2025/09/12 02:06:36 Increased receive buffer size to 14336 kiB 2025/09/12 02:06:36 Increased send buffer size to 14336 kiB 2025/09/12 02:06:36 Setting DF for IPv4 and IPv6. 2025/09/12 02:06:36 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 02:06:36 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 02:06:36 server Listening for udp connections on [::]:443 2025/09/12 02:06:36 server Client offered version 0x57414954, sending Version Negotiation 2025/09/12 02:06:37 server <- Received Initial packet. 2025/09/12 02:06:37 Created qlog file: /logs/qlog/74671f2ef0ac84a63a376d7d9242882c840a88.sqlog 2025/09/12 02:06:37 server Changing connection ID to 04be7d3f. 2025/09/12 02:06:37 Adding connection IDs 74671f2ef0ac84a63a376d7d9242882c840a88 and 04be7d3f for a new connection. 2025/09/12 02:06:37 server <- Received Initial packet. 2025/09/12 02:06:37 server <- Reading packet 0 (1280 bytes) for connection 74671f2ef0ac84a63a376d7d9242882c840a88, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: 74671f2ef0ac84a63a376d7d9242882c840a88, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 02:06:37 server -> Sending packet 0 (37 bytes) for connection 74671f2ef0ac84a63a376d7d9242882c840a88, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 04be7d3f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:37 server <- Reading packet 1 (1280 bytes) for connection 74671f2ef0ac84a63a376d7d9242882c840a88, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: 74671f2ef0ac84a63a376d7d9242882c840a88, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 1229, Data length: 282, Offset + Data length: 1511} 2025/09/12 02:06:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:37 Adding connection ID b7492436. 2025/09/12 02:06:37 Adding connection ID 2c132287. 2025/09/12 02:06:37 Adding connection ID efc1b31e. 2025/09/12 02:06:37 server -> Sending packet 1 (1280 bytes) for connection 74671f2ef0ac84a63a376d7d9242882c840a88, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 04be7d3f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:37 server -> Sending packet 0 (852 bytes) for connection 74671f2ef0ac84a63a376d7d9242882c840a88, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 04be7d3f, PacketNumber: 0, PacketNumberLen: 2, Length: 748, Version: v1} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: efc1b31e, StatelessResetToken: 0x3088e920c9d60489b4a32d3dc7aec8ce} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b7492436, StatelessResetToken: 0x2dca4d9181b21d1fdcc752bce1d3644f} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2c132287, StatelessResetToken: 0x7720713028ed7eeb7114f683fd7365f8} 2025/09/12 02:06:37 server <- Reading packet 2 (1280 bytes) for connection 04be7d3f, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: 04be7d3f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:37 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:37 server newly acked packets (1): [1] 2025/09/12 02:06:37 server updated RTT: 33.11449ms (σ: 16.557245ms) 2025/09/12 02:06:37 server Queueing packet (29 bytes) for later decryption 2025/09/12 02:06:37 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:37 server -> Sending packet 1 (761 bytes) for connection 74671f2ef0ac84a63a376d7d9242882c840a88, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 04be7d3f, PacketNumber: 1, PacketNumberLen: 2, Length: 748, Version: v1} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/09/12 02:06:37 server -> Sending packet 2 (761 bytes) for connection 74671f2ef0ac84a63a376d7d9242882c840a88, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 04be7d3f, PacketNumber: 2, PacketNumberLen: 2, Length: 748, Version: v1} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/09/12 02:06:37 server <- Reading packet 2 (70 bytes) for connection b7492436, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: b7492436, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:37 server Dropping Initial keys. 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Dropping Handshake keys. 2025/09/12 02:06:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:37 server -> Sending packet 2 (360 bytes) for connection 74671f2ef0ac84a63a376d7d9242882c840a88, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: efc1b31e, StatelessResetToken: 0x3088e920c9d60489b4a32d3dc7aec8ce} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b7492436, StatelessResetToken: 0x2dca4d9181b21d1fdcc752bce1d3644f} 2025/09/12 02:06:37 server -> &wire.NewTokenFrame{Token: 0x3b4b80c3cc0e1148d385707176e4fe4cebe4bf0201b7a7af298ac0be500dd0b9e6f34fa0f29b1bbf8a6864e77ddb377553915a42b5c65d0d62d9fd5bbb5e53da1e480b2efdb38a600134545fe1a4ba5c96f679fafbaf3565dab8b4} 2025/09/12 02:06:37 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2c132287, StatelessResetToken: 0x7720713028ed7eeb7114f683fd7365f8} 2025/09/12 02:06:37 server -> Sending packet 3 (360 bytes) for connection 74671f2ef0ac84a63a376d7d9242882c840a88, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: efc1b31e, StatelessResetToken: 0x3088e920c9d60489b4a32d3dc7aec8ce} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b7492436, StatelessResetToken: 0x2dca4d9181b21d1fdcc752bce1d3644f} 2025/09/12 02:06:37 server -> &wire.NewTokenFrame{Token: 0x3b4b80c3cc0e1148d385707176e4fe4cebe4bf0201b7a7af298ac0be500dd0b9e6f34fa0f29b1bbf8a6864e77ddb377553915a42b5c65d0d62d9fd5bbb5e53da1e480b2efdb38a600134545fe1a4ba5c96f679fafbaf3565dab8b4} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2c132287, StatelessResetToken: 0x7720713028ed7eeb7114f683fd7365f8} 2025/09/12 02:06:37 server <- Reading packet 1 (29 bytes) for connection b7492436, 1-RTT 2025/09/12 02:06:37 server Short Header{DestConnectionID: b7492436, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 648µs} 2025/09/12 02:06:37 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/09/12 02:06:37 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/09/12 02:06:37 server <- Reading packet 4 (44 bytes) for connection b7492436, 1-RTT 2025/09/12 02:06:37 server Short Header{DestConnectionID: b7492436, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:37 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:37 server -> Sending packet 4 (29 bytes) for connection 74671f2ef0ac84a63a376d7d9242882c840a88, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 150.421µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:37 Received request: GET /folpufbqyb 2025/09/12 02:06:37 server -> Sending packet 5 (1045 bytes) for connection 74671f2ef0ac84a63a376d7d9242882c840a88, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:37 server <- Reading packet 6 (26 bytes) for connection b7492436, 1-RTT 2025/09/12 02:06:37 server Short Header{DestConnectionID: b7492436, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:37 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:37 Replacing connection for connection IDs [b7492436 2c132287 efc1b31e 74671f2ef0ac84a63a376d7d9242882c840a88 04be7d3f] with a closed connection. 2025/09/12 02:06:37 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:37 server Connection 74671f2ef0ac84a63a376d7d9242882c840a88 closed. 2025/09/12 02:06:37 server <- Received Initial packet. 2025/09/12 02:06:37 Created qlog file: /logs/qlog/ace84ea2edebf994e3bdf10e233854ccb6.sqlog 2025/09/12 02:06:37 server Changing connection ID to 5e894d3d. 2025/09/12 02:06:37 Adding connection IDs ace84ea2edebf994e3bdf10e233854ccb6 and 5e894d3d for a new connection. 2025/09/12 02:06:37 server <- Reading packet 0 (1280 bytes) for connection ace84ea2edebf994e3bdf10e233854ccb6, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: ace84ea2edebf994e3bdf10e233854ccb6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 02:06:37 server -> Sending packet 0 (37 bytes) for connection ace84ea2edebf994e3bdf10e233854ccb6, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5e894d3d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:37 server <- Reading packet 1 (1280 bytes) for connection ace84ea2edebf994e3bdf10e233854ccb6, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: ace84ea2edebf994e3bdf10e233854ccb6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 1231, Data length: 288, Offset + Data length: 1519} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:37 Adding connection ID 4dcb335b. 2025/09/12 02:06:37 Adding connection ID c4c202f3. 2025/09/12 02:06:37 Adding connection ID 419997db. 2025/09/12 02:06:37 server -> Sending packet 1 (1280 bytes) for connection ace84ea2edebf994e3bdf10e233854ccb6, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5e894d3d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:37 server -> Sending packet 0 (848 bytes) for connection ace84ea2edebf994e3bdf10e233854ccb6, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5e894d3d, PacketNumber: 0, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c4c202f3, StatelessResetToken: 0xf266b023ea14a021ef40762a92762243} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 419997db, StatelessResetToken: 0xa22e622e2e417d83dbd28a7cecc255ae} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4dcb335b, StatelessResetToken: 0x2de94463e519d526c27de4695bdf64ea} 2025/09/12 02:06:37 server <- Reading packet 2 (1280 bytes) for connection 5e894d3d, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: 5e894d3d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:37 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:37 server newly acked packets (1): [1] 2025/09/12 02:06:37 server updated RTT: 33.110821ms (σ: 16.55541ms) 2025/09/12 02:06:37 server Queueing packet (28 bytes) for later decryption 2025/09/12 02:06:37 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:37 server -> Sending packet 1 (757 bytes) for connection ace84ea2edebf994e3bdf10e233854ccb6, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5e894d3d, PacketNumber: 1, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:06:37 server -> Sending packet 2 (757 bytes) for connection ace84ea2edebf994e3bdf10e233854ccb6, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5e894d3d, PacketNumber: 2, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:06:37 server <- Reading packet 3 (38 bytes) for connection 4dcb335b, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: 4dcb335b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:37 server Dropping Initial keys. 2025/09/12 02:06:37 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:37 server newly acked packets (1): [2] 2025/09/12 02:06:37 server updated RTT: 32.99ms (σ: 12.655ms) 2025/09/12 02:06:37 server Canceling loss detection timer. 2025/09/12 02:06:37 server <- Reading packet 4 (70 bytes) for connection 4dcb335b, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: 4dcb335b, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Dropping Handshake keys. 2025/09/12 02:06:37 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:37 server -> Sending packet 2 (360 bytes) for connection ace84ea2edebf994e3bdf10e233854ccb6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:37 server -> &wire.NewTokenFrame{Token: 0x2f70e692d2923a00ec077ff27a80d54789eda47d9548d22daf3fa1272e281e0963c80f1747f6dc7d9ad174b71ca4b2320482c00d10bac1cecdaf993e2675a4b6f5e8c6f90985a3a968be837a229376a091c042a59c0495c6305cac} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4dcb335b, StatelessResetToken: 0x2de94463e519d526c27de4695bdf64ea} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 419997db, StatelessResetToken: 0xa22e622e2e417d83dbd28a7cecc255ae} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c4c202f3, StatelessResetToken: 0xf266b023ea14a021ef40762a92762243} 2025/09/12 02:06:37 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:37 server -> Sending packet 3 (360 bytes) for connection ace84ea2edebf994e3bdf10e233854ccb6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:37 server -> &wire.NewTokenFrame{Token: 0x2f70e692d2923a00ec077ff27a80d54789eda47d9548d22daf3fa1272e281e0963c80f1747f6dc7d9ad174b71ca4b2320482c00d10bac1cecdaf993e2675a4b6f5e8c6f90985a3a968be837a229376a091c042a59c0495c6305cac} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4dcb335b, StatelessResetToken: 0x2de94463e519d526c27de4695bdf64ea} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c4c202f3, StatelessResetToken: 0xf266b023ea14a021ef40762a92762243} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 419997db, StatelessResetToken: 0xa22e622e2e417d83dbd28a7cecc255ae} 2025/09/12 02:06:37 server <- Reading packet 1 (28 bytes) for connection 4dcb335b, 1-RTT 2025/09/12 02:06:37 server Short Header{DestConnectionID: 4dcb335b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 504µs} 2025/09/12 02:06:37 Removing connection IDs [b7492436 2c132287 efc1b31e 74671f2ef0ac84a63a376d7d9242882c840a88 04be7d3f] for a closed connection after it has been retired. 2025/09/12 02:06:37 server <- Reading packet 3 (54 bytes) for connection 4dcb335b, 1-RTT 2025/09/12 02:06:37 server Short Header{DestConnectionID: 4dcb335b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 104µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:37 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:37 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:37 server <- Reading packet 4 (44 bytes) for connection 4dcb335b, 1-RTT 2025/09/12 02:06:37 server Short Header{DestConnectionID: 4dcb335b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:37 Received request: GET /amfwllmzpo 2025/09/12 02:06:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:37 server -> Sending packet 4 (29 bytes) for connection ace84ea2edebf994e3bdf10e233854ccb6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 155.55µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:37 server -> Sending packet 5 (1045 bytes) for connection ace84ea2edebf994e3bdf10e233854ccb6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:37 server <- Reading packet 6 (35 bytes) for connection 4dcb335b, 1-RTT 2025/09/12 02:06:37 server Short Header{DestConnectionID: 4dcb335b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:37 server newly acked packets (2): [3 5] 2025/09/12 02:06:37 server updated RTT: 32.812ms (σ: 9.846ms) 2025/09/12 02:06:37 server ECN capability confirmed. 2025/09/12 02:06:37 server Canceling loss detection timer. 2025/09/12 02:06:37 server <- Reading packet 7 (26 bytes) for connection 4dcb335b, 1-RTT 2025/09/12 02:06:37 server Short Header{DestConnectionID: 4dcb335b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:37 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:37 Replacing connection for connection IDs [4dcb335b c4c202f3 419997db ace84ea2edebf994e3bdf10e233854ccb6 5e894d3d] with a closed connection. 2025/09/12 02:06:37 server Connection ace84ea2edebf994e3bdf10e233854ccb6 closed. 2025/09/12 02:06:37 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:37 server <- Received Initial packet. 2025/09/12 02:06:37 Created qlog file: /logs/qlog/1103f283826fa0e70f4ecbf3dcee.sqlog 2025/09/12 02:06:37 server Changing connection ID to 5d54e1c9. 2025/09/12 02:06:37 Adding connection IDs 1103f283826fa0e70f4ecbf3dcee and 5d54e1c9 for a new connection. 2025/09/12 02:06:37 server <- Reading packet 0 (1280 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: 1103f283826fa0e70f4ecbf3dcee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 02:06:37 server -> Sending packet 0 (37 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d54e1c9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:37 server <- Reading packet 1 (1280 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: 1103f283826fa0e70f4ecbf3dcee, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 1234, Data length: 279, Offset + Data length: 1513} 2025/09/12 02:06:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:37 Adding connection ID ecb02c2c. 2025/09/12 02:06:37 Adding connection ID 03b906fc. 2025/09/12 02:06:37 Adding connection ID a9894dd1. 2025/09/12 02:06:37 server -> Sending packet 1 (1280 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d54e1c9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:37 server -> Sending packet 0 (836 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5d54e1c9, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 03b906fc, StatelessResetToken: 0x6cd21eaf10897611dee6d810f286aad9} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ecb02c2c, StatelessResetToken: 0xa9ab2dc7c8b3bc4197ad40fe20d71969} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a9894dd1, StatelessResetToken: 0xea6ec80aecce3380ea5af3e419dc6416} 2025/09/12 02:06:37 server <- Reading packet 2 (1280 bytes) for connection 5d54e1c9, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: 5d54e1c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:37 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:37 server newly acked packets (1): [1] 2025/09/12 02:06:37 server updated RTT: 32.951533ms (σ: 16.475766ms) 2025/09/12 02:06:37 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:37 server -> Sending packet 1 (745 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5d54e1c9, PacketNumber: 1, PacketNumberLen: 2, Length: 732, Version: v1} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/09/12 02:06:37 server -> Sending packet 2 (745 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5d54e1c9, PacketNumber: 2, PacketNumberLen: 2, Length: 732, Version: v1} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/09/12 02:06:37 server <- Reading packet 3 (1280 bytes) for connection 5d54e1c9, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: 5d54e1c9, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:37 server <- &wire.PingFrame{} 2025/09/12 02:06:37 server -> Sending packet 2 (37 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d54e1c9, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:37 server <- Reading packet 0 (75 bytes) for connection 5d54e1c9, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: 5d54e1c9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:37 server Dropping Initial keys. 2025/09/12 02:06:37 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 02:06:37 server newly acked packets (1): [2] 2025/09/12 02:06:37 server updated RTT: 32.875ms (σ: 12.506ms) 2025/09/12 02:06:37 server Canceling loss detection timer. 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Dropping Handshake keys. 2025/09/12 02:06:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:37 server -> Sending packet 2 (360 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a9894dd1, StatelessResetToken: 0xea6ec80aecce3380ea5af3e419dc6416} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 03b906fc, StatelessResetToken: 0x6cd21eaf10897611dee6d810f286aad9} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ecb02c2c, StatelessResetToken: 0xa9ab2dc7c8b3bc4197ad40fe20d71969} 2025/09/12 02:06:37 server -> &wire.NewTokenFrame{Token: 0xcb0290e2d44c3f51214aa41a86e37d077920ba7591e7fa8fb4a6d5713e5d726beb47d3d9f25b66f5f565641d8eee6f9c264e06884586ce8c708855c9ffb93abcbe53a78e32ecd851c12ba2122f9ccbd1be2c648def3f1131c51b3a} 2025/09/12 02:06:37 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:37 server -> Sending packet 3 (360 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ecb02c2c, StatelessResetToken: 0xa9ab2dc7c8b3bc4197ad40fe20d71969} 2025/09/12 02:06:37 server -> &wire.NewTokenFrame{Token: 0xcb0290e2d44c3f51214aa41a86e37d077920ba7591e7fa8fb4a6d5713e5d726beb47d3d9f25b66f5f565641d8eee6f9c264e06884586ce8c708855c9ffb93abcbe53a78e32ecd851c12ba2122f9ccbd1be2c648def3f1131c51b3a} 2025/09/12 02:06:37 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a9894dd1, StatelessResetToken: 0xea6ec80aecce3380ea5af3e419dc6416} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 03b906fc, StatelessResetToken: 0x6cd21eaf10897611dee6d810f286aad9} 2025/09/12 02:06:37 server <- Reading packet 0 (42 bytes) for connection 5d54e1c9, 1-RTT 2025/09/12 02:06:37 server Short Header{DestConnectionID: 5d54e1c9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:37 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:37 server -> Sending packet 4 (27 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 309.076µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:37 Received request: GET /icphmsucem 2025/09/12 02:06:37 server -> Sending packet 5 (1045 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:37 server <- Reading packet 1 (33 bytes) for connection ecb02c2c, 1-RTT 2025/09/12 02:06:37 server Short Header{DestConnectionID: ecb02c2c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 104µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:37 server newly acked packets (1): [3] 2025/09/12 02:06:37 server updated RTT: 32.691ms (σ: 9.746ms) 2025/09/12 02:06:37 server ECN capability confirmed. 2025/09/12 02:06:37 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:37 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:37 server <- Reading packet 2 (33 bytes) for connection ecb02c2c, 1-RTT 2025/09/12 02:06:37 server Short Header{DestConnectionID: ecb02c2c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:37 server newly acked packets (1): [5] 2025/09/12 02:06:37 server updated RTT: 32.586ms (σ: 7.518ms) 2025/09/12 02:06:37 server Canceling loss detection timer. 2025/09/12 02:06:37 server -> Sending packet 6 (30 bytes) for connection 1103f283826fa0e70f4ecbf3dcee, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 78.707µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:37 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:37 server <- Reading packet 3 (26 bytes) for connection ecb02c2c, 1-RTT 2025/09/12 02:06:37 server Short Header{DestConnectionID: ecb02c2c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:37 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:37 Replacing connection for connection IDs [03b906fc a9894dd1 ecb02c2c 5d54e1c9 1103f283826fa0e70f4ecbf3dcee] with a closed connection. 2025/09/12 02:06:37 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:37 server Connection 1103f283826fa0e70f4ecbf3dcee closed. 2025/09/12 02:06:37 server <- Received Initial packet. 2025/09/12 02:06:37 Created qlog file: /logs/qlog/fbf8723e1dff404d0c.sqlog 2025/09/12 02:06:37 server Changing connection ID to 3020d63e. 2025/09/12 02:06:37 Adding connection IDs fbf8723e1dff404d0c and 3020d63e for a new connection. 2025/09/12 02:06:37 server <- Reading packet 0 (1280 bytes) for connection fbf8723e1dff404d0c, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: fbf8723e1dff404d0c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:37 server -> Sending packet 0 (37 bytes) for connection fbf8723e1dff404d0c, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3020d63e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:37 Removing connection IDs [4dcb335b c4c202f3 419997db ace84ea2edebf994e3bdf10e233854ccb6 5e894d3d] for a closed connection after it has been retired. 2025/09/12 02:06:37 server <- Reading packet 2 (1280 bytes) for connection 3020d63e, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: 3020d63e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:37 server <- &wire.CryptoFrame{Offset: 1239, Data length: 273, Offset + Data length: 1512} 2025/09/12 02:06:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:37 Adding connection ID cfd957ff. 2025/09/12 02:06:37 Adding connection ID 4ce21357. 2025/09/12 02:06:37 Adding connection ID 86de6c9c. 2025/09/12 02:06:37 server -> Sending packet 1 (1280 bytes) for connection fbf8723e1dff404d0c, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3020d63e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:37 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:37 server -> Sending packet 0 (840 bytes) for connection fbf8723e1dff404d0c, Handshake 2025/09/12 02:06:37 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3020d63e, PacketNumber: 0, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 02:06:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 02:06:37 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cfd957ff, StatelessResetToken: 0x6a8033971c8035c6b83f7268b4b93f9e} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4ce21357, StatelessResetToken: 0xff3ccf8688f7972687b4b938a5b024d6} 2025/09/12 02:06:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 86de6c9c, StatelessResetToken: 0x9d09b1e42b2750bfb81f70c442b45417} 2025/09/12 02:06:37 server <- Reading packet 4 (1280 bytes) for connection 3020d63e, Initial 2025/09/12 02:06:37 server Long Header{Type: Initial, DestConnectionID: 3020d63e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:37 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:37 server newly acked packets (1): [1] 2025/09/12 02:06:37 server updated RTT: 32.947347ms (σ: 16.473673ms) 2025/09/12 02:06:38 Removing connection IDs [03b906fc a9894dd1 ecb02c2c 5d54e1c9 1103f283826fa0e70f4ecbf3dcee] for a closed connection after it has been retired. 2025/09/12 02:06:38 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:38 server -> Sending packet 1 (749 bytes) for connection fbf8723e1dff404d0c, Handshake 2025/09/12 02:06:38 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3020d63e, PacketNumber: 1, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 02:06:38 server -> Sending packet 2 (749 bytes) for connection fbf8723e1dff404d0c, Handshake 2025/09/12 02:06:38 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3020d63e, PacketNumber: 2, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 02:06:38 server <- Reading packet 0 (75 bytes) for connection 3020d63e, Handshake 2025/09/12 02:06:38 server Long Header{Type: Handshake, DestConnectionID: 3020d63e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:38 server Dropping Initial keys. 2025/09/12 02:06:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Dropping Handshake keys. 2025/09/12 02:06:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:38 server -> Sending packet 2 (360 bytes) for connection fbf8723e1dff404d0c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cfd957ff, StatelessResetToken: 0x6a8033971c8035c6b83f7268b4b93f9e} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 86de6c9c, StatelessResetToken: 0x9d09b1e42b2750bfb81f70c442b45417} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:38 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:38 server -> &wire.NewTokenFrame{Token: 0x38fdc99674558dcc618b74e3d5ec1f912b47428d29f3c083ebdf104c12d3c27549d85f63cbf7a5c0f40ef8ebdf8550b1025f1af5b7e224cf4ace81d51846eac716fb9b5ea1a385eb9074842b84ded0d0648f0d10a1cc022a4250c3} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4ce21357, StatelessResetToken: 0xff3ccf8688f7972687b4b938a5b024d6} 2025/09/12 02:06:38 server -> Sending packet 3 (360 bytes) for connection fbf8723e1dff404d0c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4ce21357, StatelessResetToken: 0xff3ccf8688f7972687b4b938a5b024d6} 2025/09/12 02:06:38 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:38 server -> &wire.NewTokenFrame{Token: 0x38fdc99674558dcc618b74e3d5ec1f912b47428d29f3c083ebdf104c12d3c27549d85f63cbf7a5c0f40ef8ebdf8550b1025f1af5b7e224cf4ace81d51846eac716fb9b5ea1a385eb9074842b84ded0d0648f0d10a1cc022a4250c3} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cfd957ff, StatelessResetToken: 0x6a8033971c8035c6b83f7268b4b93f9e} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 86de6c9c, StatelessResetToken: 0x9d09b1e42b2750bfb81f70c442b45417} 2025/09/12 02:06:38 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/09/12 02:06:38 server <- Reading packet 3 (42 bytes) for connection cfd957ff, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: cfd957ff, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:38 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:38 server <- Reading packet 4 (25 bytes) for connection cfd957ff, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: cfd957ff, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 Received request: GET /wgiwiwbgsg 2025/09/12 02:06:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:38 server -> Sending packet 4 (27 bytes) for connection fbf8723e1dff404d0c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 195.204µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:38 server -> Sending packet 5 (1045 bytes) for connection fbf8723e1dff404d0c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:38 server <- Reading packet 5 (26 bytes) for connection cfd957ff, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: cfd957ff, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:38 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:38 Replacing connection for connection IDs [cfd957ff 4ce21357 86de6c9c fbf8723e1dff404d0c 3020d63e] with a closed connection. 2025/09/12 02:06:38 server Connection fbf8723e1dff404d0c closed. 2025/09/12 02:06:38 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:38 server <- Received Initial packet. 2025/09/12 02:06:38 Created qlog file: /logs/qlog/6fe801903f3064da8237.sqlog 2025/09/12 02:06:38 server Changing connection ID to 136df5ef. 2025/09/12 02:06:38 Adding connection IDs 6fe801903f3064da8237 and 136df5ef for a new connection. 2025/09/12 02:06:38 server <- Reading packet 0 (1280 bytes) for connection 6fe801903f3064da8237, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: 6fe801903f3064da8237, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 02:06:38 server -> Sending packet 0 (37 bytes) for connection 6fe801903f3064da8237, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 136df5ef, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:38 server <- Reading packet 1 (1280 bytes) for connection 6fe801903f3064da8237, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: 6fe801903f3064da8237, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 1238, Data length: 266, Offset + Data length: 1504} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:38 Adding connection ID e0787859. 2025/09/12 02:06:38 Adding connection ID b84aee3a. 2025/09/12 02:06:38 Adding connection ID 96125fff. 2025/09/12 02:06:38 server -> Sending packet 1 (1280 bytes) for connection 6fe801903f3064da8237, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 136df5ef, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:38 server -> Sending packet 0 (837 bytes) for connection 6fe801903f3064da8237, Handshake 2025/09/12 02:06:38 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 136df5ef, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e0787859, StatelessResetToken: 0x42ae5ac23d01f1736f46d52143f5e5ed} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 96125fff, StatelessResetToken: 0x9a22ec89ebe7c69f87e38d79e1c89507} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b84aee3a, StatelessResetToken: 0xfa9eba38cf656aeff6c61f17a9475006} 2025/09/12 02:06:38 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:38 server <- Reading packet 0 (75 bytes) for connection e0787859, Handshake 2025/09/12 02:06:38 server Long Header{Type: Handshake, DestConnectionID: e0787859, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:38 server Dropping Initial keys. 2025/09/12 02:06:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:38 server newly acked packets (1): [0] 2025/09/12 02:06:38 server updated RTT: 33.090344ms (σ: 16.545172ms) 2025/09/12 02:06:38 server Canceling loss detection timer. 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Dropping Handshake keys. 2025/09/12 02:06:38 server <- Reading packet 0 (25 bytes) for connection e0787859, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: e0787859, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:38 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:38 server -> Sending packet 1 (293 bytes) for connection 6fe801903f3064da8237, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 290.262µs} 2025/09/12 02:06:38 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:38 server -> &wire.NewTokenFrame{Token: 0xcf5fd203a24535f16c7aba0b73a9c4b976fd43322a3579e177e880c19a741593be42bcb1a3bc62833fc529df5daa9cfbc81a25e25041065310196eaf01b149f74d54f979ed872954043d57c5821bc5408a30dc9dac35b2a1f03e18} 2025/09/12 02:06:38 server <- Reading packet 2 (32 bytes) for connection e0787859, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: e0787859, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.328ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:38 server newly acked packets (2): [0 1] 2025/09/12 02:06:38 server updated RTT: 35.982ms (σ: 18.193ms) 2025/09/12 02:06:38 server ECN capability confirmed. 2025/09/12 02:06:38 server Canceling loss detection timer. 2025/09/12 02:06:38 server Ignoring all packets below 1. 2025/09/12 02:06:38 server <- Reading packet 5 (42 bytes) for connection e0787859, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: e0787859, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:38 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:38 server -> Sending packet 2 (29 bytes) for connection 6fe801903f3064da8237, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 107.06µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:38 Received request: GET /otxpbeizsl 2025/09/12 02:06:38 server -> Sending packet 3 (1045 bytes) for connection 6fe801903f3064da8237, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:38 server -> Sending packet 5 (1045 bytes) for connection 6fe801903f3064da8237, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:38 server -> Sending packet 6 (1045 bytes) for connection 6fe801903f3064da8237, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:38 server -> Sending packet 7 (1366 bytes) for connection 6fe801903f3064da8237, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.PingFrame{} 2025/09/12 02:06:38 Removing connection IDs [cfd957ff 4ce21357 86de6c9c fbf8723e1dff404d0c 3020d63e] for a closed connection after it has been retired. 