:12 server -> &wire.NewTokenFrame{Token: 0x5414b9843254c4a8177ad8eaec2bbd7f53635dc0c34c8aaba0f27fae82333b49257437a3febe08cde97ba311afd4dc6a67fc796b99139cc1187d996b19acc2a5da2a2e806b8c3e3a34bd33c632f030f33c6581d6f078} 2025/04/30 11:04:12 server <- Reading packet 2 (29 bytes) for connection ab90a3c0, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: ab90a3c0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 712µs} 2025/04/30 11:04:12 Received request: GET /fqacynadgo 2025/04/30 11:04:12 server newly acked packets (1): [0] 2025/04/30 11:04:12 server updated RTT: 33.418ms (σ: 12.555ms) 2025/04/30 11:04:12 server -> Sending packet 2 (1045 bytes) for connection a45c9e1b711dbac6fb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:12 server <- Reading packet 3 (31 bytes) for connection ab90a3c0, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: ab90a3c0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 72µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:12 server newly acked packets (2): [1 2] 2025/04/30 11:04:12 server updated RTT: 33.186ms (σ: 9.878ms) 2025/04/30 11:04:12 server ECN capability confirmed. 2025/04/30 11:04:12 server Canceling loss detection timer. 2025/04/30 11:04:12 server Ignoring all packets below 2. 2025/04/30 11:04:12 server <- Reading packet 4 (26 bytes) for connection ab90a3c0, 1-RTT 2025/04/30 11:04:12 server Short Header{DestConnectionID: ab90a3c0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:12 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:12 Replacing connection for connection IDs [ab90a3c0 890e23cd d436e6b8] with a closed connection. 2025/04/30 11:04:12 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:12 server Connection a45c9e1b711dbac6fb closed. 2025/04/30 11:04:12 server <- Received Initial packet. 2025/04/30 11:04:12 Created qlog file: /logs/qlog/cc126c14fa7a4ef739138f61e528.sqlog 2025/04/30 11:04:12 server Changing connection ID to 8882db49. 2025/04/30 11:04:12 Adding connection IDs cc126c14fa7a4ef739138f61e528 and 8882db49 for a new connection. 2025/04/30 11:04:12 server <- Reading packet 0 (1280 bytes) for connection cc126c14fa7a4ef739138f61e528, Initial 2025/04/30 11:04:12 server Long Header{Type: Initial, DestConnectionID: cc126c14fa7a4ef739138f61e528, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:04:12 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:12 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:12 Adding connection ID 79187732. 2025/04/30 11:04:12 Adding connection ID 8b5193b5. 2025/04/30 11:04:12 Adding connection ID 5f2135b3. 2025/04/30 11:04:12 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection cc126c14fa7a4ef739138f61e528 2025/04/30 11:04:12 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8882db49, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:04:12 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:12 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8882db49, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:04:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:04:12 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8b5193b5, StatelessResetToken: 0x6a6d1c57b7a75d293662def6610961f7} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 79187732, StatelessResetToken: 0xa2025852888171b26d143bc95c5f8868} 2025/04/30 11:04:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f2135b3, StatelessResetToken: 0xa6de1e5860ca5c1913ad5bd9c9a76bc8} 2025/04/30 11:04:13 server <- Reading packet 1 (1280 bytes) for connection cc126c14fa7a4ef739138f61e528, Initial 2025/04/30 11:04:13 server Long Header{Type: Initial, DestConnectionID: cc126c14fa7a4ef739138f61e528, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:04:13 server -> Sending packet 1 (37 bytes) for connection cc126c14fa7a4ef739138f61e528, Initial 2025/04/30 11:04:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8882db49, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:04:13 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:13 server <- Reading packet 2 (1280 bytes) for connection cc126c14fa7a4ef739138f61e528, Initial 2025/04/30 11:04:13 server Long Header{Type: Initial, DestConnectionID: cc126c14fa7a4ef739138f61e528, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 276, Offset + Data length: 276} 2025/04/30 11:04:13 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:04:13 server -> Sending packet 2 (1280 bytes) for connection cc126c14fa7a4ef739138f61e528, Initial 2025/04/30 11:04:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8882db49, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:13 