2025/09/12 02:06:38 server <- Reading packet 6 (1366 bytes) for connection e0787859, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: e0787859, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.PingFrame{} 2025/09/12 02:06:38 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:38 server <- Reading packet 7 (33 bytes) for connection e0787859, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: e0787859, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 168µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:38 server <- Reading packet 8 (26 bytes) for connection e0787859, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: e0787859, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:38 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:38 Replacing connection for connection IDs [b84aee3a 96125fff e0787859 6fe801903f3064da8237 136df5ef] with a closed connection. 2025/09/12 02:06:38 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:38 server Connection 6fe801903f3064da8237 closed. 2025/09/12 02:06:38 server <- Received Initial packet. 2025/09/12 02:06:38 Created qlog file: /logs/qlog/0f2c72d323569b8f.sqlog 2025/09/12 02:06:38 server Changing connection ID to a307d357. 2025/09/12 02:06:38 Adding connection IDs 0f2c72d323569b8f and a307d357 for a new connection. 2025/09/12 02:06:38 server <- Reading packet 0 (1280 bytes) for connection 0f2c72d323569b8f, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: 0f2c72d323569b8f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:38 server -> Sending packet 0 (37 bytes) for connection 0f2c72d323569b8f, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a307d357, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:38 server <- Reading packet 1 (1280 bytes) for connection 0f2c72d323569b8f, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: 0f2c72d323569b8f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 1240, Data length: 272, Offset + Data length: 1512} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:38 Adding connection ID 28841ec7. 2025/09/12 02:06:38 Adding connection ID 93e47a50. 2025/09/12 02:06:38 Adding connection ID 732a06f1. 2025/09/12 02:06:38 server -> Sending packet 1 (1280 bytes) for connection 0f2c72d323569b8f, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a307d357, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:38 server -> Sending packet 0 (830 bytes) for connection 0f2c72d323569b8f, Handshake 2025/09/12 02:06:38 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a307d357, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 732a06f1, StatelessResetToken: 0x8d53591bfa26b8468c48a89a19bf270c} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 93e47a50, StatelessResetToken: 0xf5cc55106ee28972668a36e078a93be4} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 28841ec7, StatelessResetToken: 0xefe95fe663022920c6054f65fcd3d24e} 2025/09/12 02:06:38 server <- Reading packet 2 (1280 bytes) for connection a307d357, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: a307d357, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:38 server newly acked packets (1): [1] 2025/09/12 02:06:38 server updated RTT: 33.111644ms (σ: 16.555822ms) 2025/09/12 02:06:38 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:38 server <- Reading packet 0 (75 bytes) for connection 28841ec7, Handshake 2025/09/12 02:06:38 server Long Header{Type: Handshake, DestConnectionID: 28841ec7, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:38 server Dropping Initial keys. 2025/09/12 02:06:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:38 server newly acked packets (1): [0] 2025/09/12 02:06:38 server updated RTT: 33.106ms (σ: 12.426ms) 2025/09/12 02:06:38 server Canceling loss detection timer. 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Dropping Handshake keys. 2025/09/12 02:06:38 server <- Reading packet 0 (25 bytes) for connection 28841ec7, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: 28841ec7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:38 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:38 server <- Reading packet 1 (28 bytes) for connection 28841ec7, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: 28841ec7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 464µs} 2025/09/12 02:06:38 server newly acked packets (1): [0] 2025/09/12 02:06:38 server updated RTT: 33.11ms (σ: 9.327ms) 2025/09/12 02:06:38 server Canceling loss detection timer. 2025/09/12 02:06:38 server -> Sending packet 1 (296 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 350.879µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:38 server -> &wire.NewTokenFrame{Token: 0x46a5c32f3cd8b5ba9502153fb2381d15246e323279eeefac7d34c77ef2cd3866fc358bb9ee5ea9b3f786c746c34947774d98e6f7bc7e4dfa622d63b153600e3e21e92c584f52f44dbc2dbd54ed7ff060bb275f6603096ac151239d} 2025/09/12 02:06:38 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:38 server <- Reading packet 2 (42 bytes) for connection 28841ec7, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: 28841ec7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:38 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:38 Received request: GET /mwflwkbqod 2025/09/12 02:06:38 server -> Sending packet 2 (1053 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 501.144µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:38 server <- Reading packet 3 (32 bytes) for connection 28841ec7, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: 28841ec7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.336ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:38 server newly acked packets (1): [1] 2025/09/12 02:06:38 server updated RTT: 36.012ms (σ: 12.799ms) 2025/09/12 02:06:38 server ECN capability confirmed. 2025/09/12 02:06:38 server Ignoring all packets below 2. 2025/09/12 02:06:38 server <- Reading packet 6 (42 bytes) for connection 28841ec7, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: 28841ec7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:38 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:38 server -> Sending packet 3 (29 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 86.912µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:06:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:38 server -> Sending packet 5 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:38 server -> Sending packet 6 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:38 server <- Received Initial packet. 2025/09/12 02:06:38 Created qlog file: /logs/qlog/9ba3aee6d9db97e587.sqlog 2025/09/12 02:06:38 server Changing connection ID to ec28929f. 2025/09/12 02:06:38 Adding connection IDs 9ba3aee6d9db97e587 and ec28929f for a new connection. 2025/09/12 02:06:38 server <- Reading packet 0 (1280 bytes) for connection 9ba3aee6d9db97e587, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: 9ba3aee6d9db97e587, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 02:06:38 server -> Sending packet 0 (37 bytes) for connection 9ba3aee6d9db97e587, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec28929f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:38 server <- Reading packet 2 (1280 bytes) for connection ec28929f, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: ec28929f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 1239, Data length: 280, Offset + Data length: 1519} 2025/09/12 02:06:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:38 Adding connection ID 8f436c80. 2025/09/12 02:06:38 Adding connection ID 6f763819. 2025/09/12 02:06:38 Adding connection ID f857ad67. 2025/09/12 02:06:38 server -> Sending packet 1 (1280 bytes) for connection 9ba3aee6d9db97e587, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: ec28929f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:38 server -> Sending packet 0 (828 bytes) for connection 9ba3aee6d9db97e587, Handshake 2025/09/12 02:06:38 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ec28929f, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6f763819, StatelessResetToken: 0x37fa09fce0356a8e8d63e6d6e275c841} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8f436c80, StatelessResetToken: 0x5c7aa08e54899b6dbb2d1f1950c7b13a} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f857ad67, StatelessResetToken: 0x8105778f8dddb7d669588d386cc443d2} 2025/09/12 02:06:38 Removing connection ID 0f2c72d323569b8f. 2025/09/12 02:06:38 Removing connection ID a307d357. 2025/09/12 02:06:38 server -> Sending packet 7 (1366 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.PingFrame{} 2025/09/12 02:06:38 server <- Reading packet 4 (1280 bytes) for connection ec28929f, Initial 2025/09/12 02:06:38 server Long Header{Type: Initial, DestConnectionID: ec28929f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:38 server newly acked packets (1): [1] 2025/09/12 02:06:38 server updated RTT: 33.05835ms (σ: 16.529175ms) 2025/09/12 02:06:38 server Queueing packet (47 bytes) for later decryption 2025/09/12 02:06:38 Removing connection IDs [b84aee3a 96125fff e0787859 6fe801903f3064da8237 136df5ef] for a closed connection after it has been retired. 2025/09/12 02:06:38 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:38 server -> Sending packet 1 (737 bytes) for connection 9ba3aee6d9db97e587, Handshake 2025/09/12 02:06:38 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ec28929f, PacketNumber: 1, PacketNumberLen: 2, Length: 724, Version: v1} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/09/12 02:06:38 server -> Sending packet 2 (737 bytes) for connection 9ba3aee6d9db97e587, Handshake 2025/09/12 02:06:38 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: ec28929f, PacketNumber: 2, PacketNumberLen: 2, Length: 724, Version: v1} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/09/12 02:06:38 server <- Reading packet 1 (70 bytes) for connection 8f436c80, Handshake 2025/09/12 02:06:38 server Long Header{Type: Handshake, DestConnectionID: 8f436c80, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:38 server Dropping Initial keys. 2025/09/12 02:06:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:38 server Dropping Handshake keys. 2025/09/12 02:06:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:38 server -> Sending packet 2 (360 bytes) for connection 9ba3aee6d9db97e587, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8f436c80, StatelessResetToken: 0x5c7aa08e54899b6dbb2d1f1950c7b13a} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:38 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:38 server -> &wire.NewTokenFrame{Token: 0x478aed5f427aeba4782a0379d984e098d0bb1b4a06ae0b04e9654260720ee68779d135c99e41a62c8d4e6c5e07f40298248d7c79623eb3fe66d95f2f952ecf416f63f965b7e55c1630139f52f1c08ab1bc1cb71a5a29b52f1112bb} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6f763819, StatelessResetToken: 0x37fa09fce0356a8e8d63e6d6e275c841} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f857ad67, StatelessResetToken: 0x8105778f8dddb7d669588d386cc443d2} 2025/09/12 02:06:38 server -> Sending packet 3 (360 bytes) for connection 9ba3aee6d9db97e587, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f857ad67, StatelessResetToken: 0x8105778f8dddb7d669588d386cc443d2} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8f436c80, StatelessResetToken: 0x5c7aa08e54899b6dbb2d1f1950c7b13a} 2025/09/12 02:06:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6f763819, StatelessResetToken: 0x37fa09fce0356a8e8d63e6d6e275c841} 2025/09/12 02:06:38 server -> &wire.NewTokenFrame{Token: 0x478aed5f427aeba4782a0379d984e098d0bb1b4a06ae0b04e9654260720ee68779d135c99e41a62c8d4e6c5e07f40298248d7c79623eb3fe66d95f2f952ecf416f63f965b7e55c1630139f52f1c08ab1bc1cb71a5a29b52f1112bb} 2025/09/12 02:06:38 server <- Reading packet 1 (47 bytes) for connection 8f436c80, 1-RTT 2025/09/12 02:06:38 server Short Header{DestConnectionID: 8f436c80, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 480µs} 2025/09/12 02:06:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:38 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:38 server -> Sending packet 4 (28 bytes) for connection 9ba3aee6d9db97e587, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 96.309387ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:38 Received request: GET /sszcsgxksh 2025/09/12 02:06:38 server -> Sending packet 5 (1045 bytes) for connection 9ba3aee6d9db97e587, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:38 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:39 server <- Reading packet 3 (35 bytes) for connection 8f436c80, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: 8f436c80, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 144µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:39 server newly acked packets (1): [3] 2025/09/12 02:06:39 server updated RTT: 32.865ms (σ: 12.781ms) 2025/09/12 02:06:39 server ECN capability confirmed. 2025/09/12 02:06:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:39 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:39 server <- Reading packet 4 (42 bytes) for connection 8f436c80, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: 8f436c80, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:39 server -> Sending packet 6 (29 bytes) for connection 9ba3aee6d9db97e587, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 116.818µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:39 server -> Sending packet 9 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:39 server -> Sending packet 10 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:39 server -> Sending packet 8 (1045 bytes) for connection 9ba3aee6d9db97e587, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:39 server -> Sending packet 9 (1045 bytes) for connection 9ba3aee6d9db97e587, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:39 server <- Reading packet 6 (26 bytes) for connection 8f436c80, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: 8f436c80, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:39 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:39 Replacing connection for connection IDs [8f436c80 6f763819 f857ad67 ec28929f 9ba3aee6d9db97e587] with a closed connection. 2025/09/12 02:06:39 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:39 server Connection 9ba3aee6d9db97e587 closed. 2025/09/12 02:06:39 server <- Received Initial packet. 2025/09/12 02:06:39 Created qlog file: /logs/qlog/1073572e6427ccfa20ceb177203644.sqlog 2025/09/12 02:06:39 server Changing connection ID to 8bea596e. 2025/09/12 02:06:39 Adding connection IDs 1073572e6427ccfa20ceb177203644 and 8bea596e for a new connection. 2025/09/12 02:06:39 server <- Reading packet 0 (1280 bytes) for connection 1073572e6427ccfa20ceb177203644, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: 1073572e6427ccfa20ceb177203644, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 67, Data length: 1166, Offset + Data length: 1233} 2025/09/12 02:06:39 server -> Sending packet 0 (37 bytes) for connection 1073572e6427ccfa20ceb177203644, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8bea596e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:39 server <- Reading packet 1 (1280 bytes) for connection 1073572e6427ccfa20ceb177203644, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: 1073572e6427ccfa20ceb177203644, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1255, Version: v1} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 1233, Data length: 271, Offset + Data length: 1504} 2025/09/12 02:06:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:39 Adding connection ID dadf9f2e. 2025/09/12 02:06:39 Adding connection ID 968c21bc. 2025/09/12 02:06:39 Adding connection ID dc9a3a0f. 2025/09/12 02:06:39 server -> Sending packet 1 (1280 bytes) for connection 1073572e6427ccfa20ceb177203644, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8bea596e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:39 server -> Sending packet 0 (838 bytes) for connection 1073572e6427ccfa20ceb177203644, Handshake 2025/09/12 02:06:39 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 8bea596e, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dadf9f2e, StatelessResetToken: 0xf0e4288e5b006a7aeef83a461e40329d} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 968c21bc, StatelessResetToken: 0x6d14608d2df6ca89d7ea6fa5750435cc} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dc9a3a0f, StatelessResetToken: 0xa984fab085a02ad64a466052fcd4ad7c} 2025/09/12 02:06:39 server <- Reading packet 3 (1280 bytes) for connection 8bea596e, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: 8bea596e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 1233, Data length: 271, Offset + Data length: 1504} 2025/09/12 02:06:39 server -> Sending packet 2 (39 bytes) for connection 1073572e6427ccfa20ceb177203644, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8bea596e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:39 server -> Sending packet 3 (1280 bytes) for connection 1073572e6427ccfa20ceb177203644, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8bea596e, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:39 server -> Sending packet 4 (1280 bytes) for connection 1073572e6427ccfa20ceb177203644, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 8bea596e, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:39 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 44 bytes. 2025/09/12 02:06:39 server <- Reading packet 0 (75 bytes) for connection dadf9f2e, Handshake 2025/09/12 02:06:39 server Long Header{Type: Handshake, DestConnectionID: dadf9f2e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:39 server Dropping Initial keys. 2025/09/12 02:06:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:39 server newly acked packets (1): [0] 2025/09/12 02:06:39 server updated RTT: 233.503216ms (σ: 116.751608ms) 2025/09/12 02:06:39 server Canceling loss detection timer. 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Dropping Handshake keys. 2025/09/12 02:06:39 server <- Reading packet 0 (44 bytes) for connection dadf9f2e, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: dadf9f2e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:39 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:39 server -> Sending packet 1 (293 bytes) for connection 1073572e6427ccfa20ceb177203644, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 304.218µs} 2025/09/12 02:06:39 server -> &wire.NewTokenFrame{Token: 0xf41ec4ea688985499e3eac491ce9029ac61f0dabc68f490ec83451f2eedd93546a03db8c89de20c6a00e66c5a3cd573d5cc772a20dd1ec55a3ea1beb09ea28f60d4cf0149e3ecf9e8f22025c594b40a5c127f5a87b1e51a374c90f} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:39 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:39 Received request: GET /xxshkmsjgg 2025/09/12 02:06:39 server <- Reading packet 1 (31 bytes) for connection dadf9f2e, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: dadf9f2e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.48ms} 2025/09/12 02:06:39 server newly acked packets (1): [0] 2025/09/12 02:06:39 server updated RTT: 233.528ms (σ: 87.613ms) 2025/09/12 02:06:39 server -> Sending packet 2 (1045 bytes) for connection 1073572e6427ccfa20ceb177203644, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:39 Removing connection IDs [8f436c80 6f763819 f857ad67 ec28929f 9ba3aee6d9db97e587] for a closed connection after it has been retired. 2025/09/12 02:06:39 server <- Reading packet 3 (26 bytes) for connection dadf9f2e, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: dadf9f2e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:39 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:39 Replacing connection for connection IDs [dadf9f2e 968c21bc dc9a3a0f 1073572e6427ccfa20ceb177203644 8bea596e] with a closed connection. 2025/09/12 02:06:39 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:39 server Connection 1073572e6427ccfa20ceb177203644 closed. 2025/09/12 02:06:39 server <- Received Initial packet. 2025/09/12 02:06:39 Created qlog file: /logs/qlog/a28e94cb86a2bdfab516e5f8e224567c.sqlog 2025/09/12 02:06:39 server Changing connection ID to 79c3ada1. 2025/09/12 02:06:39 Adding connection IDs a28e94cb86a2bdfab516e5f8e224567c and 79c3ada1 for a new connection. 2025/09/12 02:06:39 server <- Reading packet 0 (1280 bytes) for connection a28e94cb86a2bdfab516e5f8e224567c, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: a28e94cb86a2bdfab516e5f8e224567c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 02:06:39 server -> Sending packet 0 (37 bytes) for connection a28e94cb86a2bdfab516e5f8e224567c, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 79c3ada1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:39 server <- Reading packet 1 (1280 bytes) for connection a28e94cb86a2bdfab516e5f8e224567c, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: a28e94cb86a2bdfab516e5f8e224567c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 1232, Data length: 286, Offset + Data length: 1518} 2025/09/12 02:06:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:39 Adding connection ID a66a8b5d. 2025/09/12 02:06:39 Adding connection ID 7a9abae5. 2025/09/12 02:06:39 Adding connection ID bda6ac4c. 2025/09/12 02:06:39 server -> Sending packet 1 (1280 bytes) for connection a28e94cb86a2bdfab516e5f8e224567c, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 79c3ada1, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:39 server -> Sending packet 0 (837 bytes) for connection a28e94cb86a2bdfab516e5f8e224567c, Handshake 2025/09/12 02:06:39 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 79c3ada1, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a66a8b5d, StatelessResetToken: 0x0b50c77120a92d5235b2aa2b7511d1f7} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bda6ac4c, StatelessResetToken: 0x0e7f3b3ef2fa8a1558bfe8584c1d0bb1} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7a9abae5, StatelessResetToken: 0xedd721d9c57e66e16dce4b754dd115ad} 2025/09/12 02:06:39 server <- Reading packet 2 (1280 bytes) for connection 79c3ada1, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: 79c3ada1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:39 server newly acked packets (1): [1] 2025/09/12 02:06:39 server updated RTT: 33.090049ms (σ: 16.545024ms) 2025/09/12 02:06:39 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:39 server <- Reading packet 0 (75 bytes) for connection a66a8b5d, Handshake 2025/09/12 02:06:39 server Long Header{Type: Handshake, DestConnectionID: a66a8b5d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:39 server Dropping Initial keys. 2025/09/12 02:06:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:39 server newly acked packets (1): [0] 2025/09/12 02:06:39 server updated RTT: 33.096ms (σ: 12.421ms) 2025/09/12 02:06:39 server Canceling loss detection timer. 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Dropping Handshake keys. 2025/09/12 02:06:39 server <- Reading packet 0 (25 bytes) for connection a66a8b5d, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: a66a8b5d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:39 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:39 server <- Reading packet 1 (47 bytes) for connection a66a8b5d, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: a66a8b5d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 472µs} 2025/09/12 02:06:39 server newly acked packets (1): [0] 2025/09/12 02:06:39 server updated RTT: 33.107ms (σ: 9.337ms) 2025/09/12 02:06:39 server Canceling loss detection timer. 2025/09/12 02:06:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:39 server -> Sending packet 1 (296 bytes) for connection a28e94cb86a2bdfab516e5f8e224567c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 350.581µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:39 server -> &wire.NewTokenFrame{Token: 0x1ccb169fccf29f4e7a4bd5a12f0dfa4783e516d2b963334ea9ff008a1750e8c9ef593efd39a744772602dd8526b3b6661f90522cdbd0873fe54d0a7f482a5ac84c88adc83e10ae75f785a14d5dc74553a2dedd4c30299297ec19ef} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:39 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:39 Received request: GET /ggdkbegivq 2025/09/12 02:06:39 server -> Sending packet 2 (1045 bytes) for connection a28e94cb86a2bdfab516e5f8e224567c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:39 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:39 server -> Sending packet 4 (288 bytes) for connection a28e94cb86a2bdfab516e5f8e224567c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:39 server -> &wire.NewTokenFrame{Token: 0x1ccb169fccf29f4e7a4bd5a12f0dfa4783e516d2b963334ea9ff008a1750e8c9ef593efd39a744772602dd8526b3b6661f90522cdbd0873fe54d0a7f482a5ac84c88adc83e10ae75f785a14d5dc74553a2dedd4c30299297ec19ef} 2025/09/12 02:06:39 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:39 server Skipping packet number 3 2025/09/12 02:06:39 server -> Sending packet 5 (1045 bytes) for connection a28e94cb86a2bdfab516e5f8e224567c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:06:39 server -> Sending packet 12 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:39 server -> Sending packet 13 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:39 server <- Reading packet 2 (33 bytes) for connection a66a8b5d, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: a66a8b5d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:39 server newly acked packets (1): [5] 2025/09/12 02:06:39 server updated RTT: 32.956ms (σ: 7.302ms) 2025/09/12 02:06:39 server ECN capability confirmed. 2025/09/12 02:06:39 server setting loss timer for packet 4 (1-RTT) to 37.0755ms (in 2025-09-12 02:06:39.574664676 +0000 UTC m=+3.472988428) 2025/09/12 02:06:39 server -> Sending packet 6 (22 bytes) for connection a28e94cb86a2bdfab516e5f8e224567c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:39 server Parsed a coalesced packet. Part 1: 35 bytes. Remaining: 26 bytes. 2025/09/12 02:06:39 server Dropping %!s(logging.PacketType=1) packet (35 bytes) because we already dropped the keys. 2025/09/12 02:06:39 server <- Reading packet 3 (26 bytes) for connection a66a8b5d, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: a66a8b5d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:39 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:39 Replacing connection for connection IDs [a66a8b5d 7a9abae5 bda6ac4c a28e94cb86a2bdfab516e5f8e224567c 79c3ada1] with a closed connection. 2025/09/12 02:06:39 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:39 server Connection a28e94cb86a2bdfab516e5f8e224567c closed. 2025/09/12 02:06:39 server <- Received Initial packet. 2025/09/12 02:06:39 Created qlog file: /logs/qlog/1409c16a0c41c5d6.sqlog 2025/09/12 02:06:39 server Changing connection ID to 6bc6a6e7. 2025/09/12 02:06:39 Adding connection IDs 1409c16a0c41c5d6 and 6bc6a6e7 for a new connection. 2025/09/12 02:06:39 server <- Reading packet 0 (1280 bytes) for connection 1409c16a0c41c5d6, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: 1409c16a0c41c5d6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 02:06:39 server -> Sending packet 0 (37 bytes) for connection 1409c16a0c41c5d6, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6bc6a6e7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:39 server <- Reading packet 2 (1280 bytes) for connection 6bc6a6e7, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: 6bc6a6e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 1240, Data length: 269, Offset + Data length: 1509} 2025/09/12 02:06:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:39 Adding connection ID d03b9503. 2025/09/12 02:06:39 Adding connection ID a3631e33. 2025/09/12 02:06:39 Adding connection ID 4809e07e. 2025/09/12 02:06:39 server -> Sending packet 1 (1280 bytes) for connection 1409c16a0c41c5d6, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6bc6a6e7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:39 server -> Sending packet 0 (832 bytes) for connection 1409c16a0c41c5d6, Handshake 2025/09/12 02:06:39 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6bc6a6e7, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d03b9503, StatelessResetToken: 0xcff4b2cc0031e2bb0a1bed8ec9ce529c} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a3631e33, StatelessResetToken: 0xa742ca0ccc1a1f89fb0058819a73f9d0} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4809e07e, StatelessResetToken: 0x6a4a5e03f6c92ff14955a1a39cb9adae} 2025/09/12 02:06:39 server <- Reading packet 3 (1280 bytes) for connection 6bc6a6e7, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: 6bc6a6e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 1240, Data length: 269, Offset + Data length: 1509} 2025/09/12 02:06:39 server -> Sending packet 2 (39 bytes) for connection 1409c16a0c41c5d6, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6bc6a6e7, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:39 server <- Reading packet 4 (1280 bytes) for connection 6bc6a6e7, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: 6bc6a6e7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:39 server newly acked packets (1): [1] 2025/09/12 02:06:39 server updated RTT: 33.199771ms (σ: 16.599885ms) 2025/09/12 02:06:39 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:39 server <- Reading packet 0 (75 bytes) for connection d03b9503, Handshake 2025/09/12 02:06:39 server Long Header{Type: Handshake, DestConnectionID: d03b9503, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:39 server Dropping Initial keys. 2025/09/12 02:06:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:39 server newly acked packets (1): [0] 2025/09/12 02:06:39 server updated RTT: 33.201ms (σ: 12.454ms) 2025/09/12 02:06:39 server Canceling loss detection timer. 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Dropping Handshake keys. 2025/09/12 02:06:39 server <- Reading packet 0 (25 bytes) for connection d03b9503, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: d03b9503, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:39 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:39 server -> Sending packet 1 (293 bytes) for connection 1409c16a0c41c5d6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 250.903µs} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:39 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:39 server -> &wire.NewTokenFrame{Token: 0x462cdb7bbb60b47a0096771714d26749d689e841577d50e9656375db08e81ea37e2264c19ddc319fb101bb0c3dc6cdc7ee5e89e0b92a77929139ce12f5ece1544c6df51d22dc5bd291d58f55df6dc064749671e01048f8566c0abb} 2025/09/12 02:06:39 Removing connection IDs [a66a8b5d 7a9abae5 bda6ac4c a28e94cb86a2bdfab516e5f8e224567c 79c3ada1] for a closed connection after it has been retired. 2025/09/12 02:06:39 server <- Reading packet 4 (42 bytes) for connection d03b9503, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: d03b9503, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:39 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:39 server <- Reading packet 5 (42 bytes) for connection d03b9503, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: d03b9503, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:39 server -> Sending packet 2 (29 bytes) for connection 1409c16a0c41c5d6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 111.207µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:39 Received request: GET /nopmfwvuhe 2025/09/12 02:06:39 server -> Sending packet 3 (1045 bytes) for connection 1409c16a0c41c5d6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:39 server -> Sending packet 5 (91 bytes) for connection 1409c16a0c41c5d6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4809e07e, StatelessResetToken: 0x6a4a5e03f6c92ff14955a1a39cb9adae} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d03b9503, StatelessResetToken: 0xcff4b2cc0031e2bb0a1bed8ec9ce529c} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a3631e33, StatelessResetToken: 0xa742ca0ccc1a1f89fb0058819a73f9d0} 2025/09/12 02:06:39 server Skipping packet number 4 2025/09/12 02:06:39 server -> Sending packet 6 (288 bytes) for connection 1409c16a0c41c5d6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.NewTokenFrame{Token: 0x462cdb7bbb60b47a0096771714d26749d689e841577d50e9656375db08e81ea37e2264c19ddc319fb101bb0c3dc6cdc7ee5e89e0b92a77929139ce12f5ece1544c6df51d22dc5bd291d58f55df6dc064749671e01048f8566c0abb} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:39 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:39 server -> Sending packet 7 (1366 bytes) for connection 1409c16a0c41c5d6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.PingFrame{} 2025/09/12 02:06:39 server <- Reading packet 7 (33 bytes) for connection d03b9503, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: d03b9503, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 160µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:39 server newly acked packets (1): [5] 2025/09/12 02:06:39 server updated RTT: 33.094ms (σ: 9.553ms) 2025/09/12 02:06:39 server ECN capability confirmed. 2025/09/12 02:06:39 server lost packet 3 (time threshold) 2025/09/12 02:06:39 server <- Reading packet 8 (33 bytes) for connection d03b9503, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: d03b9503, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 56µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:06:39 server newly acked packets (2): [6 7] 2025/09/12 02:06:39 server updated RTT: 33.002ms (σ: 7.347ms) 2025/09/12 02:06:39 server Canceling loss detection timer. 2025/09/12 02:06:39 server -> Sending packet 8 (1045 bytes) for connection 1409c16a0c41c5d6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:39 Removing connection ID 1409c16a0c41c5d6. 2025/09/12 02:06:39 Removing connection ID 6bc6a6e7. 2025/09/12 02:06:39 server <- Reading packet 9 (26 bytes) for connection d03b9503, 1-RTT 2025/09/12 02:06:39 server Short Header{DestConnectionID: d03b9503, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:39 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:39 Replacing connection for connection IDs [a3631e33 4809e07e d03b9503] with a closed connection. 2025/09/12 02:06:39 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:39 server Connection 1409c16a0c41c5d6 closed. 2025/09/12 02:06:39 server <- Received Initial packet. 