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:13 server -> Sending packet 3 (1280 bytes) for connection cc126c14fa7a4ef739138f61e528, Initial 2025/04/30 11:04:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8882db49, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:13 server -> Sending packet 28 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:13 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:13 server -> Sending packet 29 (254 bytes) for connection 23d0d3cddf0ff9c2b25a5164bcd9b529c3da, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 server -> &wire.NewTokenFrame{Token: 0x4e0c38f3af585329da2de3c69d2b55cf07f203c1e513a34344c88030b43d98be1706e63c41a4e6aab0ff0e0b97be71aed3cb0d11057e3d9ed3aa1d0d1e4e0e2cd292a15e01f2b7164783a5ca0ec7d755c1a358a9f365} 2025/04/30 11:04:13 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:13 Removing connection ID 6ec9690979fcebd791b92edc150869 after it has been retired. 2025/04/30 11:04:13 server <- Reading packet 3 (1280 bytes) for connection 8882db49, Initial 2025/04/30 11:04:13 server Long Header{Type: Initial, DestConnectionID: 8882db49, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:04:13 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:13 Removing connection ID 9dd2bcb9 after it has been retired. 2025/04/30 11:04:13 Removing connection IDs [8001e0f3 99cb0fb5 d44b72ba] for a closed connection after it has been retired. 2025/04/30 11:04:13 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:04:13 server -> Sending packet 1 (744 bytes) for connection cc126c14fa7a4ef739138f61e528, Handshake 2025/04/30 11:04:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8882db49, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:04:13 server -> Sending packet 2 (744 bytes) for connection cc126c14fa7a4ef739138f61e528, Handshake 2025/04/30 11:04:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8882db49, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:04:13 server <- Reading packet 0 (75 bytes) for connection 8882db49, Handshake 2025/04/30 11:04:13 server Long Header{Type: Handshake, DestConnectionID: 8882db49, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/04/30 11:04:13 server Dropping Initial keys. 2025/04/30 11:04:13 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 11:04:13 server newly acked packets (1): [2] 2025/04/30 11:04:13 server updated RTT: 32.571007ms (σ: 16.285503ms) 2025/04/30 11:04:13 server Canceling loss detection timer. 2025/04/30 11:04:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 Retiring connection ID cc126c14fa7a4ef739138f61e528 in 5s. 2025/04/30 11:04:13 server Dropping Handshake keys. 2025/04/30 11:04:13 server <- Reading packet 0 (42 bytes) for connection 8882db49, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: 8882db49, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:13 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:13 server -> Sending packet 2 (331 bytes) for connection cc126c14fa7a4ef739138f61e528, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 333.482µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 server -> &wire.NewTokenFrame{Token: 0x765472f547a4783ae3bcea330e01d8c99da7eb10b6a18dac14d1ee3b6dbe661b9875e66c6ba160a5c28c51753b3a7577580af7f112e9adfe29af2306e4fc1a78b7dd469a70864865cba8ad9901a8bd184441f4ba879c} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 79187732, StatelessResetToken: 0xa2025852888171b26d143bc95c5f8868} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f2135b3, StatelessResetToken: 0xa6de1e5860ca5c1913ad5bd9c9a76bc8} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8b5193b5, StatelessResetToken: 0x6a6d1c57b7a75d293662def6610961f7} 2025/04/30 11:04:13 server -> Sending packet 3 (323 bytes) for connection cc126c14fa7a4ef739138f61e528, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 79187732, StatelessResetToken: 0xa2025852888171b26d143bc95c5f8868} 2025/04/30 11:04:13 Received request: GET /evklzdtmjy 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5f2135b3, StatelessResetToken: 0xa6de1e5860ca5c1913ad5bd9c9a76bc8} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8b5193b5, StatelessResetToken: 0x6a6d1c57b7a75d293662def6610961f7} 2025/04/30 11:04:13 server -> &wire.NewTokenFrame{Token: 0x765472f547a4783ae3bcea330e01d8c99da7eb10b6a18dac14d1ee3b6dbe661b9875e66c6ba160a5c28c51753b3a7577580af7f112e9adfe29af2306e4fc1a78b7dd469a70864865cba8ad9901a8bd184441f4ba879c} 2025/04/30 11:04:13 server -> Sending packet 4 (1045 bytes) for connection cc126c14fa7a4ef739138f61e528, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:13 server <- Reading packet 2 (31 bytes) for connection 79187732, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: 79187732, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 56µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 11:04:13 server newly acked packets (2): [3 4] 2025/04/30 11:04:13 server updated RTT: 32.519ms (σ: 12.317ms) 2025/04/30 11:04:13 server ECN capability confirmed. 2025/04/30 11:04:13 server Canceling loss detection timer. 2025/04/30 11:04:13 server -> Sending packet 5 (22 bytes) for connection cc126c14fa7a4ef739138f61e528, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:13 server <- Reading packet 3 (26 bytes) for connection 79187732, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: 79187732, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:13 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:13 Replacing connection for connection IDs [5f2135b3 8882db49 79187732 8b5193b5] with a closed connection. 2025/04/30 11:04:13 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:13 server Connection cc126c14fa7a4ef739138f61e528 closed. 2025/04/30 11:04:13 server <- Received Initial packet. 2025/04/30 11:04:13 Created qlog file: /logs/qlog/b7f67d03d16255592f876308ff7c.sqlog 2025/04/30 11:04:13 server Changing connection ID to 4409da52. 2025/04/30 11:04:13 Adding connection IDs b7f67d03d16255592f876308ff7c and 4409da52 for a new connection. 2025/04/30 11:04:13 server <- Reading packet 0 (1280 bytes) for connection b7f67d03d16255592f876308ff7c, Initial 2025/04/30 11:04:13 server Long Header{Type: Initial, DestConnectionID: b7f67d03d16255592f876308ff7c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/04/30 11:04:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 277, Offset + Data length: 277} 2025/04/30 11:04:13 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:13 Adding connection ID eb7d1b84. 2025/04/30 11:04:13 Adding connection ID be9f7ffb. 2025/04/30 11:04:13 Adding connection ID 57af0829. 2025/04/30 11:04:13 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b7f67d03d16255592f876308ff7c 2025/04/30 11:04:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4409da52, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 434, Version: v1} 2025/04/30 11:04:13 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4409da52, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: be9f7ffb, StatelessResetToken: 0x8b4928bdc57a4581ac56f81d71e1aeeb} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: eb7d1b84, StatelessResetToken: 0x6329b3aacc9bf58247d4d879b91a9c3e} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 57af0829, StatelessResetToken: 0x19827c91a25b965ae06574bf62addacd} 2025/04/30 11:04:13 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:04:13 server <- Reading packet 1 (1185 bytes) for connection eb7d1b84, Initial 2025/04/30 11:04:13 server Long Header{Type: Initial, DestConnectionID: eb7d1b84, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:13 server newly acked packets (1): [0] 2025/04/30 11:04:13 server updated RTT: 33.486207ms (σ: 16.743103ms) 2025/04/30 11:04:13 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:04:13 server <- Reading packet 0 (70 bytes) for connection eb7d1b84, Handshake 2025/04/30 11:04:13 server Long Header{Type: Handshake, DestConnectionID: eb7d1b84, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:13 server Dropping Initial keys. 2025/04/30 11:04:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 Retiring connection ID b7f67d03d16255592f876308ff7c in 5s. 2025/04/30 11:04:13 server Dropping Handshake keys. 2025/04/30 11:04:13 server <- Reading packet 0 (25 bytes) for connection eb7d1b84, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: eb7d1b84, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:13 Retiring connection ID 4409da52 in 5s. 2025/04/30 11:04:13 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:13 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:04:13 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:04:13 server <- Reading packet 1 (42 bytes) for connection eb7d1b84, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: eb7d1b84, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:13 server -> Sending packet 1 (256 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 Received request: GET /kvdepdsywc 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 438.749µs} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 server -> &wire.NewTokenFrame{Token: 0x60d091aaccf57195ad62446405c16b973d7b3869e95c5a891ce70502f52270b6725e17849dd2244b3158f25092f4f58c22eaaae7412ad8fb18d992ab19ad6c5af9bdea5a282359d18e0e8a038fbc536cfb8447e7f025} 2025/04/30 11:04:13 server <- Reading packet 2 (29 bytes) for connection eb7d1b84, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: eb7d1b84, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 760µs} 2025/04/30 11:04:13 server newly acked packets (1): [0] 2025/04/30 11:04:13 server updated RTT: 33.499ms (σ: 12.584ms) 2025/04/30 11:04:13 server -> Sending packet 2 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:13 Removing connection ID 5ade30b441ea3a109dae95043013babc02c9 after it has been retired. 