2025/09/12 02:06:39 Created qlog file: /logs/qlog/4081ba7b99d42402884471e0c7b3.sqlog 2025/09/12 02:06:39 server Changing connection ID to 9591254a. 2025/09/12 02:06:39 Adding connection IDs 4081ba7b99d42402884471e0c7b3 and 9591254a for a new connection. 2025/09/12 02:06:39 server <- Reading packet 0 (1280 bytes) for connection 4081ba7b99d42402884471e0c7b3, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: 4081ba7b99d42402884471e0c7b3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 02:06:39 server -> Sending packet 0 (37 bytes) for connection 4081ba7b99d42402884471e0c7b3, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9591254a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:39 server <- Reading packet 1 (1280 bytes) for connection 4081ba7b99d42402884471e0c7b3, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: 4081ba7b99d42402884471e0c7b3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:39 server <- &wire.CryptoFrame{Offset: 1234, Data length: 279, Offset + Data length: 1513} 2025/09/12 02:06:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:39 Adding connection ID be2db74e. 2025/09/12 02:06:39 Adding connection ID 43f04681. 2025/09/12 02:06:39 Adding connection ID 319cfd91. 2025/09/12 02:06:39 server -> Sending packet 1 (1280 bytes) for connection 4081ba7b99d42402884471e0c7b3, Initial 2025/09/12 02:06:39 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9591254a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:39 server -> Sending packet 0 (840 bytes) for connection 4081ba7b99d42402884471e0c7b3, Handshake 2025/09/12 02:06:39 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9591254a, PacketNumber: 0, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 02:06:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 02:06:39 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: be2db74e, StatelessResetToken: 0x7d212346067456e1fb55bbb4f329f915} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 43f04681, StatelessResetToken: 0x2a32a8dbc0c99521eb3ff3f79ad39780} 2025/09/12 02:06:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 319cfd91, StatelessResetToken: 0x8bd1d49e67a9242b8ef1403b7723c6b0} 2025/09/12 02:06:40 server <- Reading packet 2 (1280 bytes) for connection 9591254a, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: 9591254a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:40 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:40 server newly acked packets (1): [1] 2025/09/12 02:06:40 server updated RTT: 33.166865ms (σ: 16.583432ms) 2025/09/12 02:06:40 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:40 server <- Reading packet 0 (75 bytes) for connection be2db74e, Handshake 2025/09/12 02:06:40 server Long Header{Type: Handshake, DestConnectionID: be2db74e, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:40 server Dropping Initial keys. 2025/09/12 02:06:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:40 server newly acked packets (1): [0] 2025/09/12 02:06:40 server updated RTT: 33.164ms (σ: 12.44ms) 2025/09/12 02:06:40 server Canceling loss detection timer. 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:40 server Dropping Handshake keys. 2025/09/12 02:06:40 server <- Reading packet 0 (25 bytes) for connection be2db74e, 1-RTT 2025/09/12 02:06:40 server Short Header{DestConnectionID: be2db74e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:40 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:40 server <- Reading packet 1 (28 bytes) for connection be2db74e, 1-RTT 2025/09/12 02:06:40 server Short Header{DestConnectionID: be2db74e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408µs} 2025/09/12 02:06:40 server newly acked packets (1): [0] 2025/09/12 02:06:40 server updated RTT: 33.165ms (σ: 9.333ms) 2025/09/12 02:06:40 server Canceling loss detection timer. 2025/09/12 02:06:40 server -> Sending packet 1 (296 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 424.933µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:40 server -> &wire.NewTokenFrame{Token: 0x64e834b8922f8fea6d3f23db42cb4529c32fac91189d9fd94f5dc238e3187c3b9c0b986af3c7314275a619500adf0dae8f79d6f95fd3eb157ec19491a75ff07a3f9672914c0857c9779431ae3d76bdfc7895dfa4c165d3baf0068b} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:40 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:40 server -> Sending packet 3 (288 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.NewTokenFrame{Token: 0x64e834b8922f8fea6d3f23db42cb4529c32fac91189d9fd94f5dc238e3187c3b9c0b986af3c7314275a619500adf0dae8f79d6f95fd3eb157ec19491a75ff07a3f9672914c0857c9779431ae3d76bdfc7895dfa4c165d3baf0068b} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:40 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:40 server -> Sending packet 4 (288 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.NewTokenFrame{Token: 0x64e834b8922f8fea6d3f23db42cb4529c32fac91189d9fd94f5dc238e3187c3b9c0b986af3c7314275a619500adf0dae8f79d6f95fd3eb157ec19491a75ff07a3f9672914c0857c9779431ae3d76bdfc7895dfa4c165d3baf0068b} 2025/09/12 02:06:40 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:40 server <- Reading packet 5 (52 bytes) for connection be2db74e, 1-RTT 2025/09/12 02:06:40 server Short Header{DestConnectionID: be2db74e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 128µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:40 server newly acked packets (1): [4] 2025/09/12 02:06:40 server updated RTT: 32.951ms (σ: 7.427ms) 2025/09/12 02:06:40 server ECN capability confirmed. 2025/09/12 02:06:40 server Canceling loss detection timer. 2025/09/12 02:06:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:40 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:40 server -> Sending packet 5 (29 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 149.569µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:40 Received request: GET /kxblbymdjr 2025/09/12 02:06:40 server -> Sending packet 6 (1045 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:40 Removing connection IDs [a3631e33 4809e07e d03b9503] for a closed connection after it has been retired. 2025/09/12 02:06:40 server <- Reading packet 7 (35 bytes) for connection be2db74e, 1-RTT 2025/09/12 02:06:40 server Short Header{DestConnectionID: be2db74e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 72µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:40 server newly acked packets (1): [6] 2025/09/12 02:06:40 server updated RTT: 32.77ms (σ: 5.931ms) 2025/09/12 02:06:40 server Canceling loss detection timer. 2025/09/12 02:06:40 server -> Sending packet 7 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:40 server -> Sending packet 9 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:40 server -> Sending packet 10 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:40 server -> Sending packet 11 (1366 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.PingFrame{} 2025/09/12 02:06:40 Removing connection ID 4081ba7b99d42402884471e0c7b3. 2025/09/12 02:06:40 Removing connection ID 9591254a. 2025/09/12 02:06:40 server <- Received Initial packet. 2025/09/12 02:06:40 Created qlog file: /logs/qlog/d51218eff53a135c842b68de.sqlog 2025/09/12 02:06:40 server Changing connection ID to 197e89cb. 2025/09/12 02:06:40 Adding connection IDs d51218eff53a135c842b68de and 197e89cb for a new connection. 2025/09/12 02:06:40 server <- Reading packet 2 (1280 bytes) for connection d51218eff53a135c842b68de, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: d51218eff53a135c842b68de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 02:06:40 server -> Sending packet 0 (37 bytes) for connection d51218eff53a135c842b68de, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 197e89cb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:40 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 02:06:40 server <- Reading packet 3 (1280 bytes) for connection d51218eff53a135c842b68de, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: d51218eff53a135c842b68de, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 1236, Data length: 280, Offset + Data length: 1516} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:40 Adding connection ID fae1fcf9. 2025/09/12 02:06:40 Adding connection ID 7450e871. 2025/09/12 02:06:40 Adding connection ID c2bd4e48. 2025/09/12 02:06:40 server -> Sending packet 1 (1280 bytes) for connection d51218eff53a135c842b68de, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 197e89cb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:40 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:40 server -> Sending packet 0 (836 bytes) for connection d51218eff53a135c842b68de, Handshake 2025/09/12 02:06:40 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 197e89cb, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7450e871, StatelessResetToken: 0xfe95bf0eb214f1167ed7c2b1bff99848} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fae1fcf9, StatelessResetToken: 0x2428c6a6889321a48e3fe80855652d36} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c2bd4e48, StatelessResetToken: 0x02266c3ffd51cc58c38a9229c9a54509} 2025/09/12 02:06:40 server <- Reading packet 4 (1280 bytes) for connection 197e89cb, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: 197e89cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:40 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:40 server newly acked packets (1): [1] 2025/09/12 02:06:40 server updated RTT: 33.115371ms (σ: 16.557685ms) 2025/09/12 02:06:40 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 44 bytes. 2025/09/12 02:06:40 server <- Reading packet 0 (75 bytes) for connection fae1fcf9, Handshake 2025/09/12 02:06:40 server Long Header{Type: Handshake, DestConnectionID: fae1fcf9, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:40 server Dropping Initial keys. 2025/09/12 02:06:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:40 server newly acked packets (1): [0] 2025/09/12 02:06:40 server updated RTT: 33.113ms (σ: 12.42ms) 2025/09/12 02:06:40 server Canceling loss detection timer. 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:40 server Dropping Handshake keys. 2025/09/12 02:06:40 server <- Reading packet 0 (44 bytes) for connection fae1fcf9, 1-RTT 2025/09/12 02:06:40 server Short Header{DestConnectionID: fae1fcf9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:40 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:40 server <- Reading packet 1 (29 bytes) for connection fae1fcf9, 1-RTT 2025/09/12 02:06:40 server Short Header{DestConnectionID: fae1fcf9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 520µs} 2025/09/12 02:06:40 server newly acked packets (1): [0] 2025/09/12 02:06:40 Received request: GET /lthkoevcua 2025/09/12 02:06:40 server updated RTT: 33.122ms (σ: 9.334ms) 2025/09/12 02:06:40 server Canceling loss detection timer. 2025/09/12 02:06:40 server -> Sending packet 1 (296 bytes) for connection d51218eff53a135c842b68de, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 423.887µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:40 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:40 server -> &wire.NewTokenFrame{Token: 0x3646f6d29a10f77b4e92222d37337d8a4b12294669a2f7258cd99b861673dae525cafe78263918c4ad0b43bee11ffd28fddbcf611d72f7a75200dd91fcf81b94567745cf75e1eece52262522fc4488aff9fe2014c6f410d7ed3958} 2025/09/12 02:06:40 server -> Sending packet 2 (1045 bytes) for connection d51218eff53a135c842b68de, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:40 server -> Sending packet 13 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:40 server -> Sending packet 14 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:40 server <- Reading packet 3 (26 bytes) for connection fae1fcf9, 1-RTT 2025/09/12 02:06:40 server Short Header{DestConnectionID: fae1fcf9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:40 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:40 Replacing connection for connection IDs [fae1fcf9 7450e871 c2bd4e48 d51218eff53a135c842b68de 197e89cb] with a closed connection. 2025/09/12 02:06:40 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:40 server Connection d51218eff53a135c842b68de closed. 2025/09/12 02:06:40 server <- Received Initial packet. 2025/09/12 02:06:40 Created qlog file: /logs/qlog/e532c6e9eecdffb63d34.sqlog 2025/09/12 02:06:40 server Changing connection ID to 5d9b8a00. 2025/09/12 02:06:40 Adding connection IDs e532c6e9eecdffb63d34 and 5d9b8a00 for a new connection. 2025/09/12 02:06:40 server <- Reading packet 1 (1280 bytes) for connection e532c6e9eecdffb63d34, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: e532c6e9eecdffb63d34, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 1238, Data length: 272, Offset + Data length: 1510} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:40 server -> Sending packet 0 (37 bytes) for connection e532c6e9eecdffb63d34, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d9b8a00, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:40 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:06:40 server -> Sending packet 15 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:40 server -> Sending packet 16 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:40 server <- Reading packet 2 (1280 bytes) for connection 5d9b8a00, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: 5d9b8a00, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 02:06:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:40 Adding connection ID daaaa93c. 2025/09/12 02:06:40 Adding connection ID 85ffa22c. 2025/09/12 02:06:40 Adding connection ID 8b0761bc. 2025/09/12 02:06:40 server -> Sending packet 1 (1280 bytes) for connection e532c6e9eecdffb63d34, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d9b8a00, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:40 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:40 server -> Sending packet 0 (843 bytes) for connection e532c6e9eecdffb63d34, Handshake 2025/09/12 02:06:40 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5d9b8a00, PacketNumber: 0, PacketNumberLen: 2, Length: 739, Version: v1} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8b0761bc, StatelessResetToken: 0x9dbaab61df2ed3bc131a88cf41329925} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: daaaa93c, StatelessResetToken: 0x21c6260a0b2ddb488768c3216ca1bbcf} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 85ffa22c, StatelessResetToken: 0x4b71bc6b0c33289fab48d3d545daf782} 2025/09/12 02:06:40 server <- Reading packet 4 (1280 bytes) for connection 5d9b8a00, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: 5d9b8a00, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 02:06:40 server -> Sending packet 2 (39 bytes) for connection e532c6e9eecdffb63d34, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d9b8a00, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:40 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/09/12 02:06:40 Removing connection IDs [fae1fcf9 7450e871 c2bd4e48 d51218eff53a135c842b68de 197e89cb] for a closed connection after it has been retired. 2025/09/12 02:06:40 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:40 server -> Sending packet 3 (1280 bytes) for connection e532c6e9eecdffb63d34, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d9b8a00, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:40 server -> Sending packet 4 (1280 bytes) for connection e532c6e9eecdffb63d34, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5d9b8a00, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:40 server <- Reading packet 5 (1280 bytes) for connection 5d9b8a00, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: 5d9b8a00, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:40 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:40 server Queueing packet (50 bytes) for later decryption 2025/09/12 02:06:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:06:40 server -> Sending packet 16 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:40 server -> Sending packet 17 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:40 server <- Reading packet 1 (70 bytes) for connection daaaa93c, Handshake 2025/09/12 02:06:40 server Long Header{Type: Handshake, DestConnectionID: daaaa93c, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:40 server Dropping Initial keys. 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:40 server Dropping Handshake keys. 2025/09/12 02:06:40 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:40 server -> Sending packet 2 (358 bytes) for connection e532c6e9eecdffb63d34, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8b0761bc, StatelessResetToken: 0x9dbaab61df2ed3bc131a88cf41329925} 2025/09/12 02:06:40 server -> &wire.NewTokenFrame{Token: 0xd6dcbb652b477f6cfe9bd6ee893eec177e4a7ac315ed9f8f017f0fd157a97652768de8a45b0bd200a79fdc3866a1f71bfd38df9b2624fdaecda0e2ec09c194afcc6509c4f38888a4a3b4c392b34ea52a2dd7c132320a327ece} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: daaaa93c, StatelessResetToken: 0x21c6260a0b2ddb488768c3216ca1bbcf} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 85ffa22c, StatelessResetToken: 0x4b71bc6b0c33289fab48d3d545daf782} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:40 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:40 server -> Sending packet 3 (358 bytes) for connection e532c6e9eecdffb63d34, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 85ffa22c, StatelessResetToken: 0x4b71bc6b0c33289fab48d3d545daf782} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8b0761bc, StatelessResetToken: 0x9dbaab61df2ed3bc131a88cf41329925} 2025/09/12 02:06:40 server -> &wire.NewTokenFrame{Token: 0xd6dcbb652b477f6cfe9bd6ee893eec177e4a7ac315ed9f8f017f0fd157a97652768de8a45b0bd200a79fdc3866a1f71bfd38df9b2624fdaecda0e2ec09c194afcc6509c4f38888a4a3b4c392b34ea52a2dd7c132320a327ece} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: daaaa93c, StatelessResetToken: 0x21c6260a0b2ddb488768c3216ca1bbcf} 2025/09/12 02:06:40 server -> Sending packet 4 (1366 bytes) for connection e532c6e9eecdffb63d34, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.PingFrame{} 2025/09/12 02:06:40 server <- Reading packet 1 (50 bytes) for connection daaaa93c, 1-RTT 2025/09/12 02:06:40 server Short Header{DestConnectionID: daaaa93c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.984ms} 2025/09/12 02:06:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:40 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:40 server -> Sending packet 5 (28 bytes) for connection e532c6e9eecdffb63d34, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 83.453239ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:40 Received request: GET /kerphqjqht 2025/09/12 02:06:40 server -> Sending packet 6 (1045 bytes) for connection e532c6e9eecdffb63d34, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:40 server <- Reading packet 5 (35 bytes) for connection daaaa93c, 1-RTT 2025/09/12 02:06:40 server Short Header{DestConnectionID: daaaa93c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:06:40 server newly acked packets (2): [3 6] 2025/09/12 02:06:40 server updated RTT: 33.00931ms (σ: 16.504655ms) 2025/09/12 02:06:40 server ECN capability confirmed. 2025/09/12 02:06:40 server setting loss timer for packet 4 (1-RTT) to 37.135473ms (in 2025-09-12 02:06:40.835664338 +0000 UTC m=+4.733988090) 2025/09/12 02:06:40 server Canceling loss detection timer. 2025/09/12 02:06:40 server <- Reading packet 6 (26 bytes) for connection daaaa93c, 1-RTT 2025/09/12 02:06:40 server Short Header{DestConnectionID: daaaa93c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:40 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:40 Replacing connection for connection IDs [5d9b8a00 daaaa93c 85ffa22c 8b0761bc e532c6e9eecdffb63d34] with a closed connection. 2025/09/12 02:06:40 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:40 server Connection e532c6e9eecdffb63d34 closed. 2025/09/12 02:06:40 server <- Received Initial packet. 2025/09/12 02:06:40 Created qlog file: /logs/qlog/718bd98e12efce035365.sqlog 2025/09/12 02:06:40 server Changing connection ID to 9d7e91cf. 2025/09/12 02:06:40 Adding connection IDs 718bd98e12efce035365 and 9d7e91cf for a new connection. 2025/09/12 02:06:40 server <- Reading packet 0 (1280 bytes) for connection 718bd98e12efce035365, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: 718bd98e12efce035365, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:40 server -> Sending packet 0 (37 bytes) for connection 718bd98e12efce035365, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9d7e91cf, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:40 server <- Reading packet 2 (1280 bytes) for connection 9d7e91cf, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: 9d7e91cf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 1238, Data length: 272, Offset + Data length: 1510} 2025/09/12 02:06:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:40 Adding connection ID cb01ca69. 2025/09/12 02:06:40 Adding connection ID a8dd0ec7. 2025/09/12 02:06:40 Adding connection ID a2c5344c. 2025/09/12 02:06:40 server -> Sending packet 1 (1280 bytes) for connection 718bd98e12efce035365, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9d7e91cf, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:40 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:40 server <- Reading packet 3 (1280 bytes) for connection 9d7e91cf, Initial 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: 9d7e91cf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:40 server <- &wire.CryptoFrame{Offset: 1238, Data length: 272, Offset + Data length: 1510} 2025/09/12 02:06:40 server -> Sending coalesced packet (2 parts, 873 bytes) for connection 718bd98e12efce035365 2025/09/12 02:06:40 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9d7e91cf, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:40 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:40 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 9d7e91cf, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/09/12 02:06:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/09/12 02:06:40 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb01ca69, StatelessResetToken: 0xd6d50380e9a4988e645499d84ab842c0} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a2c5344c, StatelessResetToken: 0xe6f2a0194c9123d4922b9b00847a4dc8} 2025/09/12 02:06:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a8dd0ec7, StatelessResetToken: 0x0c5d7501e48d4a19e6a16d846173de87} 2025/09/12 02:06:41 Removing connection IDs [5d9b8a00 daaaa93c 85ffa22c 8b0761bc e532c6e9eecdffb63d34] for a closed connection after it has been retired. 2025/09/12 02:06:41 server <- Reading packet 4 (1280 bytes) for connection 9d7e91cf, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: 9d7e91cf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:41 server <- &wire.PingFrame{} 2025/09/12 02:06:41 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:41 server -> Sending packet 3 (1280 bytes) for connection 718bd98e12efce035365, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9d7e91cf, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:41 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:41 server -> Sending packet 4 (1280 bytes) for connection 718bd98e12efce035365, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 9d7e91cf, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:41 Removing connection IDs [dadf9f2e 968c21bc dc9a3a0f 1073572e6427ccfa20ceb177203644 8bea596e] for a closed connection after it has been retired. 2025/09/12 02:06:41 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:41 server <- Reading packet 0 (75 bytes) for connection cb01ca69, Handshake 2025/09/12 02:06:41 server Long Header{Type: Handshake, DestConnectionID: cb01ca69, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:41 server Dropping Initial keys. 2025/09/12 02:06:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:41 server newly acked packets (1): [0] 2025/09/12 02:06:41 server updated RTT: 233.919847ms (σ: 116.959923ms) 2025/09/12 02:06:41 server Canceling loss detection timer. 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:41 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:41 server Dropping Handshake keys. 2025/09/12 02:06:41 server <- Reading packet 0 (25 bytes) for connection cb01ca69, 1-RTT 2025/09/12 02:06:41 server Short Header{DestConnectionID: cb01ca69, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:41 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:41 server <- Reading packet 1 (50 bytes) for connection cb01ca69, 1-RTT 2025/09/12 02:06:41 server Short Header{DestConnectionID: cb01ca69, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.704ms} 2025/09/12 02:06:41 server newly acked packets (1): [0] 2025/09/12 02:06:41 server updated RTT: 233.92ms (σ: 87.721ms) 2025/09/12 02:06:41 server Canceling loss detection timer. 2025/09/12 02:06:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:41 server -> Sending packet 1 (296 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 311.1µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:41 server -> &wire.NewTokenFrame{Token: 0x4dc0c43ddab9c98120f750f44f1ba467c988545365b0b10d4f42469db0f7012a374b6577bf39c42d8dd34b2fa4297242b41639f9fc847bcba36cbd248db6824fd9adee8006cce6b2ffa76e93d9e01bf6094cafcaf18ea7fdc50172} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:41 Received request: GET /smvqmdzeaj 2025/09/12 02:06:41 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:41 server -> Sending packet 2 (1045 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:41 server <- Reading packet 2 (33 bytes) for connection cb01ca69, 1-RTT 2025/09/12 02:06:41 server Short Header{DestConnectionID: cb01ca69, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:41 server newly acked packets (1): [2] 2025/09/12 02:06:41 server updated RTT: 208.663ms (σ: 116.303ms) 2025/09/12 02:06:41 server ECN capability confirmed. 2025/09/12 02:06:41 server setting loss timer for packet 1 (1-RTT) to 234.745875ms (in 2025-09-12 02:06:41.400372468 +0000 UTC m=+5.298696219) 2025/09/12 02:06:41 server -> Sending packet 3 (22 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:41 server <- Received Initial packet. 2025/09/12 02:06:41 Created qlog file: /logs/qlog/88e12f1932759a758a652b87ed73340b095b93.sqlog 2025/09/12 02:06:41 server Changing connection ID to d6e25e09. 2025/09/12 02:06:41 server Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 02:06:41.400372468 +0000 UTC m=+5.298696219 2025/09/12 02:06:41 server lost packet 1 (time threshold) 2025/09/12 02:06:41 Adding connection IDs 88e12f1932759a758a652b87ed73340b095b93 and d6e25e09 for a new connection. 2025/09/12 02:06:41 server -> Sending packet 4 (288 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.NewTokenFrame{Token: 0x4dc0c43ddab9c98120f750f44f1ba467c988545365b0b10d4f42469db0f7012a374b6577bf39c42d8dd34b2fa4297242b41639f9fc847bcba36cbd248db6824fd9adee8006cce6b2ffa76e93d9e01bf6094cafcaf18ea7fdc50172} 2025/09/12 02:06:41 server <- Reading packet 2 (1280 bytes) for connection 88e12f1932759a758a652b87ed73340b095b93, Initial 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: 88e12f1932759a758a652b87ed73340b095b93, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 02:06:41 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:41 server -> Sending packet 0 (37 bytes) for connection 88e12f1932759a758a652b87ed73340b095b93, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d6e25e09, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:41 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 02:06:41 server <- Reading packet 3 (1280 bytes) for connection 88e12f1932759a758a652b87ed73340b095b93, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: 88e12f1932759a758a652b87ed73340b095b93, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 1229, Data length: 285, Offset + Data length: 1514} 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:41 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:41 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:41 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:41 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:41 Adding connection ID 74f9015b. 2025/09/12 02:06:41 Adding connection ID 26bc97bf. 2025/09/12 02:06:41 Adding connection ID 12fa978e. 2025/09/12 02:06:41 server -> Sending packet 1 (1280 bytes) for connection 88e12f1932759a758a652b87ed73340b095b93, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: d6e25e09, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:41 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:41 server -> Sending packet 0 (839 bytes) for connection 88e12f1932759a758a652b87ed73340b095b93, Handshake 2025/09/12 02:06:41 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: d6e25e09, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 74f9015b, StatelessResetToken: 0xaf9473bbe3f70adfaebf24b7571bfc7e} 2025/09/12 02:06:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 12fa978e, StatelessResetToken: 0x8e37296a7d62a9372866ee3429371478} 2025/09/12 02:06:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 26bc97bf, StatelessResetToken: 0xef3b89c8e348254daa066ae6c148e73d} 2025/09/12 02:06:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:06:41 server -> Sending packet 19 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:41 server -> Sending packet 20 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:41 server Queueing packet (29 bytes) for later decryption 2025/09/12 02:06:41 server <- Reading packet 2 (70 bytes) for connection 74f9015b, Handshake 2025/09/12 02:06:41 server Long Header{Type: Handshake, DestConnectionID: 74f9015b, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:41 server Dropping Initial keys. 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:41 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:41 server Dropping Handshake keys. 2025/09/12 02:06:41 server -> Sending packet 1 (1366 bytes) for connection 88e12f1932759a758a652b87ed73340b095b93, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.PingFrame{} 2025/09/12 02:06:41 server <- Reading packet 1 (29 bytes) for connection 74f9015b, 1-RTT 2025/09/12 02:06:41 server Short Header{DestConnectionID: 74f9015b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 544µs} 2025/09/12 02:06:41 server newly acked packets (1): [0] 2025/09/12 02:06:41 server updated RTT: 33.158025ms (σ: 16.579012ms) 2025/09/12 02:06:41 server Canceling loss detection timer. 2025/09/12 02:06:41 server -> Sending packet 2 (286 bytes) for connection 88e12f1932759a758a652b87ed73340b095b93, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:41 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:41 server -> &wire.NewTokenFrame{Token: 0x5bab206dee3d07a654d8235e9409d4121f39545f66006264a2efbea1459cb22e401516d906fdc28ac0cacaa9a4d9e9a67d529f211136a53bfda3412e0bf05b75f28f0266906d8c52a39efa066819d987089dac32197a2f0010} 2025/09/12 02:06:41 server <- Reading packet 2 (32 bytes) for connection 74f9015b, 1-RTT 2025/09/12 02:06:41 server Short Header{DestConnectionID: 74f9015b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.368ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:41 server newly acked packets (1): [1] 2025/09/12 02:06:41 server updated RTT: 36.171ms (σ: 18.461ms) 2025/09/12 02:06:41 server ECN capability confirmed. 2025/09/12 02:06:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:41 server -> Sending packet 4 (286 bytes) for connection 88e12f1932759a758a652b87ed73340b095b93, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:41 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:41 server -> &wire.NewTokenFrame{Token: 0x5bab206dee3d07a654d8235e9409d4121f39545f66006264a2efbea1459cb22e401516d906fdc28ac0cacaa9a4d9e9a67d529f211136a53bfda3412e0bf05b75f28f0266906d8c52a39efa066819d987089dac32197a2f0010} 2025/09/12 02:06:41 server -> Sending packet 5 (286 bytes) for connection 88e12f1932759a758a652b87ed73340b095b93, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:41 server -> &wire.NewTokenFrame{Token: 0x5bab206dee3d07a654d8235e9409d4121f39545f66006264a2efbea1459cb22e401516d906fdc28ac0cacaa9a4d9e9a67d529f211136a53bfda3412e0bf05b75f28f0266906d8c52a39efa066819d987089dac32197a2f0010} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:41 server <- Reading packet 5 (44 bytes) for connection 74f9015b, 1-RTT 2025/09/12 02:06:41 server Short Header{DestConnectionID: 74f9015b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:41 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:41 server -> Sending packet 6 (29 bytes) for connection 88e12f1932759a758a652b87ed73340b095b93, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 112.579µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:41 Received request: GET /zffcabqhfi 2025/09/12 02:06:41 server -> Sending packet 7 (1045 bytes) for connection 88e12f1932759a758a652b87ed73340b095b93, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:41 server <- Reading packet 7 (26 bytes) for connection 74f9015b, 1-RTT 2025/09/12 02:06:41 server Short Header{DestConnectionID: 74f9015b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:41 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:41 Replacing connection for connection IDs [74f9015b 26bc97bf 12fa978e d6e25e09 88e12f1932759a758a652b87ed73340b095b93] with a closed connection. 2025/09/12 02:06:41 server Connection 88e12f1932759a758a652b87ed73340b095b93 closed. 2025/09/12 02:06:41 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:41 server <- Received Initial packet. 2025/09/12 02:06:41 Created qlog file: /logs/qlog/17d45902c541bbc4520d.sqlog 2025/09/12 02:06:41 server Changing connection ID to 5db90db3. 2025/09/12 02:06:41 Adding connection IDs 17d45902c541bbc4520d and 5db90db3 for a new connection. 