2025/04/30 11:04:13 Removing connection ID 16cc2fa7 after it has been retired. 2025/04/30 11:04:13 server <- Reading packet 3 (32 bytes) for connection eb7d1b84, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: eb7d1b84, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.344ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:13 Removing connection IDs [e4c3f5a5 05efd8f2 9cf2ab29] for a closed connection after it has been retired. 2025/04/30 11:04:13 server newly acked packets (1): [1] 2025/04/30 11:04:13 server updated RTT: 36.371ms (σ: 15.182ms) 2025/04/30 11:04:13 server ECN capability confirmed. 2025/04/30 11:04:13 server Ignoring all packets below 2. 2025/04/30 11:04:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:13 server -> Sending packet 4 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:13 server -> Sending packet 5 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:13 server <- Reading packet 4 (33 bytes) for connection eb7d1b84, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: eb7d1b84, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 112µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:13 server -> Sending packet 22 (323 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a941edda, StatelessResetToken: 0x5387d68c19a68fb386bde14992e7448f} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b81e58d, StatelessResetToken: 0x77e22a63e85540a98d55eb11f603a9e0} 2025/04/30 11:04:13 server -> &wire.NewTokenFrame{Token: 0x42432b220a65aad352c01503df415b82eb209d62dd7b9c54df3224dcd02d020b45cc93103bb3b15bfb435a5f48c9613dbb86b81620158aff151b88e4f3fdec1d1105c3d8f8fa4c9f5f35b72b4d82877e5e6b8573b7ce} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 614eac2f, StatelessResetToken: 0xab9e50092544feaae1b1c48d2cef8041} 2025/04/30 11:04:13 server Skipping packet number 21 2025/04/30 11:04:13 server -> Sending packet 23 (1045 bytes) for connection d67ee5ac708ffd47, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:13 server -> Sending packet 27 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:13 server -> Sending packet 28 (1045 bytes) for connection aba5aca260a882f333a08623539a9c95, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:13 server -> Sending packet 23 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:13 server -> Sending packet 24 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:13 Removing connection ID ee0990a6f33a324c6bfb231ef350bc5d392ce9 after it has been retired. 2025/04/30 11:04:13 Removing connection ID d8e356a6 after it has been retired. 2025/04/30 11:04:13 Removing connection IDs [6b506de4 193c5d1b 8c2a387e] for a closed connection after it has been retired. 2025/04/30 11:04:13 server <- Received Initial packet. 2025/04/30 11:04:13 Created qlog file: /logs/qlog/954b73e08f6172fc0f009b94cd.sqlog 2025/04/30 11:04:13 server Changing connection ID to f4e6194c. 2025/04/30 11:04:13 Adding connection IDs 954b73e08f6172fc0f009b94cd and f4e6194c for a new connection. 2025/04/30 11:04:13 server <- Reading packet 1 (1280 bytes) for connection 954b73e08f6172fc0f009b94cd, Initial 2025/04/30 11:04:13 server Long Header{Type: Initial, DestConnectionID: 954b73e08f6172fc0f009b94cd, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/04/30 11:04:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 271, Offset + Data length: 271} 2025/04/30 11:04:13 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:04:13 Adding connection ID 12582679. 2025/04/30 11:04:13 Adding connection ID 90ece074. 2025/04/30 11:04:13 Adding connection ID 8b39a305. 