2025/09/12 02:06:41 server <- Reading packet 0 (1280 bytes) for connection 17d45902c541bbc4520d, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: 17d45902c541bbc4520d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:41 server -> Sending packet 0 (37 bytes) for connection 17d45902c541bbc4520d, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5db90db3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:41 server <- Reading packet 1 (1280 bytes) for connection 17d45902c541bbc4520d, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: 17d45902c541bbc4520d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 1238, Data length: 271, Offset + Data length: 1509} 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:41 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:41 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:41 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:41 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:41 Adding connection ID e56704a0. 2025/09/12 02:06:41 Adding connection ID 6d58f916. 2025/09/12 02:06:41 Adding connection ID f7af3977. 2025/09/12 02:06:41 server -> Sending packet 1 (1280 bytes) for connection 17d45902c541bbc4520d, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5db90db3, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:41 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:41 server -> Sending packet 0 (830 bytes) for connection 17d45902c541bbc4520d, Handshake 2025/09/12 02:06:41 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 5db90db3, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e56704a0, StatelessResetToken: 0xa4bb067a26ac4d48df336031b581e236} 2025/09/12 02:06:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6d58f916, StatelessResetToken: 0xcbda0076dbaeac3bf7b86d06a4752d6f} 2025/09/12 02:06:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f7af3977, StatelessResetToken: 0x197c0059c4bef8b940550a84386842f2} 2025/09/12 02:06:41 server <- Reading packet 2 (1280 bytes) for connection 5db90db3, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: 5db90db3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 1238, Data length: 271, Offset + Data length: 1509} 2025/09/12 02:06:41 server -> Sending packet 2 (37 bytes) for connection 17d45902c541bbc4520d, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5db90db3, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:41 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:41 server <- Reading packet 3 (1280 bytes) for connection 5db90db3, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: 5db90db3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 1238, Data length: 271, Offset + Data length: 1509} 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:41 server -> Sending packet 3 (37 bytes) for connection 17d45902c541bbc4520d, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5db90db3, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:41 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:41 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:41 server -> Sending packet 4 (1280 bytes) for connection 17d45902c541bbc4520d, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5db90db3, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:41 server -> Sending packet 5 (1280 bytes) for connection 17d45902c541bbc4520d, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 5db90db3, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:41 server <- Reading packet 4 (1280 bytes) for connection 5db90db3, Initial 2025/09/12 02:06:41 server Long Header{Type: Initial, DestConnectionID: 5db90db3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:41 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:41 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:41 server <- Reading packet 0 (75 bytes) for connection e56704a0, Handshake 2025/09/12 02:06:41 server Long Header{Type: Handshake, DestConnectionID: e56704a0, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:41 server Dropping Initial keys. 2025/09/12 02:06:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:41 server newly acked packets (1): [0] 2025/09/12 02:06:41 server updated RTT: 234.391209ms (σ: 117.195604ms) 2025/09/12 02:06:41 server Canceling loss detection timer. 2025/09/12 02:06:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:41 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:41 server Dropping Handshake keys. 2025/09/12 02:06:41 server <- Reading packet 0 (25 bytes) for connection e56704a0, 1-RTT 2025/09/12 02:06:41 server Short Header{DestConnectionID: e56704a0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:41 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:41 server <- Reading packet 1 (31 bytes) for connection e56704a0, 1-RTT 2025/09/12 02:06:41 server Short Header{DestConnectionID: e56704a0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.352ms} 2025/09/12 02:06:41 server newly acked packets (1): [0] 2025/09/12 02:06:41 server updated RTT: 234.402ms (σ: 87.919ms) 2025/09/12 02:06:41 server Canceling loss detection timer. 2025/09/12 02:06:41 server -> Sending packet 1 (296 bytes) for connection 17d45902c541bbc4520d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:41 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:41 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 358.758µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:41 server -> &wire.NewTokenFrame{Token: 0x745bf69acff73c536c9d0b42b0923dd2872fbd4309d3b85f38b8cae799967f2fdbcaa1ee0706d35046701234aacbca9e147eb229c6f381b9d086963192811f0693e6e4878d651314fd47303cb68e51dfc5d53d07ef5f6cb053135b} 2025/09/12 02:06:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:41 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:42 server <- Reading packet 3 (32 bytes) for connection e56704a0, 1-RTT 2025/09/12 02:06:42 server Short Header{DestConnectionID: e56704a0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.368ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:42 server newly acked packets (1): [1] 2025/09/12 02:06:42 server updated RTT: 212.142ms (σ: 110.458ms) 2025/09/12 02:06:42 server ECN capability confirmed. 2025/09/12 02:06:42 server Canceling loss detection timer. 2025/09/12 02:06:42 server Ignoring all packets below 2. 2025/09/12 02:06:42 Removing connection IDs [74f9015b 26bc97bf 12fa978e d6e25e09 88e12f1932759a758a652b87ed73340b095b93] for a closed connection after it has been retired. 2025/09/12 02:06:42 server <- Reading packet 5 (42 bytes) for connection e56704a0, 1-RTT 2025/09/12 02:06:42 server Short Header{DestConnectionID: e56704a0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:42 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:42 server -> Sending packet 2 (29 bytes) for connection 17d45902c541bbc4520d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 93.074µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:42 Received request: GET /skxkxnstou 2025/09/12 02:06:42 server -> Sending packet 3 (1045 bytes) for connection 17d45902c541bbc4520d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:42 server -> Sending packet 6 (22 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:42 server Skipping packet number 5 2025/09/12 02:06:42 server -> Sending packet 7 (288 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:42 server -> &wire.NewTokenFrame{Token: 0x4dc0c43ddab9c98120f750f44f1ba467c988545365b0b10d4f42469db0f7012a374b6577bf39c42d8dd34b2fa4297242b41639f9fc847bcba36cbd248db6824fd9adee8006cce6b2ffa76e93d9e01bf6094cafcaf18ea7fdc50172} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:42 server <- Reading packet 7 (26 bytes) for connection e56704a0, 1-RTT 2025/09/12 02:06:42 server Short Header{DestConnectionID: e56704a0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:42 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:42 Replacing connection for connection IDs [e56704a0 6d58f916 f7af3977 17d45902c541bbc4520d 5db90db3] with a closed connection. 2025/09/12 02:06:42 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:42 server Connection 17d45902c541bbc4520d closed. 2025/09/12 02:06:42 server <- Received Initial packet. 2025/09/12 02:06:42 Created qlog file: /logs/qlog/aec963138c9f0a952b3cc5735aef8b80.sqlog 2025/09/12 02:06:42 server Changing connection ID to 52a92c7d. 2025/09/12 02:06:42 Adding connection IDs aec963138c9f0a952b3cc5735aef8b80 and 52a92c7d for a new connection. 2025/09/12 02:06:42 server <- Reading packet 0 (1280 bytes) for connection aec963138c9f0a952b3cc5735aef8b80, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: aec963138c9f0a952b3cc5735aef8b80, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 02:06:42 server -> Sending packet 0 (37 bytes) for connection aec963138c9f0a952b3cc5735aef8b80, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 52a92c7d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:42 server <- Reading packet 2 (1280 bytes) for connection 52a92c7d, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: 52a92c7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 1232, Data length: 277, Offset + Data length: 1509} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:42 Adding connection ID 4c063af3. 2025/09/12 02:06:42 Adding connection ID 3f3861bb. 2025/09/12 02:06:42 Adding connection ID b666d1fc. 2025/09/12 02:06:42 server -> Sending packet 1 (1280 bytes) for connection aec963138c9f0a952b3cc5735aef8b80, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 52a92c7d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:42 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:42 server -> Sending packet 0 (845 bytes) for connection aec963138c9f0a952b3cc5735aef8b80, Handshake 2025/09/12 02:06:42 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 52a92c7d, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3f3861bb, StatelessResetToken: 0xaf79a28cec2b3ab769591b4ca0c2256a} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b666d1fc, StatelessResetToken: 0xe87b0c066eb257d82c786b97f9a4d539} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c063af3, StatelessResetToken: 0x1875177bef7cce40408542f8e17c2ed9} 2025/09/12 02:06:42 server <- Reading packet 3 (1280 bytes) for connection 52a92c7d, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: 52a92c7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 1232, Data length: 277, Offset + Data length: 1509} 2025/09/12 02:06:42 server -> Sending packet 2 (39 bytes) for connection aec963138c9f0a952b3cc5735aef8b80, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 52a92c7d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:42 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:42 server <- Reading packet 4 (1280 bytes) for connection 52a92c7d, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: 52a92c7d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:42 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:42 server newly acked packets (1): [1] 2025/09/12 02:06:42 server updated RTT: 33.252714ms (σ: 16.626357ms) 2025/09/12 02:06:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:06:42 server -> Sending packet 18 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:42 server -> Sending packet 19 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:42 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:42 server -> Sending packet 1 (754 bytes) for connection aec963138c9f0a952b3cc5735aef8b80, Handshake 2025/09/12 02:06:42 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 52a92c7d, PacketNumber: 1, PacketNumberLen: 2, Length: 741, Version: v1} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/09/12 02:06:42 server -> Sending packet 2 (754 bytes) for connection aec963138c9f0a952b3cc5735aef8b80, Handshake 2025/09/12 02:06:42 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 52a92c7d, PacketNumber: 2, PacketNumberLen: 2, Length: 741, Version: v1} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/09/12 02:06:42 server Queueing packet (42 bytes) for later decryption 2025/09/12 02:06:42 server <- Reading packet 1 (70 bytes) for connection 52a92c7d, Handshake 2025/09/12 02:06:42 server Long Header{Type: Handshake, DestConnectionID: 52a92c7d, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:42 server Dropping Initial keys. 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:42 server Dropping Handshake keys. 2025/09/12 02:06:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:42 server -> Sending packet 2 (360 bytes) for connection aec963138c9f0a952b3cc5735aef8b80, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c063af3, StatelessResetToken: 0x1875177bef7cce40408542f8e17c2ed9} 2025/09/12 02:06:42 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:42 server -> &wire.NewTokenFrame{Token: 0xcb8e3fd416694e5ec95582695d377a45b4cd6139e9385292b7c6dda02bee710d48597cf6151635d1151b3f8258885a975acab5f75e995ff201bdbea52a73570bfaa2289af41eab623244e3e6671f4c33c0f78d9427990151d93508} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3f3861bb, StatelessResetToken: 0xaf79a28cec2b3ab769591b4ca0c2256a} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b666d1fc, StatelessResetToken: 0xe87b0c066eb257d82c786b97f9a4d539} 2025/09/12 02:06:42 server -> Sending packet 3 (360 bytes) for connection aec963138c9f0a952b3cc5735aef8b80, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c063af3, StatelessResetToken: 0x1875177bef7cce40408542f8e17c2ed9} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3f3861bb, StatelessResetToken: 0xaf79a28cec2b3ab769591b4ca0c2256a} 2025/09/12 02:06:42 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:42 server -> &wire.NewTokenFrame{Token: 0xcb8e3fd416694e5ec95582695d377a45b4cd6139e9385292b7c6dda02bee710d48597cf6151635d1151b3f8258885a975acab5f75e995ff201bdbea52a73570bfaa2289af41eab623244e3e6671f4c33c0f78d9427990151d93508} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b666d1fc, StatelessResetToken: 0xe87b0c066eb257d82c786b97f9a4d539} 2025/09/12 02:06:42 server <- Reading packet 0 (42 bytes) for connection 52a92c7d, 1-RTT 2025/09/12 02:06:42 server Short Header{DestConnectionID: 52a92c7d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:42 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:42 server -> Sending packet 4 (28 bytes) for connection aec963138c9f0a952b3cc5735aef8b80, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.289647ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:42 Received request: GET /xikohijgjb 2025/09/12 02:06:42 server -> Sending packet 5 (1045 bytes) for connection aec963138c9f0a952b3cc5735aef8b80, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:42 server <- Reading packet 1 (33 bytes) for connection 4c063af3, 1-RTT 2025/09/12 02:06:42 server Short Header{DestConnectionID: 4c063af3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 256µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:42 server newly acked packets (1): [3] 2025/09/12 02:06:42 server ECN capability confirmed. 2025/09/12 02:06:42 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:42 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:42 server <- Reading packet 2 (26 bytes) for connection 4c063af3, 1-RTT 2025/09/12 02:06:42 server Short Header{DestConnectionID: 4c063af3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:42 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:42 Replacing connection for connection IDs [4c063af3 3f3861bb b666d1fc aec963138c9f0a952b3cc5735aef8b80 52a92c7d] with a closed connection. 2025/09/12 02:06:42 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:42 server Connection aec963138c9f0a952b3cc5735aef8b80 closed. 2025/09/12 02:06:42 server <- Received Initial packet. 2025/09/12 02:06:42 Created qlog file: /logs/qlog/5776a09ccc618ba487.sqlog 2025/09/12 02:06:42 server Changing connection ID to cca09957. 2025/09/12 02:06:42 Adding connection IDs 5776a09ccc618ba487 and cca09957 for a new connection. 2025/09/12 02:06:42 server <- Reading packet 0 (1280 bytes) for connection 5776a09ccc618ba487, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: 5776a09ccc618ba487, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:42 server -> Sending packet 0 (37 bytes) for connection 5776a09ccc618ba487, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cca09957, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:42 server <- Reading packet 1 (1280 bytes) for connection 5776a09ccc618ba487, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: 5776a09ccc618ba487, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 1239, Data length: 271, Offset + Data length: 1510} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:42 Adding connection ID 7b429bc2. 2025/09/12 02:06:42 Adding connection ID ec5dd8ba. 2025/09/12 02:06:42 Adding connection ID 52262b2d. 2025/09/12 02:06:42 server -> Sending packet 1 (1280 bytes) for connection 5776a09ccc618ba487, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cca09957, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:42 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:42 server -> Sending packet 0 (840 bytes) for connection 5776a09ccc618ba487, Handshake 2025/09/12 02:06:42 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cca09957, PacketNumber: 0, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52262b2d, StatelessResetToken: 0x42a5dfbed375099414854a05caa0aeed} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b429bc2, StatelessResetToken: 0x73b09b1c2fd2803ed3839d3923122fd8} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec5dd8ba, StatelessResetToken: 0xbb47c416d601b36c8ffa85154db3d42d} 2025/09/12 02:06:42 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:42 server -> Sending packet 2 (1280 bytes) for connection 5776a09ccc618ba487, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cca09957, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:42 server -> Sending packet 3 (1280 bytes) for connection 5776a09ccc618ba487, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cca09957, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:42 server <- Reading packet 4 (1280 bytes) for connection cca09957, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: cca09957, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:42 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 02:06:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:06:42 server -> Sending packet 22 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:42 server -> Sending packet 23 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:42 Removing connection IDs [4c063af3 3f3861bb b666d1fc aec963138c9f0a952b3cc5735aef8b80 52a92c7d] for a closed connection after it has been retired. 2025/09/12 02:06:42 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:06:42 server -> Sending packet 1 (749 bytes) for connection 5776a09ccc618ba487, Handshake 2025/09/12 02:06:42 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cca09957, PacketNumber: 1, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 02:06:42 server -> Sending packet 2 (749 bytes) for connection 5776a09ccc618ba487, Handshake 2025/09/12 02:06:42 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cca09957, PacketNumber: 2, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 02:06:42 server <- Reading packet 1 (70 bytes) for connection 7b429bc2, Handshake 2025/09/12 02:06:42 server Long Header{Type: Handshake, DestConnectionID: 7b429bc2, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:42 server Dropping Initial keys. 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:42 server Dropping Handshake keys. 2025/09/12 02:06:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:42 server -> Sending packet 2 (358 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:42 server -> &wire.NewTokenFrame{Token: 0x9de576d17e7928b2b87e6597c307535789775b80561970c1632d7d8c3ac233f0289adbf9fb508cf1d00fad949ff8d4aad9f61963112d287480452ec3467728047deee3ba1054e7c23adabd3dcb8943b31a9e41be51bed2ebcf} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec5dd8ba, StatelessResetToken: 0xbb47c416d601b36c8ffa85154db3d42d} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52262b2d, StatelessResetToken: 0x42a5dfbed375099414854a05caa0aeed} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b429bc2, StatelessResetToken: 0x73b09b1c2fd2803ed3839d3923122fd8} 2025/09/12 02:06:42 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:42 server -> Sending packet 3 (358 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52262b2d, StatelessResetToken: 0x42a5dfbed375099414854a05caa0aeed} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b429bc2, StatelessResetToken: 0x73b09b1c2fd2803ed3839d3923122fd8} 2025/09/12 02:06:42 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:42 server -> &wire.NewTokenFrame{Token: 0x9de576d17e7928b2b87e6597c307535789775b80561970c1632d7d8c3ac233f0289adbf9fb508cf1d00fad949ff8d4aad9f61963112d287480452ec3467728047deee3ba1054e7c23adabd3dcb8943b31a9e41be51bed2ebcf} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec5dd8ba, StatelessResetToken: 0xbb47c416d601b36c8ffa85154db3d42d} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:42 server -> Sending packet 4 (1366 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.PingFrame{} 2025/09/12 02:06:42 server <- Reading packet 3 (35 bytes) for connection 7b429bc2, 1-RTT 2025/09/12 02:06:42 server Short Header{DestConnectionID: 7b429bc2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 160µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:42 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:42 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:42 server -> Sending packet 5 (27 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 100.097µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:42 server <- Reading packet 4 (42 bytes) for connection 7b429bc2, 1-RTT 2025/09/12 02:06:42 server Short Header{DestConnectionID: 7b429bc2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:42 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:42 Received request: GET /jftufdvkkq 2025/09/12 02:06:42 server -> Sending packet 6 (1053 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 324.843µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:42 server <- Reading packet 5 (1366 bytes) for connection 7b429bc2, 1-RTT 2025/09/12 02:06:42 server Short Header{DestConnectionID: 7b429bc2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server <- &wire.PingFrame{} 2025/09/12 02:06:42 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:42 server <- Reading packet 6 (35 bytes) for connection 7b429bc2, 1-RTT 2025/09/12 02:06:42 server Short Header{DestConnectionID: 7b429bc2, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:42 server newly acked packets (1): [4] 2025/09/12 02:06:42 server updated RTT: 32.355374ms (σ: 16.177687ms) 2025/09/12 02:06:42 server ECN capability confirmed. 2025/09/12 02:06:42 server setting loss timer for packet 3 (1-RTT) to 36.399795ms (in 2025-09-12 02:06:42.952243191 +0000 UTC m=+6.850566943) 2025/09/12 02:06:42 server Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 02:06:42.952243191 +0000 UTC m=+6.850566943 2025/09/12 02:06:42 server lost packet 3 (time threshold) 2025/09/12 02:06:42 server -> Sending packet 7 (367 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 4.318943ms, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52262b2d, StatelessResetToken: 0x42a5dfbed375099414854a05caa0aeed} 2025/09/12 02:06:42 server -> &wire.NewTokenFrame{Token: 0x9de576d17e7928b2b87e6597c307535789775b80561970c1632d7d8c3ac233f0289adbf9fb508cf1d00fad949ff8d4aad9f61963112d287480452ec3467728047deee3ba1054e7c23adabd3dcb8943b31a9e41be51bed2ebcf} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b429bc2, StatelessResetToken: 0x73b09b1c2fd2803ed3839d3923122fd8} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec5dd8ba, StatelessResetToken: 0xbb47c416d601b36c8ffa85154db3d42d} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:42 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:42 server <- Received Initial packet. 2025/09/12 02:06:42 Created qlog file: /logs/qlog/8a20e3c4e4c26596288143ce.sqlog 2025/09/12 02:06:42 server Changing connection ID to 6fbeb111. 2025/09/12 02:06:42 Adding connection IDs 8a20e3c4e4c26596288143ce and 6fbeb111 for a new connection. 2025/09/12 02:06:42 server <- Reading packet 0 (1280 bytes) for connection 8a20e3c4e4c26596288143ce, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: 8a20e3c4e4c26596288143ce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 67, Data length: 1169, Offset + Data length: 1236} 2025/09/12 02:06:42 server -> Sending packet 0 (37 bytes) for connection 8a20e3c4e4c26596288143ce, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6fbeb111, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:42 server <- Reading packet 1 (1280 bytes) for connection 8a20e3c4e4c26596288143ce, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: 8a20e3c4e4c26596288143ce, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:42 server <- &wire.CryptoFrame{Offset: 1236, Data length: 273, Offset + Data length: 1509} 2025/09/12 02:06:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:42 Adding connection ID 5f910bca. 2025/09/12 02:06:42 Adding connection ID b6ce9d21. 2025/09/12 02:06:42 Adding connection ID 8f8174ce. 2025/09/12 02:06:42 server -> Sending packet 1 (1280 bytes) for connection 8a20e3c4e4c26596288143ce, Initial 2025/09/12 02:06:42 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6fbeb111, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:42 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:42 server -> Sending packet 0 (847 bytes) for connection 8a20e3c4e4c26596288143ce, Handshake 2025/09/12 02:06:42 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6fbeb111, PacketNumber: 0, PacketNumberLen: 2, Length: 743, Version: v1} 2025/09/12 02:06:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/09/12 02:06:42 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6ce9d21, StatelessResetToken: 0x61840a597aca3e314144aceccffe5593} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8f8174ce, StatelessResetToken: 0x8e337624083c61d409a9812028741ef3} 2025/09/12 02:06:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f910bca, StatelessResetToken: 0xbdf0d48096be9ae12c7e108f48aa6271} 2025/09/12 02:06:43 server <- Reading packet 2 (1280 bytes) for connection 6fbeb111, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: 6fbeb111, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:43 server newly acked packets (1): [1] 2025/09/12 02:06:43 server updated RTT: 33.125845ms (σ: 16.562922ms) 2025/09/12 02:06:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:43 server -> Sending packet 9 (1045 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:43 server Skipping packet number 8 2025/09/12 02:06:43 server -> Sending packet 10 (358 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec5dd8ba, StatelessResetToken: 0xbb47c416d601b36c8ffa85154db3d42d} 2025/09/12 02:06:43 server -> &wire.NewTokenFrame{Token: 0x9de576d17e7928b2b87e6597c307535789775b80561970c1632d7d8c3ac233f0289adbf9fb508cf1d00fad949ff8d4aad9f61963112d287480452ec3467728047deee3ba1054e7c23adabd3dcb8943b31a9e41be51bed2ebcf} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52262b2d, StatelessResetToken: 0x42a5dfbed375099414854a05caa0aeed} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b429bc2, StatelessResetToken: 0x73b09b1c2fd2803ed3839d3923122fd8} 2025/09/12 02:06:43 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:43 server -> Sending packet 1 (756 bytes) for connection 8a20e3c4e4c26596288143ce, Handshake 2025/09/12 02:06:43 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6fbeb111, PacketNumber: 1, PacketNumberLen: 2, Length: 743, Version: v1} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/09/12 02:06:43 server -> Sending packet 2 (756 bytes) for connection 8a20e3c4e4c26596288143ce, Handshake 2025/09/12 02:06:43 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6fbeb111, PacketNumber: 2, PacketNumberLen: 2, Length: 743, Version: v1} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/09/12 02:06:43 server <- Reading packet 3 (1280 bytes) for connection 6fbeb111, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: 6fbeb111, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server <- &wire.PingFrame{} 2025/09/12 02:06:43 server -> Sending packet 2 (37 bytes) for connection 8a20e3c4e4c26596288143ce, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6fbeb111, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:43 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:43 server <- Reading packet 0 (75 bytes) for connection 6fbeb111, Handshake 2025/09/12 02:06:43 server Long Header{Type: Handshake, DestConnectionID: 6fbeb111, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:43 server Dropping Initial keys. 2025/09/12 02:06:43 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:43 server Dropping Handshake keys. 2025/09/12 02:06:43 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/09/12 02:06:43 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/09/12 02:06:43 server <- Reading packet 0 (42 bytes) for connection 6fbeb111, 1-RTT 2025/09/12 02:06:43 server Short Header{DestConnectionID: 6fbeb111, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:43 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:43 server -> Sending packet 2 (365 bytes) for connection 8a20e3c4e4c26596288143ce, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 329.835µs} 2025/09/12 02:06:43 server -> &wire.NewTokenFrame{Token: 0xaae5b3c5fc9e2b24e2602ca5bc798ece24c13b6892fa997b51199a7f7b6a236a0c52e6f536c2eeab2d687fb862f63b55ea84b808d7ad40231a62d18274eeb20288eb58be9442e35063cd8c4ed1ae8f32f226305397ee190520ce32} 2025/09/12 02:06:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6ce9d21, StatelessResetToken: 0x61840a597aca3e314144aceccffe5593} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8f8174ce, StatelessResetToken: 0x8e337624083c61d409a9812028741ef3} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f910bca, StatelessResetToken: 0xbdf0d48096be9ae12c7e108f48aa6271} 2025/09/12 02:06:43 server -> Sending packet 3 (360 bytes) for connection 8a20e3c4e4c26596288143ce, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 Received request: GET /nmuvnnqsbu 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b6ce9d21, StatelessResetToken: 0x61840a597aca3e314144aceccffe5593} 2025/09/12 02:06:43 server -> &wire.NewTokenFrame{Token: 0xaae5b3c5fc9e2b24e2602ca5bc798ece24c13b6892fa997b51199a7f7b6a236a0c52e6f536c2eeab2d687fb862f63b55ea84b808d7ad40231a62d18274eeb20288eb58be9442e35063cd8c4ed1ae8f32f226305397ee190520ce32} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8f8174ce, StatelessResetToken: 0x8e337624083c61d409a9812028741ef3} 2025/09/12 02:06:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f910bca, StatelessResetToken: 0xbdf0d48096be9ae12c7e108f48aa6271} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:43 server -> Sending packet 4 (1045 bytes) for connection 8a20e3c4e4c26596288143ce, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:43 server <- Reading packet 2 (26 bytes) for connection 5f910bca, 1-RTT 2025/09/12 02:06:43 server Short Header{DestConnectionID: 5f910bca, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:43 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:43 Replacing connection for connection IDs [6fbeb111 5f910bca b6ce9d21 8f8174ce 8a20e3c4e4c26596288143ce] with a closed connection. 2025/09/12 02:06:43 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:43 server Connection 8a20e3c4e4c26596288143ce closed. 2025/09/12 02:06:43 server <- Received Initial packet. 2025/09/12 02:06:43 Created qlog file: /logs/qlog/0e5e433e65b2c8d2898a1142ca.sqlog 2025/09/12 02:06:43 server Changing connection ID to e48a4903. 2025/09/12 02:06:43 Adding connection IDs 0e5e433e65b2c8d2898a1142ca and e48a4903 for a new connection. 2025/09/12 02:06:43 server <- Reading packet 0 (1280 bytes) for connection 0e5e433e65b2c8d2898a1142ca, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: 0e5e433e65b2c8d2898a1142ca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 02:06:43 server -> Sending packet 0 (37 bytes) for connection 0e5e433e65b2c8d2898a1142ca, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e48a4903, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:43 server <- Reading packet 2 (1280 bytes) for connection e48a4903, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: e48a4903, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 1235, Data length: 269, Offset + Data length: 1504} 2025/09/12 02:06:43 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:43 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:43 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:43 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:43 Adding connection ID 01c34651. 2025/09/12 02:06:43 Adding connection ID 08a6cb6e. 2025/09/12 02:06:43 Adding connection ID e8646b0d. 2025/09/12 02:06:43 server -> Sending packet 1 (1280 bytes) for connection 0e5e433e65b2c8d2898a1142ca, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e48a4903, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:43 server <- Reading packet 3 (1280 bytes) for connection e48a4903, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: e48a4903, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 1235, Data length: 269, Offset + Data length: 1504} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:43 server -> Sending coalesced packet (2 parts, 874 bytes) for connection 0e5e433e65b2c8d2898a1142ca 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e48a4903, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:43 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:43 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e48a4903, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01c34651, StatelessResetToken: 0xfc3efc4e9c1ae132a56149e5f5d06e0b} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e8646b0d, StatelessResetToken: 0x3ec0a536f5f1388a402483117814d23c} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 08a6cb6e, StatelessResetToken: 0x6e9612b3c032b878614c07fbf9ea36d5} 2025/09/12 02:06:43 Removing connection ID 718bd98e12efce035365. 2025/09/12 02:06:43 Removing connection ID 9d7e91cf. 2025/09/12 02:06:43 server -> Sending packet 8 (1366 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.PingFrame{} 2025/09/12 02:06:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:43 server -> Sending packet 12 (1045 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:43 server Skipping packet number 11 2025/09/12 02:06:43 server -> Sending packet 13 (358 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52262b2d, StatelessResetToken: 0x42a5dfbed375099414854a05caa0aeed} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b429bc2, StatelessResetToken: 0x73b09b1c2fd2803ed3839d3923122fd8} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec5dd8ba, StatelessResetToken: 0xbb47c416d601b36c8ffa85154db3d42d} 2025/09/12 02:06:43 server -> &wire.NewTokenFrame{Token: 0x9de576d17e7928b2b87e6597c307535789775b80561970c1632d7d8c3ac233f0289adbf9fb508cf1d00fad949ff8d4aad9f61963112d287480452ec3467728047deee3ba1054e7c23adabd3dcb8943b31a9e41be51bed2ebcf} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:43 server -> Sending packet 14 (1409 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.PingFrame{} 2025/09/12 02:06:43 Removing connection IDs [6fbeb111 5f910bca b6ce9d21 8f8174ce 8a20e3c4e4c26596288143ce] for a closed connection after it has been retired. 2025/09/12 02:06:43 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:43 server -> Sending packet 3 (1280 bytes) for connection 0e5e433e65b2c8d2898a1142ca, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e48a4903, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:43 server -> Sending packet 4 (1280 bytes) for connection 0e5e433e65b2c8d2898a1142ca, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e48a4903, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:43 server <- Reading packet 5 (1280 bytes) for connection e48a4903, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: e48a4903, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:43 server Parsed a coalesced packet. Part 1: 1166 bytes. Remaining: 114 bytes. 2025/09/12 02:06:43 server <- Reading packet 6 (1166 bytes) for connection 01c34651, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: 01c34651, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1152, Version: v1} 2025/09/12 02:06:43 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:43 server newly acked packets (1): [4] 2025/09/12 02:06:43 server updated RTT: 34.482567ms (σ: 17.241283ms) 2025/09/12 02:06:43 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 44 bytes. 2025/09/12 02:06:43 server <- Reading packet 0 (70 bytes) for connection 01c34651, Handshake 2025/09/12 02:06:43 server Long Header{Type: Handshake, DestConnectionID: 01c34651, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:43 server Dropping Initial keys. 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:43 server Dropping Handshake keys. 2025/09/12 02:06:43 server <- Reading packet 0 (44 bytes) for connection 01c34651, 1-RTT 2025/09/12 02:06:43 server Short Header{DestConnectionID: 01c34651, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:43 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:43 Received request: GET /oufdetoogy 2025/09/12 02:06:43 server -> Sending packet 2 (365 bytes) for connection 0e5e433e65b2c8d2898a1142ca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 313.455µs} 2025/09/12 02:06:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e8646b0d, StatelessResetToken: 0x3ec0a536f5f1388a402483117814d23c} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 08a6cb6e, StatelessResetToken: 0x6e9612b3c032b878614c07fbf9ea36d5} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01c34651, StatelessResetToken: 0xfc3efc4e9c1ae132a56149e5f5d06e0b} 2025/09/12 02:06:43 server -> &wire.NewTokenFrame{Token: 0x9d5cbe3b100bd1b9669780430a532fe08c836d14bea440c6cf48011eecef9257628d20bf67eef82b6a6ec096aaf8123ecca4350fffa0db4a0581c7a9c5ca53286173650f627d2438e93c7caff39f26419b93a2770e2a7207e91afc} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:43 server -> Sending packet 3 (1280 bytes) for connection 0e5e433e65b2c8d2898a1142ca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:43 server -> &wire.NewTokenFrame{Token: 0x9d5cbe3b100bd1b9669780430a532fe08c836d14bea440c6cf48011eecef9257628d20bf67eef82b6a6ec096aaf8123ecca4350fffa0db4a0581c7a9c5ca53286173650f627d2438e93c7caff39f26419b93a2770e2a7207e91afc} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e8646b0d, StatelessResetToken: 0x3ec0a536f5f1388a402483117814d23c} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01c34651, StatelessResetToken: 0xfc3efc4e9c1ae132a56149e5f5d06e0b} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 08a6cb6e, StatelessResetToken: 0x6e9612b3c032b878614c07fbf9ea36d5} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:43 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 918, Offset + Data length: 918} 2025/09/12 02:06:43 server -> Sending packet 4 (129 bytes) for connection 0e5e433e65b2c8d2898a1142ca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 918, Data length: 106, Offset + Data length: 1024} 2025/09/12 02:06:43 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/09/12 02:06:43 server <- Reading packet 1 (31 bytes) for connection 01c34651, 1-RTT 2025/09/12 02:06:43 server Short Header{DestConnectionID: 01c34651, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.944ms} 2025/09/12 02:06:43 server <- Reading packet 2 (33 bytes) for connection 01c34651, 1-RTT 2025/09/12 02:06:43 server Short Header{DestConnectionID: 01c34651, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 112µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:43 server newly acked packets (1): [4] 2025/09/12 02:06:43 server updated RTT: 34.242ms (σ: 13.41ms) 2025/09/12 02:06:43 server ECN capability confirmed. 2025/09/12 02:06:43 server setting loss timer for packet 3 (1-RTT) to 38.52225ms (in 2025-09-12 02:06:43.52058897 +0000 UTC m=+7.418912732) 2025/09/12 02:06:43 Removing connection ID 5776a09ccc618ba487. 2025/09/12 02:06:43 server Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 02:06:43.52058897 +0000 UTC m=+7.418912732 2025/09/12 02:06:43 server lost packet 3 (time threshold) 2025/09/12 02:06:43 server Canceling loss detection timer. 2025/09/12 02:06:43 server -> Sending packet 5 (1280 bytes) for connection 0e5e433e65b2c8d2898a1142ca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01c34651, StatelessResetToken: 0xfc3efc4e9c1ae132a56149e5f5d06e0b} 2025/09/12 02:06:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:43 server -> &wire.NewTokenFrame{Token: 0x9d5cbe3b100bd1b9669780430a532fe08c836d14bea440c6cf48011eecef9257628d20bf67eef82b6a6ec096aaf8123ecca4350fffa0db4a0581c7a9c5ca53286173650f627d2438e93c7caff39f26419b93a2770e2a7207e91afc} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 08a6cb6e, StatelessResetToken: 0x6e9612b3c032b878614c07fbf9ea36d5} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e8646b0d, StatelessResetToken: 0x3ec0a536f5f1388a402483117814d23c} 2025/09/12 02:06:43 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 918, Offset + Data length: 918} 2025/09/12 02:06:43 Removing connection ID cca09957. 2025/09/12 02:06:43 server <- Reading packet 3 (26 bytes) for connection 01c34651, 1-RTT 2025/09/12 02:06:43 server Short Header{DestConnectionID: 01c34651, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:43 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:43 Replacing connection for connection IDs [e8646b0d 01c34651 08a6cb6e 0e5e433e65b2c8d2898a1142ca e48a4903] with a closed connection. 2025/09/12 02:06:43 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:43 server Connection 0e5e433e65b2c8d2898a1142ca closed. 2025/09/12 02:06:43 server <- Received Initial packet. 2025/09/12 02:06:43 Created qlog file: /logs/qlog/80765982893e1d69cf.sqlog 2025/09/12 02:06:43 server Changing connection ID to 08703717. 2025/09/12 02:06:43 Adding connection IDs 80765982893e1d69cf and 08703717 for a new connection. 2025/09/12 02:06:43 server <- Reading packet 0 (1280 bytes) for connection 80765982893e1d69cf, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: 80765982893e1d69cf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:43 server -> Sending packet 0 (37 bytes) for connection 80765982893e1d69cf, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08703717, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:43 server <- Reading packet 1 (1280 bytes) for connection 80765982893e1d69cf, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: 80765982893e1d69cf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 1239, Data length: 271, Offset + Data length: 1510} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:43 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:43 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:43 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:43 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:43 Adding connection ID 1e0c4628. 2025/09/12 02:06:43 Adding connection ID 5d8c4825. 2025/09/12 02:06:43 Adding connection ID fcd8dc95. 2025/09/12 02:06:43 server -> Sending packet 1 (1280 bytes) for connection 80765982893e1d69cf, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08703717, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:43 server -> Sending packet 0 (829 bytes) for connection 80765982893e1d69cf, Handshake 2025/09/12 02:06:43 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 08703717, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fcd8dc95, StatelessResetToken: 0x4ab05465f568d7645b13596159462021} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5d8c4825, StatelessResetToken: 0xc80e04b58e8c7992fcf2ba92fbad0f74} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1e0c4628, StatelessResetToken: 0xa1c2cc2b591f66b8366754fc758b0cb1} 2025/09/12 02:06:43 server <- Reading packet 3 (1280 bytes) for connection 80765982893e1d69cf, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: 80765982893e1d69cf, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 1239, Data length: 271, Offset + Data length: 1510} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:43 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:43 server -> Sending packet 2 (1280 bytes) for connection 80765982893e1d69cf, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08703717, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:43 server -> Sending packet 3 (1280 bytes) for connection 80765982893e1d69cf, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08703717, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:43 server <- Reading packet 4 (1280 bytes) for connection 08703717, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: 08703717, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/09/12 02:06:43 server <- Reading packet 5 (1280 bytes) for connection 08703717, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: 08703717, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/09/12 02:06:43 server newly acked packets (1): [3] 2025/09/12 02:06:43 server updated RTT: 34.302593ms (σ: 17.151296ms) 2025/09/12 02:06:43 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:43 server -> Sending packet 1 (738 bytes) for connection 80765982893e1d69cf, Handshake 2025/09/12 02:06:43 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 08703717, PacketNumber: 1, PacketNumberLen: 2, Length: 725, Version: v1} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/09/12 02:06:43 server -> Sending packet 2 (738 bytes) for connection 80765982893e1d69cf, Handshake 2025/09/12 02:06:43 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 08703717, PacketNumber: 2, PacketNumberLen: 2, Length: 725, Version: v1} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/09/12 02:06:43 server <- Reading packet 6 (1280 bytes) for connection 08703717, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: 08703717, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:43 server -> Sending packet 4 (39 bytes) for connection 80765982893e1d69cf, Initial 2025/09/12 02:06:43 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 08703717, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:43 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:06:43 server -> Sending packet 16 (1045 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:43 server Skipping packet number 15 2025/09/12 02:06:43 server -> Sending packet 17 (358 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.NewTokenFrame{Token: 0x9de576d17e7928b2b87e6597c307535789775b80561970c1632d7d8c3ac233f0289adbf9fb508cf1d00fad949ff8d4aad9f61963112d287480452ec3467728047deee3ba1054e7c23adabd3dcb8943b31a9e41be51bed2ebcf} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52262b2d, StatelessResetToken: 0x42a5dfbed375099414854a05caa0aeed} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b429bc2, StatelessResetToken: 0x73b09b1c2fd2803ed3839d3923122fd8} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec5dd8ba, StatelessResetToken: 0xbb47c416d601b36c8ffa85154db3d42d} 2025/09/12 02:06:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:43 Removing connection IDs [e8646b0d 01c34651 08a6cb6e 0e5e433e65b2c8d2898a1142ca e48a4903] for a closed connection after it has been retired. 2025/09/12 02:06:43 server <- Reading packet 0 (75 bytes) for connection 08703717, Handshake 2025/09/12 02:06:43 server Long Header{Type: Handshake, DestConnectionID: 08703717, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:43 server Dropping Initial keys. 2025/09/12 02:06:43 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:43 server Dropping Handshake keys. 2025/09/12 02:06:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:43 server -> Sending packet 2 (360 bytes) for connection 80765982893e1d69cf, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.NewTokenFrame{Token: 0x7a304a068f081d84c9118a2289a09b486db23c97c99e3e0f34507a4357da243bdd9f5b7cc642f66c1dd60e1090c11250869cef2c8a065bdeba943d84ee3971339b4434c93cf5961ad177fd4cd998059046e1da15517d7978b07bf2} 2025/09/12 02:06:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1e0c4628, StatelessResetToken: 0xa1c2cc2b591f66b8366754fc758b0cb1} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5d8c4825, StatelessResetToken: 0xc80e04b58e8c7992fcf2ba92fbad0f74} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fcd8dc95, StatelessResetToken: 0x4ab05465f568d7645b13596159462021} 2025/09/12 02:06:43 server -> Sending packet 3 (360 bytes) for connection 80765982893e1d69cf, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.NewTokenFrame{Token: 0x7a304a068f081d84c9118a2289a09b486db23c97c99e3e0f34507a4357da243bdd9f5b7cc642f66c1dd60e1090c11250869cef2c8a065bdeba943d84ee3971339b4434c93cf5961ad177fd4cd998059046e1da15517d7978b07bf2} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1e0c4628, StatelessResetToken: 0xa1c2cc2b591f66b8366754fc758b0cb1} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5d8c4825, StatelessResetToken: 0xc80e04b58e8c7992fcf2ba92fbad0f74} 2025/09/12 02:06:43 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fcd8dc95, StatelessResetToken: 0x4ab05465f568d7645b13596159462021} 2025/09/12 02:06:43 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/09/12 02:06:43 server <- Reading packet 3 (42 bytes) for connection 1e0c4628, 1-RTT 2025/09/12 02:06:43 server Short Header{DestConnectionID: 1e0c4628, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:43 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:43 server <- Reading packet 4 (25 bytes) for connection 1e0c4628, 1-RTT 2025/09/12 02:06:43 server Short Header{DestConnectionID: 1e0c4628, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:43 Received request: GET /darypgzhhf 2025/09/12 02:06:43 server -> Sending packet 4 (27 bytes) for connection 80765982893e1d69cf, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 149.599µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:43 server -> Sending packet 5 (1045 bytes) for connection 80765982893e1d69cf, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:43 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:44 server <- Reading packet 5 (33 bytes) for connection 1e0c4628, 1-RTT 2025/09/12 02:06:44 server Short Header{DestConnectionID: 1e0c4628, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 64µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:44 server newly acked packets (1): [5] 2025/09/12 02:06:44 server updated RTT: 33.951ms (σ: 13.563ms) 2025/09/12 02:06:44 server ECN capability confirmed. 2025/09/12 02:06:44 server lost packet 3 (time threshold) 2025/09/12 02:06:44 server Canceling loss detection timer. 2025/09/12 02:06:44 server <- Reading packet 6 (26 bytes) for connection 1e0c4628, 1-RTT 2025/09/12 02:06:44 server Short Header{DestConnectionID: 1e0c4628, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:44 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:44 Replacing connection for connection IDs [5d8c4825 fcd8dc95 1e0c4628 80765982893e1d69cf 08703717] with a closed connection. 2025/09/12 02:06:44 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:44 server Connection 80765982893e1d69cf closed. 2025/09/12 02:06:44 server <- Received Initial packet. 2025/09/12 02:06:44 Created qlog file: /logs/qlog/5a875719f737684cc269.sqlog 2025/09/12 02:06:44 server Changing connection ID to 34dd36cb. 2025/09/12 02:06:44 Adding connection IDs 5a875719f737684cc269 and 34dd36cb for a new connection. 2025/09/12 02:06:44 server <- Reading packet 1 (1280 bytes) for connection 5a875719f737684cc269, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: 5a875719f737684cc269, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 1238, Data length: 273, Offset + Data length: 1511} 2025/09/12 02:06:44 server -> Sending packet 0 (37 bytes) for connection 5a875719f737684cc269, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34dd36cb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:44 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:44 server <- Reading packet 2 (1280 bytes) for connection 34dd36cb, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: 34dd36cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:44 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:44 Adding connection ID 76af0592. 2025/09/12 02:06:44 Adding connection ID 88e01a8a. 2025/09/12 02:06:44 Adding connection ID f93ef4fc. 2025/09/12 02:06:44 server -> Sending packet 1 (1280 bytes) for connection 5a875719f737684cc269, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 34dd36cb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:44 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:44 server -> Sending packet 0 (838 bytes) for connection 5a875719f737684cc269, Handshake 2025/09/12 02:06:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34dd36cb, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76af0592, StatelessResetToken: 0x1f2b67f5d4653d59dae98581fa0119ea} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f93ef4fc, StatelessResetToken: 0x5e3d73f957d497879f324d0bc6ebbe6a} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 88e01a8a, StatelessResetToken: 0x8e105b96ca2e30e79c818df54803a005} 2025/09/12 02:06:44 Removing connection IDs [e56704a0 6d58f916 f7af3977 17d45902c541bbc4520d 5db90db3] for a closed connection after it has been retired. 2025/09/12 02:06:44 server <- Reading packet 3 (1280 bytes) for connection 34dd36cb, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: 34dd36cb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:44 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:44 server newly acked packets (1): [1] 2025/09/12 02:06:44 server updated RTT: 33.110724ms (σ: 16.555362ms) 2025/09/12 02:06:44 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:44 server -> Sending packet 1 (747 bytes) for connection 5a875719f737684cc269, Handshake 2025/09/12 02:06:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34dd36cb, PacketNumber: 1, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 02:06:44 server -> Sending packet 2 (747 bytes) for connection 5a875719f737684cc269, Handshake 2025/09/12 02:06:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 34dd36cb, PacketNumber: 2, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 02:06:44 server <- Reading packet 1 (70 bytes) for connection 76af0592, Handshake 2025/09/12 02:06:44 server Long Header{Type: Handshake, DestConnectionID: 76af0592, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:44 server Dropping Initial keys. 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:44 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Dropping Handshake keys. 2025/09/12 02:06:44 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:44 server -> Sending packet 1 (288 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.NewTokenFrame{Token: 0x7ab2cdcd8b45e0e7029a59eba6eb1579109fdfdb0fdddfe2ff57c3b637693c60c3139f21d0dbf5fdbfb6aba4993591b964705df87c20cb33da6b6adde6fdc4349d21af7126641b9449727798c0427b0d0f2200306d2864ffea3ad7} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:44 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:44 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/09/12 02:06:44 Removing connection IDs [5d8c4825 fcd8dc95 1e0c4628 80765982893e1d69cf 08703717] for a closed connection after it has been retired. 2025/09/12 02:06:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:44 server -> Sending packet 3 (91 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 88e01a8a, StatelessResetToken: 0x8e105b96ca2e30e79c818df54803a005} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76af0592, StatelessResetToken: 0x1f2b67f5d4653d59dae98581fa0119ea} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f93ef4fc, StatelessResetToken: 0x5e3d73f957d497879f324d0bc6ebbe6a} 2025/09/12 02:06:44 server Skipping packet number 2 2025/09/12 02:06:44 server -> Sending packet 4 (288 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:44 server -> &wire.NewTokenFrame{Token: 0x7ab2cdcd8b45e0e7029a59eba6eb1579109fdfdb0fdddfe2ff57c3b637693c60c3139f21d0dbf5fdbfb6aba4993591b964705df87c20cb33da6b6adde6fdc4349d21af7126641b9449727798c0427b0d0f2200306d2864ffea3ad7} 2025/09/12 02:06:44 server <- Reading packet 5 (33 bytes) for connection 76af0592, 1-RTT 2025/09/12 02:06:44 server Short Header{DestConnectionID: 76af0592, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 104µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:44 server newly acked packets (1): [3] 2025/09/12 02:06:44 server updated RTT: 32.846ms (σ: 12.943ms) 2025/09/12 02:06:44 server ECN capability confirmed. 2025/09/12 02:06:44 server <- Reading packet 6 (34 bytes) for connection 76af0592, 1-RTT 2025/09/12 02:06:44 server Short Header{DestConnectionID: 76af0592, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 25.304ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:44 server newly acked packets (1): [4] 2025/09/12 02:06:44 server updated RTT: 32.63ms (σ: 10.139ms) 2025/09/12 02:06:44 server Canceling loss detection timer. 2025/09/12 02:06:44 server -> Sending packet 5 (1366 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.PingFrame{} 2025/09/12 02:06:44 server <- Reading packet 9 (44 bytes) for connection 76af0592, 1-RTT 2025/09/12 02:06:44 server Short Header{DestConnectionID: 76af0592, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:44 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:44 server -> Sending packet 6 (29 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}}, DelayTime: 103.804µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:44 Received request: GET /gsqjcucwhz 2025/09/12 02:06:44 server -> Sending packet 7 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:44 Removing connection ID 5a875719f737684cc269. 2025/09/12 02:06:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:44 server -> Sending packet 9 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:44 server -> Sending packet 10 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:44 server <- Reading packet 11 (35 bytes) for connection 76af0592, 1-RTT 2025/09/12 02:06:44 server Short Header{DestConnectionID: 76af0592, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 144µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:06:44 server <- Received Initial packet. 2025/09/12 02:06:44 Created qlog file: /logs/qlog/49afbe3c7ce77f41.sqlog 2025/09/12 02:06:44 server Changing connection ID to 920ac18e. 2025/09/12 02:06:44 Adding connection IDs 49afbe3c7ce77f41 and 920ac18e for a new connection. 2025/09/12 02:06:44 server <- Reading packet 0 (1280 bytes) for connection 49afbe3c7ce77f41, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: 49afbe3c7ce77f41, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:44 server -> Sending packet 0 (37 bytes) for connection 49afbe3c7ce77f41, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 920ac18e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:44 server <- Reading packet 1 (1280 bytes) for connection 49afbe3c7ce77f41, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: 49afbe3c7ce77f41, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 1240, Data length: 264, Offset + Data length: 1504} 2025/09/12 02:06:44 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:44 Adding connection ID ebf4c843. 2025/09/12 02:06:44 Adding connection ID 8d66d9d3. 2025/09/12 02:06:44 Adding connection ID fc736a3d. 2025/09/12 02:06:44 server -> Sending packet 1 (1280 bytes) for connection 49afbe3c7ce77f41, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 920ac18e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:44 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:44 server -> Sending packet 0 (829 bytes) for connection 49afbe3c7ce77f41, Handshake 2025/09/12 02:06:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 920ac18e, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fc736a3d, StatelessResetToken: 0x4fc5859382014af96fe91b8849b4a33b} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8d66d9d3, StatelessResetToken: 0x046efd44545179ce73f31e7b04f0f42c} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ebf4c843, StatelessResetToken: 0xef2ba1adb0bbd8bad3ed875b8bdf8367} 2025/09/12 02:06:44 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 44 bytes. 2025/09/12 02:06:44 server <- Reading packet 0 (75 bytes) for connection ebf4c843, Handshake 2025/09/12 02:06:44 server Long Header{Type: Handshake, DestConnectionID: ebf4c843, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:44 server Dropping Initial keys. 2025/09/12 02:06:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:44 server newly acked packets (1): [0] 2025/09/12 02:06:44 server updated RTT: 33.201628ms (σ: 16.600814ms) 2025/09/12 02:06:44 server Canceling loss detection timer. 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:44 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Dropping Handshake keys. 2025/09/12 02:06:44 server <- Reading packet 0 (44 bytes) for connection ebf4c843, 1-RTT 2025/09/12 02:06:44 server Short Header{DestConnectionID: ebf4c843, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:44 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:44 server -> Sending packet 1 (293 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 313.294µs} 2025/09/12 02:06:44 server -> &wire.NewTokenFrame{Token: 0x3a6a30987aeb0f905d03c1912fcfaf5407b4c639cd089ea264b527fb8b92cccf3920d4770bdaf09815bd62673635eac4a6cac2c88525dc097fac95cc7837c05c46f91a18a6186b73c44a6a33eb40da224e39c2ea64b85a52697bc2} 2025/09/12 02:06:44 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:44 Received request: GET /girahdkczf 2025/09/12 02:06:44 server -> Sending packet 2 (1045 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:44 Removing connection ID 34dd36cb. 2025/09/12 02:06:44 server <- Reading packet 2 (32 bytes) for connection ebf4c843, 1-RTT 2025/09/12 02:06:44 server Short Header{DestConnectionID: ebf4c843, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.36ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:44 server newly acked packets (2): [0 1] 2025/09/12 02:06:44 server updated RTT: 36.08ms (σ: 18.208ms) 2025/09/12 02:06:44 server ECN capability confirmed. 2025/09/12 02:06:44 server Ignoring all packets below 1. 2025/09/12 02:06:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:44 server -> Sending packet 10 (22 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:44 server Skipping packet number 9 2025/09/12 02:06:44 server -> Sending packet 11 (288 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:44 server -> &wire.NewTokenFrame{Token: 0x4dc0c43ddab9c98120f750f44f1ba467c988545365b0b10d4f42469db0f7012a374b6577bf39c42d8dd34b2fa4297242b41639f9fc847bcba36cbd248db6824fd9adee8006cce6b2ffa76e93d9e01bf6094cafcaf18ea7fdc50172} 2025/09/12 02:06:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:44 server -> Sending packet 12 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:44 server -> Sending packet 13 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:44 server -> Sending packet 4 (1045 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:44 server -> Sending packet 5 (1045 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:44 server <- Reading packet 3 (33 bytes) for connection ebf4c843, 1-RTT 2025/09/12 02:06:44 server Short Header{DestConnectionID: ebf4c843, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 80µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:44 server newly acked packets (1): [5] 2025/09/12 02:06:44 server updated RTT: 35.622ms (σ: 14.57ms) 2025/09/12 02:06:44 server Canceling loss detection timer. 2025/09/12 02:06:44 server -> Sending packet 6 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:44 server <- Received Initial packet. 2025/09/12 02:06:44 Created qlog file: /logs/qlog/f45a315839dde928.sqlog 2025/09/12 02:06:44 server Changing connection ID to cbef90ea. 2025/09/12 02:06:44 Adding connection IDs f45a315839dde928 and cbef90ea for a new connection. 2025/09/12 02:06:44 server <- Reading packet 0 (1280 bytes) for connection f45a315839dde928, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: f45a315839dde928, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 02:06:44 server -> Sending packet 0 (37 bytes) for connection f45a315839dde928, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cbef90ea, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:44 server <- Reading packet 1 (1280 bytes) for connection f45a315839dde928, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: f45a315839dde928, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 1240, Data length: 277, Offset + Data length: 1517} 2025/09/12 02:06:44 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:44 Adding connection ID 6dd5c2b3. 2025/09/12 02:06:44 Adding connection ID 12ddffd6. 2025/09/12 02:06:44 Adding connection ID 892875bd. 2025/09/12 02:06:44 server -> Sending packet 1 (1280 bytes) for connection f45a315839dde928, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: cbef90ea, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:44 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:44 server -> Sending packet 0 (829 bytes) for connection f45a315839dde928, Handshake 2025/09/12 02:06:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: cbef90ea, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 892875bd, StatelessResetToken: 0x8b0761e87089cd8064ff70d33c2c447b} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6dd5c2b3, StatelessResetToken: 0x0137e97edb5e0cbcf0d1bde9b3a45ec8} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 12ddffd6, StatelessResetToken: 0xd85c8ed5d7a669a99a14c359c3308fd2} 2025/09/12 02:06:44 server Queueing packet (28 bytes) for later decryption 2025/09/12 02:06:44 server Queueing packet (42 bytes) for later decryption 2025/09/12 02:06:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:06:44 server -> Sending packet 19 (1045 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:44 server Skipping packet number 18 2025/09/12 02:06:44 server -> Sending packet 20 (358 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.NewTokenFrame{Token: 0x9de576d17e7928b2b87e6597c307535789775b80561970c1632d7d8c3ac233f0289adbf9fb508cf1d00fad949ff8d4aad9f61963112d287480452ec3467728047deee3ba1054e7c23adabd3dcb8943b31a9e41be51bed2ebcf} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52262b2d, StatelessResetToken: 0x42a5dfbed375099414854a05caa0aeed} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b429bc2, StatelessResetToken: 0x73b09b1c2fd2803ed3839d3923122fd8} 2025/09/12 02:06:44 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec5dd8ba, StatelessResetToken: 0xbb47c416d601b36c8ffa85154db3d42d} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:44 server <- Reading packet 1 (70 bytes) for connection 6dd5c2b3, Handshake 2025/09/12 02:06:44 server Long Header{Type: Handshake, DestConnectionID: 6dd5c2b3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:44 server Dropping Initial keys. 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:44 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Dropping Handshake keys. 2025/09/12 02:06:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:44 server -> Sending packet 8 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:44 server -> Sending packet 1 (1366 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.PingFrame{} 2025/09/12 02:06:44 server <- Reading packet 1 (28 bytes) for connection 6dd5c2b3, 1-RTT 2025/09/12 02:06:44 server Short Header{DestConnectionID: 6dd5c2b3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 392µs} 2025/09/12 02:06:44 server newly acked packets (1): [0] 2025/09/12 02:06:44 server updated RTT: 33.295608ms (σ: 16.647804ms) 2025/09/12 02:06:44 server Canceling loss detection timer. 