2025/04/30 11:04:13 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 954b73e08f6172fc0f009b94cd 2025/04/30 11:04:13 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f4e6194c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 436, Version: v1} 2025/04/30 11:04:13 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:04:13 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f4e6194c, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8b39a305, StatelessResetToken: 0xc666183657ef1f68f3b628729e0c92f3} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 12582679, StatelessResetToken: 0xfb67a35775141384d659116a60284261} 2025/04/30 11:04:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 90ece074, StatelessResetToken: 0x5631650be3d99fafdc1e029a7e1cc70d} 2025/04/30 11:04:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 11:04:13 server -> Sending packet 7 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:13 server -> Sending packet 8 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:13 server -> Sending packet 9 (1366 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.PingFrame{} 2025/04/30 11:04:13 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:04:13 server <- Reading packet 3 (1185 bytes) for connection 12582679, Initial 2025/04/30 11:04:13 server Long Header{Type: Initial, DestConnectionID: 12582679, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:04:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:04:13 server newly acked packets (1): [0] 2025/04/30 11:04:13 server updated RTT: 33.388419ms (σ: 16.694209ms) 2025/04/30 11:04:13 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:04:13 server <- Reading packet 0 (70 bytes) for connection 12582679, Handshake 2025/04/30 11:04:13 server Long Header{Type: Handshake, DestConnectionID: 12582679, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:04:13 server Dropping Initial keys. 2025/04/30 11:04:13 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:04:13 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:04:13 Retiring connection ID 954b73e08f6172fc0f009b94cd in 5s. 2025/04/30 11:04:13 server Dropping Handshake keys. 2025/04/30 11:04:13 server <- Reading packet 0 (25 bytes) for connection 12582679, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: 12582679, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:13 Retiring connection ID f4e6194c in 5s. 2025/04/30 11:04:13 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:04:13 server -> Sending packet 1 (256 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 241.169µs} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 server -> &wire.NewTokenFrame{Token: 0xffae760639348ea1383713a2c33f4e08f68d4b4ab51c4194cb863dae8bf13ca5b4ebede458e127e2ae429d709a324672184a94ff19dd4793d93e7c44076214e7d860de5331550d09ecff35eaecadf81ddfdfcbac3bd1} 2025/04/30 11:04:13 server <- Reading packet 2 (29 bytes) for connection 12582679, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: 12582679, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 680µs} 2025/04/30 11:04:13 server newly acked packets (1): [0] 2025/04/30 11:04:13 server updated RTT: 33.404ms (σ: 12.552ms) 2025/04/30 11:04:13 Removing connection ID f8f6acd80593a60aeea19d8f22 after it has been retired. 2025/04/30 11:04:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:13 server -> Sending packet 3 (251 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 server -> &wire.NewTokenFrame{Token: 0xffae760639348ea1383713a2c33f4e08f68d4b4ab51c4194cb863dae8bf13ca5b4ebede458e127e2ae429d709a324672184a94ff19dd4793d93e7c44076214e7d860de5331550d09ecff35eaecadf81ddfdfcbac3bd1} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 server -> Sending packet 4 (251 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:13 server -> &wire.NewTokenFrame{Token: 0xffae760639348ea1383713a2c33f4e08f68d4b4ab51c4194cb863dae8bf13ca5b4ebede458e127e2ae429d709a324672184a94ff19dd4793d93e7c44076214e7d860de5331550d09ecff35eaecadf81ddfdfcbac3bd1} 2025/04/30 11:04:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:13 server <- Reading packet 3 (1366 bytes) for connection 12582679, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: 12582679, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.PingFrame{} 2025/04/30 11:04:13 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:13 server <- Reading packet 4 (33 bytes) for connection 12582679, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: 12582679, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 184µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:04:13 server <- Reading packet 5 (34 bytes) for connection 12582679, 1-RTT 2025/04/30 11:04:13 server Short Header{DestConnectionID: 12582679, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.248ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:04:13 server newly acked packets (1): [4] 2025/04/30 11:04:13 server updated RTT: 36.289ms (σ: 15.185ms) 2025/04/30 11:04:13 server ECN capability confirmed. 2025/04/30 11:04:13 server Canceling loss detection timer. 2025/04/30 11:04:13 server Sending ACK because the ACK timer expired. 2025/04/30 11:04:13 server -> Sending packet 5 (30 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:13 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:13 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 1.091493ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:04:14 Removing connection ID 617bf09eb577ad67717d44977d9868538b15 after it has been retired. 2025/04/30 11:04:14 Removing connection IDs [23d1f896 819f89bf 8cb88032 dbce0abb] for a closed connection after it has been retired. 2025/04/30 11:04:14 server <- Reading packet 7 (25 bytes) for connection 12582679, 1-RTT 2025/04/30 11:04:14 server Short Header{DestConnectionID: 12582679, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:04:14 server Queuing ACK because there's a new missing packet to report. 2025/04/30 11:04:14 server <- Reading packet 8 (42 bytes) for connection 12582679, 1-RTT 2025/04/30 11:04:14 server Short Header{DestConnectionID: 12582679, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:04:14 server -> Sending packet 6 (1366 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server -> &wire.PingFrame{} 2025/04/30 11:04:14 server -> Sending packet 7 (31 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 164.697µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 11:04:14 Received request: GET /gywquaxfds 2025/04/30 11:04:14 server -> Sending packet 8 (1045 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:14 server <- Reading packet 9 (1409 bytes) for connection 12582679, 1-RTT 2025/04/30 11:04:14 server Short Header{DestConnectionID: 12582679, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server <- &wire.PingFrame{} 2025/04/30 11:04:14 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:04:14 server <- Reading packet 10 (35 bytes) for connection 12582679, 1-RTT 2025/04/30 11:04:14 server Short Header{DestConnectionID: 12582679, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 192µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 11:04:14 server newly acked packets (1): [6] 2025/04/30 11:04:14 server Sending ACK because the ACK timer expired. 2025/04/30 11:04:14 server -> Sending packet 9 (32 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 7}, {Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.355553ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 11:04:14 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 11:04:14 server -> Sending packet 11 (1045 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:14 server -> Sending packet 12 (1045 bytes) for connection 954b73e08f6172fc0f009b94cd, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:14 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 11:04:14 server -> Sending packet 11 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:14 server -> Sending packet 12 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:14 server <- Reading packet 12 (26 bytes) for connection 12582679, 1-RTT 2025/04/30 11:04:14 server Short Header{DestConnectionID: 12582679, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:04:14 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:04:14 Replacing connection for connection IDs [8b39a305 12582679 90ece074] with a closed connection. 2025/04/30 11:04:14 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:04:14 server Connection 954b73e08f6172fc0f009b94cd closed. 2025/04/30 11:04:14 Tracking 102 connection IDs and 0 reset tokens. 2025/04/30 11:04:14 Removing connection ID e5d7c5f6 after it has been retired. 2025/04/30 11:04:14 Removing connection ID 00628a2e17ff4e531c22ca73aeea after it has been retired. 2025/04/30 11:04:14 Removing connection IDs [34c25270 7c7acec9 5bb510fe] for a closed connection after it has been retired. 2025/04/30 11:04:14 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:14 server -> Sending packet 28 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:14 server -> Sending packet 29 (22 bytes) for connection 917a91516493bd0ee1806e20e028bf7d7db271, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:14 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:14 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:15 Removing connection ID 43afd600d848a2694a after it has been retired. 2025/04/30 11:04:15 Removing connection ID afa23e99 after it has been retired. 