2025/09/12 02:06:44 server <- Reading packet 2 (42 bytes) for connection 6dd5c2b3, 1-RTT 2025/09/12 02:06:44 server Short Header{DestConnectionID: 6dd5c2b3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> Sending packet 9 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:44 server -> Sending packet 10 (1366 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.PingFrame{} 2025/09/12 02:06:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:44 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:44 server -> Sending packet 2 (295 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 Received request: GET /mzphsfnjwu 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 83.509441ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:44 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:44 server -> &wire.NewTokenFrame{Token: 0xcb648934d918c8ea594e4b1ff69e88696cd31f78ab2b077e3a14534e8120242bf96ce6ad7b3808a77fd436eb0a5e0d2e744c192a356221cb319ac14aa2d3b09a43431acfc7d77c87d136fb7843ba00803789c592372d7aaeec} 2025/09/12 02:06:44 server -> Sending packet 3 (1045 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:44 Removing connection ID 49afbe3c7ce77f41. 2025/09/12 02:06:44 Removing connection ID 920ac18e. 2025/09/12 02:06:44 server <- Reading packet 3 (33 bytes) for connection 6dd5c2b3, 1-RTT 2025/09/12 02:06:44 server Short Header{DestConnectionID: 6dd5c2b3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 72µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:44 server newly acked packets (2): [1 3] 2025/09/12 02:06:44 server updated RTT: 33.339ms (σ: 12.573ms) 2025/09/12 02:06:44 server ECN capability confirmed. 2025/09/12 02:06:44 server setting loss timer for packet 2 (1-RTT) to 37.855026ms (in 2025-09-12 02:06:44.916336387 +0000 UTC m=+8.814660139) 2025/09/12 02:06:44 server -> Sending packet 4 (22 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:44 server <- Received Initial packet. 2025/09/12 02:06:44 Created qlog file: /logs/qlog/6674fa6f074b8f0fe6c7e7a20bab.sqlog 2025/09/12 02:06:44 server Changing connection ID to e14e074c. 2025/09/12 02:06:44 Adding connection IDs 6674fa6f074b8f0fe6c7e7a20bab and e14e074c for a new connection. 2025/09/12 02:06:44 server <- Reading packet 0 (1280 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: 6674fa6f074b8f0fe6c7e7a20bab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 02:06:44 server -> Sending packet 0 (37 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14e074c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:44 server <- Reading packet 1 (1280 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: 6674fa6f074b8f0fe6c7e7a20bab, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 1234, Data length: 275, Offset + Data length: 1509} 2025/09/12 02:06:44 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:44 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:44 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:44 Adding connection ID 6270e9f4. 2025/09/12 02:06:44 Adding connection ID ecd2df8a. 2025/09/12 02:06:44 Adding connection ID d141a55f. 2025/09/12 02:06:44 server -> Sending packet 1 (1280 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, Initial 2025/09/12 02:06:44 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14e074c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:44 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:44 server -> Sending packet 0 (844 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, Handshake 2025/09/12 02:06:44 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e14e074c, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ecd2df8a, StatelessResetToken: 0xd370697e925d9669b5d9d013525cbe8b} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6270e9f4, StatelessResetToken: 0x23e8fdc354e0c03a5a46b3e064c7a424} 2025/09/12 02:06:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d141a55f, StatelessResetToken: 0x51c210d30228d0a7a23c41d1c8ebeaaf} 2025/09/12 02:06:44 server Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 02:06:44.916336387 +0000 UTC m=+8.814660139 2025/09/12 02:06:44 server lost packet 2 (time threshold) 2025/09/12 02:06:44 server -> Sending packet 5 (286 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:44 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:44 server -> &wire.NewTokenFrame{Token: 0xcb648934d918c8ea594e4b1ff69e88696cd31f78ab2b077e3a14534e8120242bf96ce6ad7b3808a77fd436eb0a5e0d2e744c192a356221cb319ac14aa2d3b09a43431acfc7d77c87d136fb7843ba00803789c592372d7aaeec} 2025/09/12 02:06:44 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:45 server <- Reading packet 2 (1280 bytes) for connection e14e074c, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: e14e074c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 1234, Data length: 275, Offset + Data length: 1509} 2025/09/12 02:06:45 server -> Sending packet 2 (37 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14e074c, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:45 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:45 server <- Reading packet 3 (1280 bytes) for connection e14e074c, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: e14e074c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 1234, Data length: 275, Offset + Data length: 1509} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:45 server -> Sending packet 3 (37 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14e074c, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:45 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:45 server -> Sending packet 7 (22 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:45 server Skipping packet number 6 2025/09/12 02:06:45 server -> Sending packet 8 (286 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.NewTokenFrame{Token: 0xcb648934d918c8ea594e4b1ff69e88696cd31f78ab2b077e3a14534e8120242bf96ce6ad7b3808a77fd436eb0a5e0d2e744c192a356221cb319ac14aa2d3b09a43431acfc7d77c87d136fb7843ba00803789c592372d7aaeec} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:45 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:06:45 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:45 server -> Sending packet 4 (1280 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14e074c, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:45 server -> Sending packet 5 (1280 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e14e074c, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:45 server -> Sending packet 15 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:45 server -> Sending packet 16 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:45 server -> Sending packet 12 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:45 server -> Sending packet 13 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:45 server <- Reading packet 4 (1280 bytes) for connection e14e074c, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: e14e074c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:45 server newly acked packets (1): [5] 2025/09/12 02:06:45 server updated RTT: 34.201644ms (σ: 17.100822ms) 2025/09/12 02:06:45 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:45 server -> Sending packet 1 (753 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, Handshake 2025/09/12 02:06:45 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e14e074c, PacketNumber: 1, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 02:06:45 server -> Sending packet 2 (753 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, Handshake 2025/09/12 02:06:45 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e14e074c, PacketNumber: 2, PacketNumberLen: 2, Length: 740, Version: v1} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/09/12 02:06:45 server Queueing packet (50 bytes) for later decryption 2025/09/12 02:06:45 server <- Reading packet 1 (36 bytes) for connection 6270e9f4, Handshake 2025/09/12 02:06:45 server Long Header{Type: Handshake, DestConnectionID: 6270e9f4, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:45 server Dropping Initial keys. 2025/09/12 02:06:45 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:45 server <- Reading packet 2 (36 bytes) for connection 6270e9f4, Handshake 2025/09/12 02:06:45 server Long Header{Type: Handshake, DestConnectionID: 6270e9f4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:45 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:45 server newly acked packets (1): [2] 2025/09/12 02:06:45 server updated RTT: 33.907ms (σ: 13.411ms) 2025/09/12 02:06:45 server Canceling loss detection timer. 2025/09/12 02:06:45 server <- Reading packet 4 (70 bytes) for connection 6270e9f4, Handshake 2025/09/12 02:06:45 server Long Header{Type: Handshake, DestConnectionID: 6270e9f4, SrcConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:45 server Dropping Handshake keys. 2025/09/12 02:06:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:45 server -> Sending packet 2 (360 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d141a55f, StatelessResetToken: 0x51c210d30228d0a7a23c41d1c8ebeaaf} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6270e9f4, StatelessResetToken: 0x23e8fdc354e0c03a5a46b3e064c7a424} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ecd2df8a, StatelessResetToken: 0xd370697e925d9669b5d9d013525cbe8b} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:45 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:45 server -> &wire.NewTokenFrame{Token: 0xc6075d0138f0ddb580e66920e7d6bf347d3ad36625b1d985f092f8db728535fb0a473aad7fbd53fa8d6594cd8feab73c4d76373fd13238403806340999fbe55f414b3ebfa3ccc84482b3c1e16f2e4f8896b81d1da36a1167e3b818} 2025/09/12 02:06:45 server -> Sending packet 3 (360 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ecd2df8a, StatelessResetToken: 0xd370697e925d9669b5d9d013525cbe8b} 2025/09/12 02:06:45 server -> &wire.NewTokenFrame{Token: 0xc6075d0138f0ddb580e66920e7d6bf347d3ad36625b1d985f092f8db728535fb0a473aad7fbd53fa8d6594cd8feab73c4d76373fd13238403806340999fbe55f414b3ebfa3ccc84482b3c1e16f2e4f8896b81d1da36a1167e3b818} 2025/09/12 02:06:45 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6270e9f4, StatelessResetToken: 0x23e8fdc354e0c03a5a46b3e064c7a424} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d141a55f, StatelessResetToken: 0x51c210d30228d0a7a23c41d1c8ebeaaf} 2025/09/12 02:06:45 server <- Reading packet 1 (50 bytes) for connection 6270e9f4, 1-RTT 2025/09/12 02:06:45 server Short Header{DestConnectionID: 6270e9f4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.832ms} 2025/09/12 02:06:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:45 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:45 server -> Sending packet 4 (28 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 80.793547ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:45 Received request: GET /tmsrsakmrg 2025/09/12 02:06:45 server -> Sending packet 5 (1045 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:45 server -> Sending packet 10 (22 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:45 server Skipping packet number 9 2025/09/12 02:06:45 server -> Sending packet 11 (286 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.NewTokenFrame{Token: 0xcb648934d918c8ea594e4b1ff69e88696cd31f78ab2b077e3a14534e8120242bf96ce6ad7b3808a77fd436eb0a5e0d2e744c192a356221cb319ac14aa2d3b09a43431acfc7d77c87d136fb7843ba00803789c592372d7aaeec} 2025/09/12 02:06:45 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:45 server -> Sending packet 12 (1409 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.PingFrame{} 2025/09/12 02:06:45 server <- Reading packet 2 (25 bytes) for connection 6270e9f4, 1-RTT 2025/09/12 02:06:45 server Short Header{DestConnectionID: 6270e9f4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:45 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:45 server <- Reading packet 3 (31 bytes) for connection 6270e9f4, 1-RTT 2025/09/12 02:06:45 server Short Header{DestConnectionID: 6270e9f4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 64µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:45 server newly acked packets (1): [5] 2025/09/12 02:06:45 server updated RTT: 33.65ms (σ: 10.571ms) 2025/09/12 02:06:45 server ECN capability confirmed. 2025/09/12 02:06:45 server setting loss timer for packet 3 (1-RTT) to 37.85625ms (in 2025-09-12 02:06:45.269313563 +0000 UTC m=+9.167637315) 2025/09/12 02:06:45 server -> Sending packet 6 (30 bytes) for connection 6674fa6f074b8f0fe6c7e7a20bab, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 76.432µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:45 server <- Reading packet 4 (26 bytes) for connection 6270e9f4, 1-RTT 2025/09/12 02:06:45 server Short Header{DestConnectionID: 6270e9f4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:45 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:45 Replacing connection for connection IDs [6270e9f4 ecd2df8a d141a55f 6674fa6f074b8f0fe6c7e7a20bab e14e074c] with a closed connection. 2025/09/12 02:06:45 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:45 server Connection 6674fa6f074b8f0fe6c7e7a20bab closed. 2025/09/12 02:06:45 server <- Received Initial packet. 2025/09/12 02:06:45 Created qlog file: /logs/qlog/3f5e36c00e595f35d04e.sqlog 2025/09/12 02:06:45 server Changing connection ID to eb9a2c60. 2025/09/12 02:06:45 Adding connection IDs 3f5e36c00e595f35d04e and eb9a2c60 for a new connection. 2025/09/12 02:06:45 server <- Reading packet 0 (1280 bytes) for connection 3f5e36c00e595f35d04e, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: 3f5e36c00e595f35d04e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1260, Version: v1} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 67, Data length: 1171, Offset + Data length: 1238} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:45 server -> Sending packet 0 (37 bytes) for connection 3f5e36c00e595f35d04e, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb9a2c60, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:45 server <- Reading packet 2 (1280 bytes) for connection eb9a2c60, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: eb9a2c60, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 1238, Data length: 276, Offset + Data length: 1514} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:45 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:45 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:45 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:45 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:45 Adding connection ID f07f94e2. 2025/09/12 02:06:45 Adding connection ID 25a81d7d. 2025/09/12 02:06:45 Adding connection ID 22b8a812. 2025/09/12 02:06:45 server -> Sending packet 1 (1280 bytes) for connection 3f5e36c00e595f35d04e, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb9a2c60, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:45 server -> Sending packet 0 (837 bytes) for connection 3f5e36c00e595f35d04e, Handshake 2025/09/12 02:06:45 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb9a2c60, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 25a81d7d, StatelessResetToken: 0x30b2cb8de04059f98e20a39ab624990e} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f07f94e2, StatelessResetToken: 0xa0a5bcb658ad8b9f86722faf2bdfdecc} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22b8a812, StatelessResetToken: 0x2e35a9b6fd6ca305a9ea99272ed4f6b3} 2025/09/12 02:06:45 server <- Reading packet 3 (1280 bytes) for connection eb9a2c60, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: eb9a2c60, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 1238, Data length: 276, Offset + Data length: 1514} 2025/09/12 02:06:45 server -> Sending packet 2 (39 bytes) for connection 3f5e36c00e595f35d04e, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb9a2c60, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:45 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:06:45 server -> Sending packet 25 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:45 server -> Sending packet 26 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:45 Removing connection ID f45a315839dde928. 2025/09/12 02:06:45 Removing connection IDs [6270e9f4 ecd2df8a d141a55f 6674fa6f074b8f0fe6c7e7a20bab e14e074c] for a closed connection after it has been retired. 2025/09/12 02:06:45 server <- Reading packet 5 (1280 bytes) for connection eb9a2c60, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: eb9a2c60, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 1238, Data length: 276, Offset + Data length: 1514} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:45 server -> Sending packet 3 (41 bytes) for connection 3f5e36c00e595f35d04e, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb9a2c60, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 27, Version: v1} 2025/09/12 02:06:45 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:45 server <- Reading packet 6 (1280 bytes) for connection eb9a2c60, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: eb9a2c60, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 1238, Data length: 276, Offset + Data length: 1514} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:45 server -> Sending packet 4 (41 bytes) for connection 3f5e36c00e595f35d04e, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb9a2c60, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 27, Version: v1} 2025/09/12 02:06:45 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:45 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:45 server -> Sending packet 5 (1280 bytes) for connection 3f5e36c00e595f35d04e, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb9a2c60, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:45 server -> Sending packet 6 (1280 bytes) for connection 3f5e36c00e595f35d04e, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb9a2c60, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:45 server <- Reading packet 7 (1280 bytes) for connection eb9a2c60, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: eb9a2c60, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:45 server <- Reading packet 8 (1280 bytes) for connection eb9a2c60, Initial 2025/09/12 02:06:45 server Long Header{Type: Initial, DestConnectionID: eb9a2c60, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:45 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:45 server newly acked packets (1): [6] 2025/09/12 02:06:45 server updated RTT: 33.770983ms (σ: 16.885491ms) 2025/09/12 02:06:45 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:45 server -> Sending packet 1 (746 bytes) for connection 3f5e36c00e595f35d04e, Handshake 2025/09/12 02:06:45 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb9a2c60, PacketNumber: 1, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:45 server -> Sending packet 2 (746 bytes) for connection 3f5e36c00e595f35d04e, Handshake 2025/09/12 02:06:45 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb9a2c60, PacketNumber: 2, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:06:45 server -> Sending packet 15 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:45 server -> Sending packet 16 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:06:45 server -> Sending packet 14 (22 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:45 server Skipping packet number 13 2025/09/12 02:06:45 server -> Sending packet 15 (286 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.NewTokenFrame{Token: 0xcb648934d918c8ea594e4b1ff69e88696cd31f78ab2b077e3a14534e8120242bf96ce6ad7b3808a77fd436eb0a5e0d2e744c192a356221cb319ac14aa2d3b09a43431acfc7d77c87d136fb7843ba00803789c592372d7aaeec} 2025/09/12 02:06:45 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:45 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:06:45 server -> Sending packet 3 (746 bytes) for connection 3f5e36c00e595f35d04e, Handshake 2025/09/12 02:06:45 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb9a2c60, PacketNumber: 3, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:45 server -> Sending packet 4 (746 bytes) for connection 3f5e36c00e595f35d04e, Handshake 2025/09/12 02:06:45 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb9a2c60, PacketNumber: 4, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:45 server <- Reading packet 0 (75 bytes) for connection eb9a2c60, Handshake 2025/09/12 02:06:45 server Long Header{Type: Handshake, DestConnectionID: eb9a2c60, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:45 server Dropping Initial keys. 2025/09/12 02:06:45 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 02:06:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:45 server Dropping Handshake keys. 2025/09/12 02:06:45 server <- Reading packet 0 (42 bytes) for connection eb9a2c60, 1-RTT 2025/09/12 02:06:45 server Short Header{DestConnectionID: eb9a2c60, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:45 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:45 server -> Sending packet 2 (368 bytes) for connection 3f5e36c00e595f35d04e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 291.554µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:45 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22b8a812, StatelessResetToken: 0x2e35a9b6fd6ca305a9ea99272ed4f6b3} 2025/09/12 02:06:45 Received request: GET /hjrwkceknk 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 25a81d7d, StatelessResetToken: 0x30b2cb8de04059f98e20a39ab624990e} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f07f94e2, StatelessResetToken: 0xa0a5bcb658ad8b9f86722faf2bdfdecc} 2025/09/12 02:06:45 server -> &wire.NewTokenFrame{Token: 0xd9c123b8449c1bc013835eaa5936ca9423739e9bf9a0fc9230094064892f507922e0f3e674a827ecc4ea0b1409586303b11641b19dff26378a02955f5d54f13a91c405006ae91cb36f73743d005341dc5d0ffc34f4bd1279084596} 2025/09/12 02:06:45 server -> Sending packet 3 (1280 bytes) for connection 3f5e36c00e595f35d04e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.NewTokenFrame{Token: 0xd9c123b8449c1bc013835eaa5936ca9423739e9bf9a0fc9230094064892f507922e0f3e674a827ecc4ea0b1409586303b11641b19dff26378a02955f5d54f13a91c405006ae91cb36f73743d005341dc5d0ffc34f4bd1279084596} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 25a81d7d, StatelessResetToken: 0x30b2cb8de04059f98e20a39ab624990e} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f07f94e2, StatelessResetToken: 0xa0a5bcb658ad8b9f86722faf2bdfdecc} 2025/09/12 02:06:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22b8a812, StatelessResetToken: 0x2e35a9b6fd6ca305a9ea99272ed4f6b3} 2025/09/12 02:06:45 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:45 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 918, Offset + Data length: 918} 2025/09/12 02:06:45 server -> Sending packet 4 (129 bytes) for connection 3f5e36c00e595f35d04e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 918, Data length: 106, Offset + Data length: 1024} 2025/09/12 02:06:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:06:45 server -> Sending packet 21 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:45 server -> Sending packet 22 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:06:45 server -> Sending packet 18 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:45 server -> Sending packet 19 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:45 server <- Reading packet 3 (42 bytes) for connection f07f94e2, 1-RTT 2025/09/12 02:06:45 server Short Header{DestConnectionID: f07f94e2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:45 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:45 server <- Reading packet 4 (25 bytes) for connection f07f94e2, 1-RTT 2025/09/12 02:06:45 server Short Header{DestConnectionID: f07f94e2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:45 server -> Sending packet 5 (29 bytes) for connection 3f5e36c00e595f35d04e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:45 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:45 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 119.594µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:46 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:46 server -> Sending packet 7 (1280 bytes) for connection 3f5e36c00e595f35d04e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f07f94e2, StatelessResetToken: 0xa0a5bcb658ad8b9f86722faf2bdfdecc} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 25a81d7d, StatelessResetToken: 0x30b2cb8de04059f98e20a39ab624990e} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 22b8a812, StatelessResetToken: 0x2e35a9b6fd6ca305a9ea99272ed4f6b3} 2025/09/12 02:06:46 server -> &wire.NewTokenFrame{Token: 0xd9c123b8449c1bc013835eaa5936ca9423739e9bf9a0fc9230094064892f507922e0f3e674a827ecc4ea0b1409586303b11641b19dff26378a02955f5d54f13a91c405006ae91cb36f73743d005341dc5d0ffc34f4bd1279084596} 2025/09/12 02:06:46 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:46 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 918, Offset + Data length: 918} 2025/09/12 02:06:46 server Skipping packet number 6 2025/09/12 02:06:46 server -> Sending packet 8 (129 bytes) for connection 3f5e36c00e595f35d04e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 918, Data length: 106, Offset + Data length: 1024} 2025/09/12 02:06:46 server -> Sending packet 9 (1366 bytes) for connection 3f5e36c00e595f35d04e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.PingFrame{} 2025/09/12 02:06:46 server <- Reading packet 5 (1366 bytes) for connection f07f94e2, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: f07f94e2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.PingFrame{} 2025/09/12 02:06:46 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:46 server <- Reading packet 6 (35 bytes) for connection f07f94e2, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: f07f94e2, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 224µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:46 server newly acked packets (1): [7] 2025/09/12 02:06:46 server updated RTT: 33.712ms (σ: 12.779ms) 2025/09/12 02:06:46 server ECN capability confirmed. 2025/09/12 02:06:46 server <- Reading packet 7 (37 bytes) for connection f07f94e2, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: f07f94e2, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 3, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 72µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:06:46 server newly acked packets (1): [9] 2025/09/12 02:06:46 server updated RTT: 33.662ms (σ: 9.683ms) 2025/09/12 02:06:46 server setting loss timer for packet 8 (1-RTT) to 37.86975ms (in 2025-09-12 02:06:46.125778479 +0000 UTC m=+10.024102221) 2025/09/12 02:06:46 server Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 02:06:46.125778479 +0000 UTC m=+10.024102221 2025/09/12 02:06:46 server lost packet 8 (time threshold) 2025/09/12 02:06:46 server Canceling loss detection timer. 2025/09/12 02:06:46 server -> Sending packet 10 (140 bytes) for connection 3f5e36c00e595f35d04e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 5.256067ms, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 02:06:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 918, Data length: 106, Offset + Data length: 1024} 2025/09/12 02:06:46 Removing connection ID 3f5e36c00e595f35d04e. 2025/09/12 02:06:46 server <- Reading packet 8 (26 bytes) for connection f07f94e2, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: f07f94e2, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:46 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:46 Replacing connection for connection IDs [22b8a812 f07f94e2 25a81d7d eb9a2c60] with a closed connection. 2025/09/12 02:06:46 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:46 server Connection 3f5e36c00e595f35d04e closed. 2025/09/12 02:06:46 server <- Received Initial packet. 2025/09/12 02:06:46 Created qlog file: /logs/qlog/a3b47524240440c952c0a4f3aa73bcc63f.sqlog 2025/09/12 02:06:46 server Changing connection ID to 67182668. 2025/09/12 02:06:46 Adding connection IDs a3b47524240440c952c0a4f3aa73bcc63f and 67182668 for a new connection. 2025/09/12 02:06:46 server <- Reading packet 0 (1280 bytes) for connection a3b47524240440c952c0a4f3aa73bcc63f, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: a3b47524240440c952c0a4f3aa73bcc63f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:46 server -> Sending packet 0 (37 bytes) for connection a3b47524240440c952c0a4f3aa73bcc63f, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 67182668, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:46 server <- Reading packet 1 (1280 bytes) for connection a3b47524240440c952c0a4f3aa73bcc63f, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: a3b47524240440c952c0a4f3aa73bcc63f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 1231, Data length: 277, Offset + Data length: 1508} 2025/09/12 02:06:46 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:46 Adding connection ID 3842f8cb. 2025/09/12 02:06:46 Adding connection ID f60801a7. 2025/09/12 02:06:46 Adding connection ID 4f79e194. 2025/09/12 02:06:46 server -> Sending packet 1 (1280 bytes) for connection a3b47524240440c952c0a4f3aa73bcc63f, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 67182668, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:46 server -> Sending packet 0 (849 bytes) for connection a3b47524240440c952c0a4f3aa73bcc63f, Handshake 2025/09/12 02:06:46 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 67182668, PacketNumber: 0, PacketNumberLen: 2, Length: 745, Version: v1} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4f79e194, StatelessResetToken: 0xb4a46038ea5a393672426abd5ae616b9} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f60801a7, StatelessResetToken: 0xb0bac37f3ccc99bdc8f5570f440686e7} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3842f8cb, StatelessResetToken: 0x12e4be8a66ca9a77e256a066b0a8c496} 2025/09/12 02:06:46 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 44 bytes. 2025/09/12 02:06:46 server <- Reading packet 0 (75 bytes) for connection 3842f8cb, Handshake 2025/09/12 02:06:46 server Long Header{Type: Handshake, DestConnectionID: 3842f8cb, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:46 server Dropping Initial keys. 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:46 server newly acked packets (1): [0] 2025/09/12 02:06:46 server updated RTT: 33.279031ms (σ: 16.639515ms) 2025/09/12 02:06:46 server Canceling loss detection timer. 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:46 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Dropping Handshake keys. 2025/09/12 02:06:46 server <- Reading packet 0 (44 bytes) for connection 3842f8cb, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 3842f8cb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:46 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:46 server <- Reading packet 1 (28 bytes) for connection 3842f8cb, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 3842f8cb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 432µs} 2025/09/12 02:06:46 server newly acked packets (1): [0] 2025/09/12 02:06:46 Received request: GET /xrgjvbecse 2025/09/12 02:06:46 server updated RTT: 33.281ms (σ: 12.483ms) 2025/09/12 02:06:46 server Canceling loss detection timer. 2025/09/12 02:06:46 server -> Sending packet 1 (1280 bytes) for connection a3b47524240440c952c0a4f3aa73bcc63f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 396.553µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:46 server -> &wire.NewTokenFrame{Token: 0xbba0ede07ff0980a6cab8629c716f04530cb1fae8ddce378d4dcbe8c9b829462ca88136f2715f6f0aa0b46d44c4e50d63386274bd8d077624673be512ceebe2f1d33a5124f2388f6cd8f837327e632a978e85d171027de5a0594d0} 2025/09/12 02:06:46 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:46 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 982, Offset + Data length: 982} 2025/09/12 02:06:46 server -> Sending packet 2 (65 bytes) for connection a3b47524240440c952c0a4f3aa73bcc63f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 982, Data length: 42, Offset + Data length: 1024} 2025/09/12 02:06:46 server <- Reading packet 2 (31 bytes) for connection 3842f8cb, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 3842f8cb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 288µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:46 server newly acked packets (2): [1 2] 2025/09/12 02:06:46 server updated RTT: 33.131ms (σ: 9.661ms) 2025/09/12 02:06:46 server ECN capability confirmed. 2025/09/12 02:06:46 server Canceling loss detection timer. 2025/09/12 02:06:46 server Ignoring all packets below 2. 2025/09/12 02:06:46 server -> Sending packet 3 (22 bytes) for connection a3b47524240440c952c0a4f3aa73bcc63f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:46 server <- Reading packet 3 (26 bytes) for connection 3842f8cb, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 3842f8cb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:46 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:46 Replacing connection for connection IDs [3842f8cb f60801a7 4f79e194 a3b47524240440c952c0a4f3aa73bcc63f 67182668] with a closed connection. 2025/09/12 02:06:46 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:46 server Connection a3b47524240440c952c0a4f3aa73bcc63f closed. 2025/09/12 02:06:46 server <- Received Initial packet. 2025/09/12 02:06:46 Created qlog file: /logs/qlog/cf5b72cea5c987261bd24ab798.sqlog 2025/09/12 02:06:46 server Changing connection ID to 7af2972c. 2025/09/12 02:06:46 Adding connection IDs cf5b72cea5c987261bd24ab798 and 7af2972c for a new connection. 2025/09/12 02:06:46 server <- Reading packet 0 (1280 bytes) for connection cf5b72cea5c987261bd24ab798, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: cf5b72cea5c987261bd24ab798, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 02:06:46 server -> Sending packet 0 (37 bytes) for connection cf5b72cea5c987261bd24ab798, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7af2972c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:46 server <- Reading packet 1 (1280 bytes) for connection cf5b72cea5c987261bd24ab798, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: cf5b72cea5c987261bd24ab798, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 1235, Data length: 273, Offset + Data length: 1508} 2025/09/12 02:06:46 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:46 Adding connection ID 6584487f. 2025/09/12 02:06:46 Adding connection ID 82a2db28. 