2025/04/30 11:04:15 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 11:04:15 server -> Sending packet 14 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:15 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:15 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:15 server -> Sending packet 15 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:15 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:15 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:15 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:15 server -> Sending packet 25 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:15 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:15 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:15 server -> Sending packet 26 (1045 bytes) for connection f15686a4bb087d195aa53accedb2, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:15 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:15 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:15 Removing connection ID 962b1b5198ee6b2a70539b2f33dde1211d after it has been retired. 2025/04/30 11:04:15 Removing connection ID 3f0a3e78 after it has been retired. 2025/04/30 11:04:15 Removing connection IDs [be298371 cad309a2 01b5ab7f] for a closed connection after it has been retired. 2025/04/30 11:04:15 Removing connection ID 5421e18c after it has been retired. 2025/04/30 11:04:15 Removing connection ID 6732ec28cba69c12f4105de2 after it has been retired. 2025/04/30 11:04:16 Removing connection IDs [34dec8ed 56e9a0be f4f8cb14] for a closed connection after it has been retired. 2025/04/30 11:04:16 Removing connection ID 060663489778f634f053ebc6b3189fc7 after it has been retired. 2025/04/30 11:04:16 Removing connection ID 4f9b94d2 after it has been retired. 2025/04/30 11:04:16 Removing connection IDs [7e5d0f19 ca606cb3 9f615409] for a closed connection after it has been retired. 2025/04/30 11:04:16 Removing connection ID 3978336264ec6417 after it has been retired. 2025/04/30 11:04:16 Removing connection IDs [55d57cff c765aa66 8cf1ea6e 0d0eb9df] for a closed connection after it has been retired. 2025/04/30 11:04:16 Tracking 75 connection IDs and 0 reset tokens. 2025/04/30 11:04:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:16 server -> Sending packet 21 (248 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:16 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:16 server -> &wire.NewTokenFrame{Token: 0x8856b8f8d149f2fd1c1de6ef5b1a738b690fc9d9c2c50ebf2e4bb258205754902410452937a266071b322fbe69e78b73836b5b4a0f713dfe3a076785d2b041ce074eb2eafc115f6d250b3244ad00672019368c34becf} 2025/04/30 11:04:16 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:04:16 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:16 server Skipping packet number 20 2025/04/30 11:04:16 server -> Sending packet 22 (1045 bytes) for connection f8f6acd80593a60aeea19d8f22, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:16 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:16 server -> Sending packet 26 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:16 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:16 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:16 server -> Sending packet 27 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:16 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:16 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 11:04:17 server Skipping packet number 17 2025/04/30 11:04:17 server -> Sending packet 18 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:17 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:17 server -> Sending packet 19 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:17 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:17 server -> Sending packet 24 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:17 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:17 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:17 server -> Sending packet 25 (22 bytes) for connection 02e5c78bc423fa151d2c1c29e1c084, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:17 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:17 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:17 Removing connection ID d9b0ac925103b4dff54931ccc8d6 after it has been retired. 2025/04/30 11:04:17 Removing connection ID 587bc373 after it has been retired. 2025/04/30 11:04:17 Removing connection IDs [adca383d 0f7d70c9 358576eb] for a closed connection after it has been retired. 2025/04/30 11:04:17 Removing connection ID f1ccc4c9e5c1c8a98c after it has been retired. 2025/04/30 11:04:17 Removing connection ID a5363214 after it has been retired. 2025/04/30 11:04:17 Removing connection IDs [41c36c73 b5c0eda1 23d53dc8] for a closed connection after it has been retired. 2025/04/30 11:04:17 Removing connection ID 8c65fcd5 after it has been retired. 2025/04/30 11:04:17 Removing connection ID a45c9e1b711dbac6fb after it has been retired. 2025/04/30 11:04:17 Removing connection IDs [ab90a3c0 890e23cd d436e6b8] for a closed connection after it has been retired. 2025/04/30 11:04:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:18 server -> Sending packet 31 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:18 server Short Header{DestConnectionID: (empty), PacketNumber: 31, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:18 server -> Sending packet 32 (1045 bytes) for connection 1d8f8b2e316e48107d30e89cf8, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:18 server Short Header{DestConnectionID: (empty), PacketNumber: 32, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:18 Removing connection ID cc126c14fa7a4ef739138f61e528 after it has been retired. 2025/04/30 11:04:18 Removing connection IDs [5f2135b3 8882db49 79187732 8b5193b5] for a closed connection after it has been retired. 2025/04/30 11:04:18 Removing connection ID 4409da52 after it has been retired. 2025/04/30 11:04:18 Removing connection ID b7f67d03d16255592f876308ff7c after it has been retired. 2025/04/30 11:04:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:18 server -> Sending packet 24 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:18 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:18 server -> Sending packet 25 (1045 bytes) for connection 7fe3ac196fef8486de73cb, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:18 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:18 Tracking 53 connection IDs and 0 reset tokens. 2025/04/30 11:04:18 Removing connection ID f4e6194c after it has been retired. 2025/04/30 11:04:18 Removing connection ID 954b73e08f6172fc0f009b94cd after it has been retired. 2025/04/30 11:04:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:18 server -> Sending packet 24 (323 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:18 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5dc23813, StatelessResetToken: 0xb6ed21b580163ed741b8fc36115474f1} 2025/04/30 11:04:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:04:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 11:04:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 811f5fc4, StatelessResetToken: 0xbb3bf00bcca2736074d32614cf55e879} 2025/04/30 11:04:18 server -> &wire.NewTokenFrame{Token: 0x95d2f426e5f66bcddf0a31c176d2d8b45d0660202bbe0992200d0975f9c35344acdeb2b716b76d939c77a67f7f7c2fc4f10c3ec10abfa96d99206920e02430cdd990ceceb1fd95d63277c11cd8f1b7c703d76dc20f19} 2025/04/30 11:04:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 064f475d, StatelessResetToken: 0x04b640192126c8ad05cb0b0233ab1c36} 2025/04/30 11:04:18 server Skipping packet number 23 2025/04/30 11:04:18 server -> Sending packet 25 (1045 bytes) for connection 42d674afb3156a1517e1af, 1-RTT (ECN: Not-ECT) 2025/04/30 11:04:18 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:19 Removing connection IDs [8b39a305 12582679 90ece074] for a closed connection after it has been retired. 2025/04/30 11:04:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:19 server -> Sending packet 30 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:19 server Short Header{DestConnectionID: (empty), PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:19 server -> Sending packet 31 (1045 bytes) for connection 79a8d786d757b0ec0e8713, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:19 server Short Header{DestConnectionID: (empty), PacketNumber: 31, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:20 Tracking 48 connection IDs and 0 reset tokens. 2025/04/30 11:04:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 11:04:21 server -> Sending packet 21 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:21 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:21 server -> Sending packet 22 (1045 bytes) for connection b7f67d03d16255592f876308ff7c, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:21 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:04:22 Tracking 48 connection IDs and 0 reset tokens. 2025/04/30 11:04:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 11:04:23 server -> Sending packet 29 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:23 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:23 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 11:04:23 server -> Sending packet 30 (22 bytes) for connection 43afd600d848a2694a, 1-RTT (ECN: ECT(0)) 2025/04/30 11:04:23 server Short Header{DestConnectionID: (empty), PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:04:23 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101}