2025/09/12 02:06:46 Adding connection ID 1b519424. 2025/09/12 02:06:46 server -> Sending packet 1 (1280 bytes) for connection cf5b72cea5c987261bd24ab798, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7af2972c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:46 server -> Sending packet 0 (847 bytes) for connection cf5b72cea5c987261bd24ab798, Handshake 2025/09/12 02:06:46 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 7af2972c, PacketNumber: 0, PacketNumberLen: 2, Length: 743, Version: v1} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 82a2db28, StatelessResetToken: 0x3ffd8844e8ae37584237d75eff0755b2} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6584487f, StatelessResetToken: 0x82ff58495c6161dc4e9c53487609d714} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1b519424, StatelessResetToken: 0x43bbe315b59f7d10480a089f39ae612d} 2025/09/12 02:06:46 server <- Reading packet 2 (1280 bytes) for connection 7af2972c, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: 7af2972c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 1235, Data length: 273, Offset + Data length: 1508} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:46 server -> Sending packet 2 (37 bytes) for connection cf5b72cea5c987261bd24ab798, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7af2972c, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:46 server <- Reading packet 3 (1280 bytes) for connection 7af2972c, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: 7af2972c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 1235, Data length: 273, Offset + Data length: 1508} 2025/09/12 02:06:46 server -> Sending packet 3 (37 bytes) for connection cf5b72cea5c987261bd24ab798, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7af2972c, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:46 Removing connection IDs [22b8a812 f07f94e2 25a81d7d eb9a2c60] for a closed connection after it has been retired. 2025/09/12 02:06:46 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:46 server -> Sending packet 4 (1280 bytes) for connection cf5b72cea5c987261bd24ab798, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7af2972c, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:46 server -> Sending packet 5 (1280 bytes) for connection cf5b72cea5c987261bd24ab798, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 7af2972c, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:46 Removing connection IDs [3842f8cb f60801a7 4f79e194 a3b47524240440c952c0a4f3aa73bcc63f 67182668] for a closed connection after it has been retired. 2025/09/12 02:06:46 server <- Reading packet 4 (1280 bytes) for connection 7af2972c, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: 7af2972c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:46 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:46 server <- Reading packet 0 (75 bytes) for connection 6584487f, Handshake 2025/09/12 02:06:46 server Long Header{Type: Handshake, DestConnectionID: 6584487f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:46 server Dropping Initial keys. 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:46 server newly acked packets (1): [0] 2025/09/12 02:06:46 server updated RTT: 233.687395ms (σ: 116.843697ms) 2025/09/12 02:06:46 server Canceling loss detection timer. 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:46 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Dropping Handshake keys. 2025/09/12 02:06:46 server <- Reading packet 0 (25 bytes) for connection 6584487f, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 6584487f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:46 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:46 server <- Reading packet 1 (50 bytes) for connection 6584487f, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 6584487f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.856ms} 2025/09/12 02:06:46 server newly acked packets (1): [0] 2025/09/12 02:06:46 server updated RTT: 233.693ms (σ: 87.644ms) 2025/09/12 02:06:46 server Canceling loss detection timer. 2025/09/12 02:06:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:46 server -> Sending packet 1 (296 bytes) for connection cf5b72cea5c987261bd24ab798, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 421.921µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:46 server -> &wire.NewTokenFrame{Token: 0xfe48d81e8401fb6f175b8ed05afb337c031a78b536ac056969d82755f4ddcc938fc8f716d3b3a6cce8b74ae9641fb7205fbbbd92300594bb3d1f1956ccb91d20e42ff7b6f8422d4aaec5e1f415591a79c269fab514c3b9dc05f0de} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:46 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:46 Received request: GET /wwigptnuhr 2025/09/12 02:06:46 server -> Sending packet 2 (1045 bytes) for connection cf5b72cea5c987261bd24ab798, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:46 server <- Reading packet 2 (33 bytes) for connection 6584487f, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 6584487f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 96µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:46 server newly acked packets (1): [2] 2025/09/12 02:06:46 server updated RTT: 208.443ms (σ: 116.231ms) 2025/09/12 02:06:46 server ECN capability confirmed. 2025/09/12 02:06:46 server setting loss timer for packet 1 (1-RTT) to 234.498375ms (in 2025-09-12 02:06:46.699122323 +0000 UTC m=+10.597446075) 2025/09/12 02:06:46 server -> Sending packet 3 (22 bytes) for connection cf5b72cea5c987261bd24ab798, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:46 server Parsed a coalesced packet. Part 1: 35 bytes. Remaining: 26 bytes. 2025/09/12 02:06:46 server Dropping %!s(logging.PacketType=1) packet (35 bytes) because we already dropped the keys. 2025/09/12 02:06:46 server <- Reading packet 3 (26 bytes) for connection 6584487f, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 6584487f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:46 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:46 Replacing connection for connection IDs [1b519424 6584487f 82a2db28 cf5b72cea5c987261bd24ab798 7af2972c] with a closed connection. 2025/09/12 02:06:46 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:46 server Connection cf5b72cea5c987261bd24ab798 closed. 2025/09/12 02:06:46 server <- Received Initial packet. 2025/09/12 02:06:46 Created qlog file: /logs/qlog/35af687bdbe208a37e8bc5578ee3443f75.sqlog 2025/09/12 02:06:46 server Changing connection ID to 47066505. 2025/09/12 02:06:46 Adding connection IDs 35af687bdbe208a37e8bc5578ee3443f75 and 47066505 for a new connection. 2025/09/12 02:06:46 server <- Reading packet 1 (1280 bytes) for connection 35af687bdbe208a37e8bc5578ee3443f75, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: 35af687bdbe208a37e8bc5578ee3443f75, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1253, Version: v1} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 1231, Data length: 275, Offset + Data length: 1506} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:46 server -> Sending packet 0 (37 bytes) for connection 35af687bdbe208a37e8bc5578ee3443f75, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 47066505, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:46 server <- Reading packet 2 (1280 bytes) for connection 47066505, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: 47066505, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 67, Data length: 1164, Offset + Data length: 1231} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:46 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:46 Adding connection ID 8a4878fc. 2025/09/12 02:06:46 Adding connection ID b5a21863. 2025/09/12 02:06:46 Adding connection ID f326f673. 2025/09/12 02:06:46 server -> Sending packet 1 (1280 bytes) for connection 35af687bdbe208a37e8bc5578ee3443f75, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 47066505, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:46 server -> Sending packet 0 (851 bytes) for connection 35af687bdbe208a37e8bc5578ee3443f75, Handshake 2025/09/12 02:06:46 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 47066505, PacketNumber: 0, PacketNumberLen: 2, Length: 747, Version: v1} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8a4878fc, StatelessResetToken: 0xbc2538b8d1a52360b741b91365a24aff} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f326f673, StatelessResetToken: 0x1b01ac704e6e1100ff2b5c2d001b484d} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b5a21863, StatelessResetToken: 0x104ecc7fb2fa2b85500e2aa7c2bf2274} 2025/09/12 02:06:46 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:06:46 server -> Sending packet 18 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:46 server -> Sending packet 19 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:46 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:06:46 server -> Sending packet 17 (22 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:46 server Skipping packet number 16 2025/09/12 02:06:46 server -> Sending packet 18 (286 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:46 server -> &wire.NewTokenFrame{Token: 0xcb648934d918c8ea594e4b1ff69e88696cd31f78ab2b077e3a14534e8120242bf96ce6ad7b3808a77fd436eb0a5e0d2e744c192a356221cb319ac14aa2d3b09a43431acfc7d77c87d136fb7843ba00803789c592372d7aaeec} 2025/09/12 02:06:46 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:46 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:46 server <- Reading packet 0 (75 bytes) for connection 8a4878fc, Handshake 2025/09/12 02:06:46 server Long Header{Type: Handshake, DestConnectionID: 8a4878fc, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:46 server Dropping Initial keys. 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:46 server newly acked packets (1): [0] 2025/09/12 02:06:46 server updated RTT: 33.258736ms (σ: 16.629368ms) 2025/09/12 02:06:46 server Canceling loss detection timer. 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:46 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Dropping Handshake keys. 2025/09/12 02:06:46 server <- Reading packet 0 (25 bytes) for connection 8a4878fc, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 8a4878fc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:46 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:46 server <- Reading packet 1 (28 bytes) for connection 8a4878fc, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 8a4878fc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 432µs} 2025/09/12 02:06:46 server newly acked packets (1): [0] 2025/09/12 02:06:46 server updated RTT: 33.26ms (σ: 12.476ms) 2025/09/12 02:06:46 server Canceling loss detection timer. 2025/09/12 02:06:46 server -> Sending packet 1 (296 bytes) for connection 35af687bdbe208a37e8bc5578ee3443f75, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 298.186µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:46 server -> &wire.NewTokenFrame{Token: 0xa946cc8cd83c321c596e059edba406c31301cbd823a265227b618d2fe285d6294c7ad22fa902464cc840288841d8e095a38a7587e3e5ef53acd613013dee3c38ec35d827bdf9e98345c8cee1c090e07e84597520a46518f7a111d6} 2025/09/12 02:06:46 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:46 server <- Reading packet 2 (42 bytes) for connection 8a4878fc, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 8a4878fc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:46 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:46 Received request: GET /psfwrvwlwq 2025/09/12 02:06:46 server -> Sending packet 2 (1053 bytes) for connection 35af687bdbe208a37e8bc5578ee3443f75, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 399.348µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:46 server <- Reading packet 4 (26 bytes) for connection 8a4878fc, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 8a4878fc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:46 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:46 Replacing connection for connection IDs [8a4878fc b5a21863 f326f673 35af687bdbe208a37e8bc5578ee3443f75 47066505] with a closed connection. 2025/09/12 02:06:46 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:46 server Connection 35af687bdbe208a37e8bc5578ee3443f75 closed. 2025/09/12 02:06:46 server <- Received Initial packet. 2025/09/12 02:06:46 Created qlog file: /logs/qlog/3dd98990259963c561920f3090.sqlog 2025/09/12 02:06:46 server Changing connection ID to 0b30b800. 2025/09/12 02:06:46 Adding connection IDs 3dd98990259963c561920f3090 and 0b30b800 for a new connection. 2025/09/12 02:06:46 server <- Reading packet 0 (1280 bytes) for connection 3dd98990259963c561920f3090, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: 3dd98990259963c561920f3090, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 02:06:46 server -> Sending packet 0 (37 bytes) for connection 3dd98990259963c561920f3090, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0b30b800, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:46 server <- Reading packet 1 (1280 bytes) for connection 3dd98990259963c561920f3090, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: 3dd98990259963c561920f3090, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 1235, Data length: 273, Offset + Data length: 1508} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:46 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:46 Adding connection ID 2dc63f67. 2025/09/12 02:06:46 Adding connection ID 374b3855. 2025/09/12 02:06:46 Adding connection ID 321b4102. 2025/09/12 02:06:46 server -> Sending packet 1 (1280 bytes) for connection 3dd98990259963c561920f3090, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 0b30b800, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:46 server -> Sending packet 0 (840 bytes) for connection 3dd98990259963c561920f3090, Handshake 2025/09/12 02:06:46 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0b30b800, PacketNumber: 0, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 374b3855, StatelessResetToken: 0xcebe4bf2e0c6021d17c58897a1295324} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 321b4102, StatelessResetToken: 0x00b3231910e10e9749eed3fd61b0e4e1} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2dc63f67, StatelessResetToken: 0x090320391a447dc07fe34530bca4b592} 2025/09/12 02:06:46 server <- Reading packet 2 (1280 bytes) for connection 0b30b800, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: 0b30b800, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:46 server newly acked packets (1): [1] 2025/09/12 02:06:46 server updated RTT: 33.134489ms (σ: 16.567244ms) 2025/09/12 02:06:46 server Queueing packet (47 bytes) for later decryption 2025/09/12 02:06:46 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:46 server -> Sending packet 1 (749 bytes) for connection 3dd98990259963c561920f3090, Handshake 2025/09/12 02:06:46 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0b30b800, PacketNumber: 1, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 02:06:46 server -> Sending packet 2 (749 bytes) for connection 3dd98990259963c561920f3090, Handshake 2025/09/12 02:06:46 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 0b30b800, PacketNumber: 2, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 02:06:46 server <- Reading packet 1 (70 bytes) for connection 2dc63f67, Handshake 2025/09/12 02:06:46 server Long Header{Type: Handshake, DestConnectionID: 2dc63f67, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:46 server Dropping Initial keys. 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:46 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Dropping Handshake keys. 2025/09/12 02:06:46 server -> Sending packet 1 (288 bytes) for connection 3dd98990259963c561920f3090, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.NewTokenFrame{Token: 0x2c273cdb2e25150749f607a5122fad1965cc2351a57faec70ee2759a9dfbfde3199014606106db9cf3cd6b65a6e5e249bb849d912143d3fd63d542bb5fee7830bb1bc8747dd2a6e031f6bd69d7324df13e2ae05a70848005fc3527} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:46 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:46 server <- Reading packet 1 (47 bytes) for connection 2dc63f67, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 2dc63f67, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/09/12 02:06:46 server newly acked packets (1): [0] 2025/09/12 02:06:46 server updated RTT: 33.136ms (σ: 12.43ms) 2025/09/12 02:06:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:46 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:46 server -> Sending packet 2 (28 bytes) for connection 3dd98990259963c561920f3090, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 83.277044ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:46 Received request: GET /reccsyvooi 2025/09/12 02:06:46 server -> Sending packet 3 (1045 bytes) for connection 3dd98990259963c561920f3090, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:46 server <- Reading packet 4 (42 bytes) for connection 2dc63f67, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 2dc63f67, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:46 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:46 server -> Sending packet 4 (29 bytes) for connection 3dd98990259963c561920f3090, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 105.086µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:46 server <- Reading packet 5 (26 bytes) for connection 2dc63f67, 1-RTT 2025/09/12 02:06:46 server Short Header{DestConnectionID: 2dc63f67, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:46 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:46 Replacing connection for connection IDs [2dc63f67 374b3855 321b4102 0b30b800 3dd98990259963c561920f3090] with a closed connection. 2025/09/12 02:06:46 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:46 server Connection 3dd98990259963c561920f3090 closed. 2025/09/12 02:06:46 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:06:46 server -> Sending packet 22 (1045 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:46 server Skipping packet number 21 2025/09/12 02:06:46 server -> Sending packet 23 (358 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b429bc2, StatelessResetToken: 0x73b09b1c2fd2803ed3839d3923122fd8} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec5dd8ba, StatelessResetToken: 0xbb47c416d601b36c8ffa85154db3d42d} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:46 server -> &wire.NewTokenFrame{Token: 0x9de576d17e7928b2b87e6597c307535789775b80561970c1632d7d8c3ac233f0289adbf9fb508cf1d00fad949ff8d4aad9f61963112d287480452ec3467728047deee3ba1054e7c23adabd3dcb8943b31a9e41be51bed2ebcf} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52262b2d, StatelessResetToken: 0x42a5dfbed375099414854a05caa0aeed} 2025/09/12 02:06:46 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:46 Removing connection IDs [8a4878fc b5a21863 f326f673 35af687bdbe208a37e8bc5578ee3443f75 47066505] for a closed connection after it has been retired. 2025/09/12 02:06:46 server <- Received Initial packet. 2025/09/12 02:06:46 Created qlog file: /logs/qlog/23d48309a5ff6bc32749470448f5767e97fa.sqlog 2025/09/12 02:06:46 server Changing connection ID to aa30f27a. 2025/09/12 02:06:46 Adding connection IDs 23d48309a5ff6bc32749470448f5767e97fa and aa30f27a for a new connection. 2025/09/12 02:06:46 server <- Reading packet 3 (1280 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: 23d48309a5ff6bc32749470448f5767e97fa, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 1230, Data length: 286, Offset + Data length: 1516} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:46 server -> Sending packet 0 (37 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aa30f27a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 02:06:46 server <- Reading packet 4 (1280 bytes) for connection aa30f27a, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: aa30f27a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 02:06:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:46 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:46 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:46 Adding connection ID 7243afc8. 2025/09/12 02:06:46 Adding connection ID 7c578675. 2025/09/12 02:06:46 Adding connection ID 9c0499dd. 2025/09/12 02:06:46 server -> Sending packet 1 (1280 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, Initial 2025/09/12 02:06:46 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aa30f27a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:46 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:46 server -> Sending packet 0 (845 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, Handshake 2025/09/12 02:06:46 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: aa30f27a, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/09/12 02:06:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/09/12 02:06:46 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7c578675, StatelessResetToken: 0xa476f2ac3783bdb047d1bac5b7ac3311} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9c0499dd, StatelessResetToken: 0xc299dc9f3219a62d9ba68e1f200a0f3d} 2025/09/12 02:06:46 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7243afc8, StatelessResetToken: 0xc8ccd365d48df7486ecb6ba902b73426} 2025/09/12 02:06:47 Removing connection IDs [2dc63f67 374b3855 321b4102 0b30b800 3dd98990259963c561920f3090] for a closed connection after it has been retired. 2025/09/12 02:06:47 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:47 server -> Sending packet 2 (1280 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aa30f27a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:47 server -> Sending packet 3 (1280 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aa30f27a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:47 server <- Reading packet 6 (1280 bytes) for connection aa30f27a, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: aa30f27a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:47 server <- &wire.PingFrame{} 2025/09/12 02:06:47 server -> Sending packet 4 (39 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: aa30f27a, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:47 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 0s} 2025/09/12 02:06:47 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:06:47 server -> Sending packet 1 (754 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, Handshake 2025/09/12 02:06:47 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: aa30f27a, PacketNumber: 1, PacketNumberLen: 2, Length: 741, Version: v1} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/09/12 02:06:47 server -> Sending packet 2 (754 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, Handshake 2025/09/12 02:06:47 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: aa30f27a, PacketNumber: 2, PacketNumberLen: 2, Length: 741, Version: v1} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/09/12 02:06:47 server <- Reading packet 0 (75 bytes) for connection aa30f27a, Handshake 2025/09/12 02:06:47 server Long Header{Type: Handshake, DestConnectionID: aa30f27a, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:47 server Dropping Initial keys. 2025/09/12 02:06:47 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:47 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:47 server Dropping Handshake keys. 2025/09/12 02:06:47 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/09/12 02:06:47 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/09/12 02:06:47 server <- Reading packet 0 (42 bytes) for connection aa30f27a, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: aa30f27a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:47 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:47 server -> Sending packet 2 (363 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 241.37µs} 2025/09/12 02:06:47 Received request: GET /bxoryuuosn 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9c0499dd, StatelessResetToken: 0xc299dc9f3219a62d9ba68e1f200a0f3d} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7243afc8, StatelessResetToken: 0xc8ccd365d48df7486ecb6ba902b73426} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7c578675, StatelessResetToken: 0xa476f2ac3783bdb047d1bac5b7ac3311} 2025/09/12 02:06:47 server -> &wire.NewTokenFrame{Token: 0xfce095115aeaded548fe9203d422fddc89b23d020ec6bef25b3e66edc0e13b815ed403b606fcc4e547efbb7108d34ab40c41304df9652e5a8a439dedaa97e90fa01da7c9900ee32ba350fb5c6f39cffa7a5de84b900f09d80e} 2025/09/12 02:06:47 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:47 server -> Sending packet 3 (1280 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7c578675, StatelessResetToken: 0xa476f2ac3783bdb047d1bac5b7ac3311} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7243afc8, StatelessResetToken: 0xc8ccd365d48df7486ecb6ba902b73426} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9c0499dd, StatelessResetToken: 0xc299dc9f3219a62d9ba68e1f200a0f3d} 2025/09/12 02:06:47 server -> &wire.NewTokenFrame{Token: 0xfce095115aeaded548fe9203d422fddc89b23d020ec6bef25b3e66edc0e13b815ed403b606fcc4e547efbb7108d34ab40c41304df9652e5a8a439dedaa97e90fa01da7c9900ee32ba350fb5c6f39cffa7a5de84b900f09d80e} 2025/09/12 02:06:47 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:47 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 920, Offset + Data length: 920} 2025/09/12 02:06:47 server -> Sending packet 4 (1366 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.PingFrame{} 2025/09/12 02:06:47 server -> Sending packet 5 (127 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 920, Data length: 104, Offset + Data length: 1024} 2025/09/12 02:06:47 server <- Reading packet 1 (33 bytes) for connection 7243afc8, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: 7243afc8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 176µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:47 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:47 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:47 server <- Reading packet 2 (33 bytes) for connection 7243afc8, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: 7243afc8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:47 server newly acked packets (1): [4] 2025/09/12 02:06:47 server updated RTT: 33.281522ms (σ: 16.640761ms) 2025/09/12 02:06:47 server ECN capability confirmed. 2025/09/12 02:06:47 server setting loss timer for packet 3 (1-RTT) to 37.441712ms (in 2025-09-12 02:06:47.465089839 +0000 UTC m=+11.363413591) 2025/09/12 02:06:47 server Loss detection alarm fired in loss timer mode. Loss time: 2025-09-12 02:06:47.465089839 +0000 UTC m=+11.363413591 2025/09/12 02:06:47 server lost packet 3 (time threshold) 2025/09/12 02:06:47 server -> Sending packet 6 (1289 bytes) for connection 23d48309a5ff6bc32749470448f5767e97fa, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 4.202095ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:47 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7c578675, StatelessResetToken: 0xa476f2ac3783bdb047d1bac5b7ac3311} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7243afc8, StatelessResetToken: 0xc8ccd365d48df7486ecb6ba902b73426} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9c0499dd, StatelessResetToken: 0xc299dc9f3219a62d9ba68e1f200a0f3d} 2025/09/12 02:06:47 server -> &wire.NewTokenFrame{Token: 0xfce095115aeaded548fe9203d422fddc89b23d020ec6bef25b3e66edc0e13b815ed403b606fcc4e547efbb7108d34ab40c41304df9652e5a8a439dedaa97e90fa01da7c9900ee32ba350fb5c6f39cffa7a5de84b900f09d80e} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:47 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 920, Offset + Data length: 920} 2025/09/12 02:06:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:06:47 server -> Sending packet 13 (22 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:47 server Skipping packet number 12 2025/09/12 02:06:47 server -> Sending packet 14 (288 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:47 server -> &wire.NewTokenFrame{Token: 0x4dc0c43ddab9c98120f750f44f1ba467c988545365b0b10d4f42469db0f7012a374b6577bf39c42d8dd34b2fa4297242b41639f9fc847bcba36cbd248db6824fd9adee8006cce6b2ffa76e93d9e01bf6094cafcaf18ea7fdc50172} 2025/09/12 02:06:47 server <- Reading packet 3 (34 bytes) for connection 7243afc8, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: 7243afc8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 25.288ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:47 server newly acked packets (1): [5] 2025/09/12 02:06:47 server updated RTT: 36.405ms (σ: 18.728ms) 2025/09/12 02:06:47 server <- Reading packet 4 (26 bytes) for connection 7243afc8, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: 7243afc8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:47 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:47 Replacing connection for connection IDs [7243afc8 7c578675 9c0499dd 23d48309a5ff6bc32749470448f5767e97fa aa30f27a] with a closed connection. 2025/09/12 02:06:47 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:47 server Connection 23d48309a5ff6bc32749470448f5767e97fa closed. 2025/09/12 02:06:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:06:47 server -> Sending packet 21 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:47 server -> Sending packet 22 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:47 server <- Received Initial packet. 2025/09/12 02:06:47 Created qlog file: /logs/qlog/07503a3e6bca1940.sqlog 2025/09/12 02:06:47 server Changing connection ID to a9925182. 2025/09/12 02:06:47 Adding connection IDs 07503a3e6bca1940 and a9925182 for a new connection. 2025/09/12 02:06:47 server <- Reading packet 1 (1280 bytes) for connection 07503a3e6bca1940, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: 07503a3e6bca1940, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 1240, Data length: 269, Offset + Data length: 1509} 2025/09/12 02:06:47 server -> Sending packet 0 (37 bytes) for connection 07503a3e6bca1940, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a9925182, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:47 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:47 server <- Reading packet 2 (1280 bytes) for connection 07503a3e6bca1940, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: 07503a3e6bca1940, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:47 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:47 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:47 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:47 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:47 Adding connection ID b33ea53c. 2025/09/12 02:06:47 Adding connection ID be73f871. 2025/09/12 02:06:47 Adding connection ID 1ce531fb. 2025/09/12 02:06:47 server -> Sending packet 1 (1280 bytes) for connection 07503a3e6bca1940, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a9925182, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:47 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:47 server -> Sending packet 0 (828 bytes) for connection 07503a3e6bca1940, Handshake 2025/09/12 02:06:47 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: a9925182, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b33ea53c, StatelessResetToken: 0x27b956bf883aeb0f9d0f4de7a50d28bb} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1ce531fb, StatelessResetToken: 0x581dd0c54bb8a0b6ec37332b85164d86} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: be73f871, StatelessResetToken: 0xe47e022a1ce56f405f620eeb6da0225f} 2025/09/12 02:06:47 server <- Reading packet 3 (1280 bytes) for connection 07503a3e6bca1940, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: 07503a3e6bca1940, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 1240, Data length: 269, Offset + Data length: 1509} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:47 server -> Sending packet 2 (37 bytes) for connection 07503a3e6bca1940, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: a9925182, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:47 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:47 server <- Reading packet 4 (1280 bytes) for connection a9925182, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: a9925182, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:47 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:47 server newly acked packets (1): [1] 2025/09/12 02:06:47 server updated RTT: 33.134626ms (σ: 16.567313ms) 2025/09/12 02:06:47 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:47 server <- Reading packet 0 (75 bytes) for connection b33ea53c, Handshake 2025/09/12 02:06:47 server Long Header{Type: Handshake, DestConnectionID: b33ea53c, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:47 server Dropping Initial keys. 2025/09/12 02:06:47 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:47 server newly acked packets (1): [0] 2025/09/12 02:06:47 server updated RTT: 33.131ms (σ: 12.429ms) 2025/09/12 02:06:47 server Canceling loss detection timer. 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:47 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:47 server Dropping Handshake keys. 2025/09/12 02:06:47 server <- Reading packet 0 (25 bytes) for connection b33ea53c, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: b33ea53c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:47 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:47 server <- Reading packet 2 (42 bytes) for connection b33ea53c, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: b33ea53c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:47 server -> Sending packet 1 (298 bytes) for connection 07503a3e6bca1940, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 265.323µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:47 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:47 server -> &wire.NewTokenFrame{Token: 0x334553d7fabab7bb0db3e3fe7e1ad77d2762682643c82d5933b13bd574ea727681fe81027e8a3914fd88a9d3ae7e4c5a7530bcfd4561fb425ade24628bf9eb2127927fde28b5ff72f9b2cf16cc8ae3dc4ab0c5098dbc0b652359b0} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:47 Received request: GET /rygppkeuwl 2025/09/12 02:06:47 server -> Sending packet 2 (1045 bytes) for connection 07503a3e6bca1940, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:47 server <- Reading packet 3 (31 bytes) for connection b33ea53c, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: b33ea53c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 48µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:47 server newly acked packets (3): [0 1 2] 2025/09/12 02:06:47 server updated RTT: 32.931ms (σ: 9.721ms) 2025/09/12 02:06:47 server ECN capability confirmed. 2025/09/12 02:06:47 server Canceling loss detection timer. 2025/09/12 02:06:47 server Ignoring all packets below 3. 2025/09/12 02:06:47 server <- Reading packet 4 (26 bytes) for connection b33ea53c, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: b33ea53c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:47 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:47 Replacing connection for connection IDs [b33ea53c be73f871 1ce531fb 07503a3e6bca1940 a9925182] with a closed connection. 2025/09/12 02:06:47 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:47 server Connection 07503a3e6bca1940 closed. 2025/09/12 02:06:47 server <- Received Initial packet. 2025/09/12 02:06:47 Created qlog file: /logs/qlog/33c97335d10d239c.sqlog 2025/09/12 02:06:47 server Changing connection ID to 82219ace. 2025/09/12 02:06:47 Adding connection IDs 33c97335d10d239c and 82219ace for a new connection. 2025/09/12 02:06:47 server <- Reading packet 0 (1280 bytes) for connection 33c97335d10d239c, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: 33c97335d10d239c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:47 server -> Sending packet 0 (37 bytes) for connection 33c97335d10d239c, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 82219ace, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:47 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:47 server <- Reading packet 1 (1280 bytes) for connection 33c97335d10d239c, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: 33c97335d10d239c, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 1240, Data length: 273, Offset + Data length: 1513} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:47 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:47 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:47 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:47 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:47 Adding connection ID dc6e9d18. 2025/09/12 02:06:47 Adding connection ID 66360a4a. 2025/09/12 02:06:47 Adding connection ID 8c787732. 2025/09/12 02:06:47 server -> Sending packet 1 (1280 bytes) for connection 33c97335d10d239c, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 82219ace, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:47 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:47 server -> Sending packet 0 (841 bytes) for connection 33c97335d10d239c, Handshake 2025/09/12 02:06:47 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 82219ace, PacketNumber: 0, PacketNumberLen: 2, Length: 737, Version: v1} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8c787732, StatelessResetToken: 0x924fa6b95b3d37deb7faeef467c308be} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 66360a4a, StatelessResetToken: 0x63238da9bb7c12cfd9161e1524d01d51} 2025/09/12 02:06:47 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dc6e9d18, StatelessResetToken: 0xcb44419479920ea9e2d322a8b25ed8a2} 2025/09/12 02:06:47 server <- Reading packet 2 (1280 bytes) for connection 82219ace, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: 82219ace, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:47 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:47 server newly acked packets (1): [1] 2025/09/12 02:06:47 server updated RTT: 33.191605ms (σ: 16.595802ms) 2025/09/12 02:06:47 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:47 server <- Reading packet 0 (75 bytes) for connection dc6e9d18, Handshake 2025/09/12 02:06:47 server Long Header{Type: Handshake, DestConnectionID: dc6e9d18, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:47 server Dropping Initial keys. 2025/09/12 02:06:47 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:47 server newly acked packets (1): [0] 2025/09/12 02:06:47 server updated RTT: 33.202ms (σ: 12.468ms) 2025/09/12 02:06:47 server Canceling loss detection timer. 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:47 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:47 server Dropping Handshake keys. 2025/09/12 02:06:47 server <- Reading packet 0 (25 bytes) for connection dc6e9d18, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: dc6e9d18, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:47 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:47 server <- Reading packet 1 (47 bytes) for connection dc6e9d18, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: dc6e9d18, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408µs} 2025/09/12 02:06:47 server newly acked packets (1): [0] 2025/09/12 02:06:47 server updated RTT: 33.212ms (σ: 9.372ms) 2025/09/12 02:06:47 server Canceling loss detection timer. 2025/09/12 02:06:47 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:47 server -> Sending packet 1 (296 bytes) for connection 33c97335d10d239c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 Received request: GET /ddpcxlqwpq 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 277.137µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:47 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:47 server -> &wire.NewTokenFrame{Token: 0x4b81bc971dde72b53818c04e67bf256dc88b2b56a5e94981238f10bfd213e017acfac1e392d833812f96902a73a0f083a5f4fb375ceec23d2e5ce980c73631d0be9ca4812a6e82f8dff89acba2d73f2a4c3b5b879239bb730b9bf1} 2025/09/12 02:06:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:47 server -> Sending packet 2 (1045 bytes) for connection 33c97335d10d239c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:47 server -> Sending packet 3 (23 bytes) for connection 33c97335d10d239c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 02:06:47 Removing connection IDs [7243afc8 7c578675 9c0499dd 23d48309a5ff6bc32749470448f5767e97fa aa30f27a] for a closed connection after it has been retired. 2025/09/12 02:06:47 server <- Reading packet 2 (31 bytes) for connection dc6e9d18, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: dc6e9d18, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 64µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:47 server newly acked packets (2): [1 2] 2025/09/12 02:06:47 server updated RTT: 33.025ms (σ: 7.402ms) 2025/09/12 02:06:47 server ECN capability confirmed. 2025/09/12 02:06:47 server Ignoring all packets below 2. 2025/09/12 02:06:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:47 server -> Sending packet 5 (23 bytes) for connection 33c97335d10d239c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 02:06:47 server -> Sending packet 6 (23 bytes) for connection 33c97335d10d239c, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:47 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/09/12 02:06:47 server <- Reading packet 4 (26 bytes) for connection dc6e9d18, 1-RTT 2025/09/12 02:06:47 server Short Header{DestConnectionID: dc6e9d18, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:47 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:47 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:47 Replacing connection for connection IDs [dc6e9d18 66360a4a 8c787732 33c97335d10d239c 82219ace] with a closed connection. 2025/09/12 02:06:47 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:47 server Connection 33c97335d10d239c closed. 2025/09/12 02:06:47 server <- Received Initial packet. 2025/09/12 02:06:47 Created qlog file: /logs/qlog/3ab25a8a0d5eb30e4f407fc3bb203bd8.sqlog 2025/09/12 02:06:47 server Changing connection ID to 688e25c1. 2025/09/12 02:06:47 Adding connection IDs 3ab25a8a0d5eb30e4f407fc3bb203bd8 and 688e25c1 for a new connection. 2025/09/12 02:06:47 server <- Reading packet 0 (1280 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: 3ab25a8a0d5eb30e4f407fc3bb203bd8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 02:06:47 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:47 server -> Sending packet 0 (37 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8, Initial 2025/09/12 02:06:47 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 688e25c1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:47 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:47 Removing connection IDs [b33ea53c be73f871 1ce531fb 07503a3e6bca1940 a9925182] for a closed connection after it has been retired. 2025/09/12 02:06:48 server <- Reading packet 2 (1280 bytes) for connection 688e25c1, Initial 2025/09/12 02:06:48 server Long Header{Type: Initial, DestConnectionID: 688e25c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:48 server <- &wire.CryptoFrame{Offset: 1232, Data length: 279, Offset + Data length: 1511} 2025/09/12 02:06:48 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:48 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:48 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:48 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:48 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:48 Adding connection ID 0122b9d3. 2025/09/12 02:06:48 Adding connection ID 2d1b5c67. 2025/09/12 02:06:48 Adding connection ID ac0b4e98. 2025/09/12 02:06:48 server -> Sending packet 1 (1280 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8, Initial 2025/09/12 02:06:48 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 688e25c1, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:48 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:48 server <- Reading packet 3 (1280 bytes) for connection 688e25c1, Initial 2025/09/12 02:06:48 server Long Header{Type: Initial, DestConnectionID: 688e25c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:48 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:48 server <- &wire.CryptoFrame{Offset: 1232, Data length: 279, Offset + Data length: 1511} 2025/09/12 02:06:48 server -> Sending coalesced packet (2 parts, 887 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8 2025/09/12 02:06:48 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 688e25c1, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:48 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:48 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 688e25c1, PacketNumber: 0, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:06:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:06:48 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ac0b4e98, StatelessResetToken: 0x9169dad6627f2e6c10ee00c86ce6c747} 2025/09/12 02:06:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2d1b5c67, StatelessResetToken: 0xa0b6196da33e5d302d0dd544a24e102d} 2025/09/12 02:06:48 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0122b9d3, StatelessResetToken: 0x33583bece2d13b73581091d154df3fed} 2025/09/12 02:06:48 server <- Reading packet 4 (1280 bytes) for connection 688e25c1, Initial 2025/09/12 02:06:48 server Long Header{Type: Initial, DestConnectionID: 688e25c1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:48 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:48 server newly acked packets (1): [1] 2025/09/12 02:06:48 server updated RTT: 33.146959ms (σ: 16.573479ms) 2025/09/12 02:06:48 server Queueing packet (42 bytes) for later decryption 2025/09/12 02:06:48 Removing connection IDs [dc6e9d18 66360a4a 8c787732 33c97335d10d239c 82219ace] for a closed connection after it has been retired. 2025/09/12 02:06:48 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:48 server -> Sending packet 1 (757 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8, Handshake 2025/09/12 02:06:48 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 688e25c1, PacketNumber: 1, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:06:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:06:48 server -> Sending packet 2 (757 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8, Handshake 2025/09/12 02:06:48 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 688e25c1, PacketNumber: 2, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:06:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:06:48 server <- Reading packet 1 (70 bytes) for connection 0122b9d3, Handshake 2025/09/12 02:06:48 server Long Header{Type: Handshake, DestConnectionID: 0122b9d3, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:48 server Dropping Initial keys. 2025/09/12 02:06:48 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:48 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:48 server Dropping Handshake keys. 2025/09/12 02:06:48 server -> Sending packet 1 (288 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:48 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server -> &wire.NewTokenFrame{Token: 0x67dea357860d95de52dca8b50964d06f12c46c8e88c3a21d875bfb42bf84753137ab34f4e490d1993c2d0af61fd60afcaeded3e5df9cd40196f23cdb06ffcf46b12e8de158039207b5354efd0e128dd211f6cdcc3d39818f23d48b} 2025/09/12 02:06:48 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:48 server <- Reading packet 2 (42 bytes) for connection 0122b9d3, 1-RTT 2025/09/12 02:06:48 server Short Header{DestConnectionID: 0122b9d3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:48 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:48 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:48 server -> Sending packet 2 (28 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:48 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 83.153578ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:48 Received request: GET /mlbyshnuui 2025/09/12 02:06:48 server -> Sending packet 3 (1045 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:48 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:48 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/09/12 02:06:48 server <- Reading packet 4 (33 bytes) for connection 0122b9d3, 1-RTT 2025/09/12 02:06:48 server Short Header{DestConnectionID: 0122b9d3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:48 server newly acked packets (2): [0 1] 2025/09/12 02:06:48 server updated RTT: 32.889ms (σ: 12.943ms) 2025/09/12 02:06:48 server ECN capability confirmed. 2025/09/12 02:06:48 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:48 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:48 server -> Sending packet 4 (29 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:48 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 98.484µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:48 server <- Reading packet 5 (42 bytes) for connection 0122b9d3, 1-RTT 2025/09/12 02:06:48 server Short Header{DestConnectionID: 0122b9d3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:48 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:48 server Sending ACK because the ACK timer expired. 2025/09/12 02:06:48 server -> Sending packet 5 (30 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:48 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 25.269702ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:48 server -> Sending packet 7 (1045 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:48 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:48 server -> Sending packet 8 (1045 bytes) for connection 3ab25a8a0d5eb30e4f407fc3bb203bd8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:48 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:48 server <- Reading packet 6 (35 bytes) for connection 0122b9d3, 1-RTT 2025/09/12 02:06:48 server Short Header{DestConnectionID: 0122b9d3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 88µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 02:06:48 server <- Reading packet 7 (26 bytes) for connection 0122b9d3, 1-RTT 2025/09/12 02:06:48 server Short Header{DestConnectionID: 0122b9d3, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:48 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:48 Replacing connection for connection IDs [0122b9d3 2d1b5c67 ac0b4e98 688e25c1 3ab25a8a0d5eb30e4f407fc3bb203bd8] with a closed connection. 2025/09/12 02:06:48 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:48 server Connection 3ab25a8a0d5eb30e4f407fc3bb203bd8 closed. 2025/09/12 02:06:48 server <- Received Initial packet. 2025/09/12 02:06:48 Created qlog file: /logs/qlog/1a0dcc310fc7dcad76e83374e4be.sqlog 2025/09/12 02:06:48 server Changing connection ID to 965e2c26. 2025/09/12 02:06:48 Adding connection IDs 1a0dcc310fc7dcad76e83374e4be and 965e2c26 for a new connection. 2025/09/12 02:06:48 server <- Reading packet 1 (1280 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, Initial 2025/09/12 02:06:48 server Long Header{Type: Initial, DestConnectionID: 1a0dcc310fc7dcad76e83374e4be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:06:48 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:48 server <- &wire.CryptoFrame{Offset: 1234, Data length: 271, Offset + Data length: 1505} 2025/09/12 02:06:48 server -> Sending packet 0 (37 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, Initial 2025/09/12 02:06:48 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 965e2c26, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:48 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:06:48 server -> Sending packet 20 (22 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:48 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:48 server Skipping packet number 19 2025/09/12 02:06:48 server -> Sending packet 21 (286 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:48 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:48 server -> &wire.NewTokenFrame{Token: 0xcb648934d918c8ea594e4b1ff69e88696cd31f78ab2b077e3a14534e8120242bf96ce6ad7b3808a77fd436eb0a5e0d2e744c192a356221cb319ac14aa2d3b09a43431acfc7d77c87d136fb7843ba00803789c592372d7aaeec} 2025/09/12 02:06:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:06:48 server -> Sending packet 21 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:48 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:48 server -> Sending packet 22 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:48 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:48 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:48 server <- Reading packet 3 (1280 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, Initial 2025/09/12 02:06:48 server Long Header{Type: Initial, DestConnectionID: 1a0dcc310fc7dcad76e83374e4be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:06:48 server <- &wire.CryptoFrame{Offset: 1234, Data length: 271, Offset + Data length: 1505} 2025/09/12 02:06:48 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:48 server -> Sending packet 1 (39 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, Initial 2025/09/12 02:06:48 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 965e2c26, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:48 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 02:06:48 Removing connection IDs [1b519424 6584487f 82a2db28 cf5b72cea5c987261bd24ab798 7af2972c] for a closed connection after it has been retired. 2025/09/12 02:06:48 Removing connection IDs [0122b9d3 2d1b5c67 ac0b4e98 688e25c1 3ab25a8a0d5eb30e4f407fc3bb203bd8] for a closed connection after it has been retired. 2025/09/12 02:06:49 server <- Reading packet 7 (1280 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, Initial 2025/09/12 02:06:49 server Long Header{Type: Initial, DestConnectionID: 1a0dcc310fc7dcad76e83374e4be, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:06:49 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:49 server <- &wire.CryptoFrame{Offset: 1234, Data length: 271, Offset + Data length: 1505} 2025/09/12 02:06:49 server -> Sending packet 2 (41 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, Initial 2025/09/12 02:06:49 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 965e2c26, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 27, Version: v1} 2025/09/12 02:06:49 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 02:06:49 server <- Reading packet 8 (1280 bytes) for connection 965e2c26, Initial 2025/09/12 02:06:49 server Long Header{Type: Initial, DestConnectionID: 965e2c26, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:49 server <- &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 02:06:49 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:49 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:49 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:49 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:49 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:49 Adding connection ID 52f820be. 2025/09/12 02:06:49 Adding connection ID 241c6aae. 2025/09/12 02:06:49 Adding connection ID 6801a414. 2025/09/12 02:06:49 server -> Sending packet 3 (1280 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, Initial 2025/09/12 02:06:49 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 965e2c26, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:49 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 02:06:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:49 server -> Sending packet 0 (847 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, Handshake 2025/09/12 02:06:49 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 965e2c26, PacketNumber: 0, PacketNumberLen: 2, Length: 743, Version: v1} 2025/09/12 02:06:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/09/12 02:06:49 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 241c6aae, StatelessResetToken: 0x20b449a41a5934b6ca187dc124240507} 2025/09/12 02:06:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6801a414, StatelessResetToken: 0x346f56f3533854fdf77e914b9cd78a09} 2025/09/12 02:06:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 52f820be, StatelessResetToken: 0x986e0c33c7cc0d6226b272defd106a8f} 2025/09/12 02:06:49 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:49 server <- Reading packet 0 (75 bytes) for connection 52f820be, Handshake 2025/09/12 02:06:49 server Long Header{Type: Handshake, DestConnectionID: 52f820be, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:49 server Dropping Initial keys. 2025/09/12 02:06:49 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:49 server newly acked packets (1): [0] 2025/09/12 02:06:49 server updated RTT: 33.32552ms (σ: 16.66276ms) 2025/09/12 02:06:49 server Canceling loss detection timer. 2025/09/12 02:06:49 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:49 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:49 server Dropping Handshake keys. 2025/09/12 02:06:49 server <- Reading packet 0 (25 bytes) for connection 52f820be, 1-RTT 2025/09/12 02:06:49 server Short Header{DestConnectionID: 52f820be, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:49 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:49 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:49 server -> Sending packet 1 (293 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:49 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:49 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280.122µs} 2025/09/12 02:06:49 server -> &wire.NewTokenFrame{Token: 0x9b7768007776464b45e085ac728bbfff5beab87f37062fcb4b89fe1873814a6a2f5551f2f7f3a228dff024f1b4084b375593e60a85b18b5f5d6e49d4fc82763292611f9e4d5280a7e0d4a206cefedce0f3948f33da37f887f3012f} 2025/09/12 02:06:49 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:49 server <- Reading packet 2 (32 bytes) for connection 52f820be, 1-RTT 2025/09/12 02:06:49 server Short Header{DestConnectionID: 52f820be, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:49 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.48ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:49 server newly acked packets (2): [0 1] 2025/09/12 02:06:49 server updated RTT: 36.241ms (σ: 18.33ms) 2025/09/12 02:06:49 server ECN capability confirmed. 2025/09/12 02:06:49 server Canceling loss detection timer. 2025/09/12 02:06:49 server Ignoring all packets below 1. 2025/09/12 02:06:49 server <- Reading packet 4 (42 bytes) for connection 52f820be, 1-RTT 2025/09/12 02:06:49 server Short Header{DestConnectionID: 52f820be, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:49 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:49 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:49 server <- Reading packet 5 (42 bytes) for connection 52f820be, 1-RTT 2025/09/12 02:06:49 server Short Header{DestConnectionID: 52f820be, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:49 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:49 Received request: GET /hopvanlwtd 2025/09/12 02:06:49 server -> Sending packet 2 (29 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:49 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:49 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 126.797µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:49 server -> Sending packet 3 (1045 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:49 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:49 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:49 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:49 server -> Sending packet 5 (1045 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:49 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:49 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:49 server -> Sending packet 6 (1045 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:49 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:49 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:49 server -> Sending packet 7 (1366 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:49 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:49 server -> &wire.PingFrame{} 2025/09/12 02:06:50 server <- Reading packet 6 (1366 bytes) for connection 52f820be, 1-RTT 2025/09/12 02:06:50 server Short Header{DestConnectionID: 52f820be, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server <- &wire.PingFrame{} 2025/09/12 02:06:50 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:50 server <- Reading packet 7 (33 bytes) for connection 52f820be, 1-RTT 2025/09/12 02:06:50 server Short Header{DestConnectionID: 52f820be, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 0}}, DelayTime: 136µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:50 server newly acked packets (1): [6] 2025/09/12 02:06:50 server updated RTT: 35.901ms (σ: 14.426ms) 2025/09/12 02:06:50 server Canceling loss detection timer. 2025/09/12 02:06:50 server -> Sending packet 8 (32 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 154.569µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 02:06:50 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:50 server <- Received Initial packet. 2025/09/12 02:06:50 Created qlog file: /logs/qlog/b317e83c2cde0e8d.sqlog 2025/09/12 02:06:50 server Changing connection ID to 1cfdc7ea. 2025/09/12 02:06:50 Adding connection IDs b317e83c2cde0e8d and 1cfdc7ea for a new connection. 2025/09/12 02:06:50 server <- Reading packet 0 (1280 bytes) for connection b317e83c2cde0e8d, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: b317e83c2cde0e8d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 02:06:50 server -> Sending packet 0 (37 bytes) for connection b317e83c2cde0e8d, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1cfdc7ea, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:50 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:50 Removing connection ID 1a0dcc310fc7dcad76e83374e4be. 2025/09/12 02:06:50 Removing connection ID 965e2c26. 2025/09/12 02:06:50 server <- Reading packet 2 (1280 bytes) for connection 1cfdc7ea, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: 1cfdc7ea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 02:06:50 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:50 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:50 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:50 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:50 Adding connection ID 56c90fcd. 2025/09/12 02:06:50 Adding connection ID 77333d1f. 2025/09/12 02:06:50 Adding connection ID 7591b2d7. 2025/09/12 02:06:50 server -> Sending packet 1 (1280 bytes) for connection b317e83c2cde0e8d, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1cfdc7ea, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:50 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:50 server -> Sending packet 0 (839 bytes) for connection b317e83c2cde0e8d, Handshake 2025/09/12 02:06:50 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1cfdc7ea, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7591b2d7, StatelessResetToken: 0xc3912d10c30090f2deb0de5e451bf756} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 56c90fcd, StatelessResetToken: 0xc9c88d992a572707cb081a426b65f9e2} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 77333d1f, StatelessResetToken: 0xa13a52a581ec65380cdec6428c1fdb23} 2025/09/12 02:06:50 server <- Reading packet 3 (1280 bytes) for connection 1cfdc7ea, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: 1cfdc7ea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 1240, Data length: 266, Offset + Data length: 1506} 2025/09/12 02:06:50 server -> Sending packet 2 (39 bytes) for connection b317e83c2cde0e8d, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1cfdc7ea, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:50 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:50 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:50 server -> Sending packet 10 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:50 server -> Sending packet 11 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:50 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:50 server -> Sending packet 3 (1280 bytes) for connection b317e83c2cde0e8d, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1cfdc7ea, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:50 server -> Sending packet 4 (1280 bytes) for connection b317e83c2cde0e8d, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1cfdc7ea, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:50 server <- Reading packet 5 (1280 bytes) for connection 1cfdc7ea, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: 1cfdc7ea, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:50 server <- &wire.PingFrame{} 2025/09/12 02:06:50 server -> Sending packet 5 (41 bytes) for connection b317e83c2cde0e8d, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1cfdc7ea, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 27, Version: v1} 2025/09/12 02:06:50 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:50 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:50 server -> Sending packet 13 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:50 server -> Sending packet 14 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:50 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:06:50 server -> Sending packet 1 (748 bytes) for connection b317e83c2cde0e8d, Handshake 2025/09/12 02:06:50 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1cfdc7ea, PacketNumber: 1, PacketNumberLen: 2, Length: 735, Version: v1} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/09/12 02:06:50 server -> Sending packet 2 (748 bytes) for connection b317e83c2cde0e8d, Handshake 2025/09/12 02:06:50 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1cfdc7ea, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/09/12 02:06:50 server <- Reading packet 0 (75 bytes) for connection 1cfdc7ea, Handshake 2025/09/12 02:06:50 server Long Header{Type: Handshake, DestConnectionID: 1cfdc7ea, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:50 server Dropping Initial keys. 2025/09/12 02:06:50 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:50 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:50 server Dropping Handshake keys. 2025/09/12 02:06:50 server <- Reading packet 0 (42 bytes) for connection 1cfdc7ea, 1-RTT 2025/09/12 02:06:50 server Short Header{DestConnectionID: 1cfdc7ea, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:50 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:50 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:50 server -> Sending packet 2 (366 bytes) for connection b317e83c2cde0e8d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 Received request: GET /gcigrcazhu 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 263.222µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 77333d1f, StatelessResetToken: 0xa13a52a581ec65380cdec6428c1fdb23} 2025/09/12 02:06:50 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:50 server -> &wire.NewTokenFrame{Token: 0x1244e747d89704f158157dd698d07e88a5a0d3fea6200af54978caf695d1c6e4289f8a84af5f17780e5170f195c94dbd3dcae03bc1fde5f706ef049b6d853725de6235ec0cfae9e9509119132fc95ad0e6a0f4f22ec44b0c56} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7591b2d7, StatelessResetToken: 0xc3912d10c30090f2deb0de5e451bf756} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 56c90fcd, StatelessResetToken: 0xc9c88d992a572707cb081a426b65f9e2} 2025/09/12 02:06:50 server -> Sending packet 3 (1280 bytes) for connection b317e83c2cde0e8d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7591b2d7, StatelessResetToken: 0xc3912d10c30090f2deb0de5e451bf756} 2025/09/12 02:06:50 server -> &wire.NewTokenFrame{Token: 0x1244e747d89704f158157dd698d07e88a5a0d3fea6200af54978caf695d1c6e4289f8a84af5f17780e5170f195c94dbd3dcae03bc1fde5f706ef049b6d853725de6235ec0cfae9e9509119132fc95ad0e6a0f4f22ec44b0c56} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 56c90fcd, StatelessResetToken: 0xc9c88d992a572707cb081a426b65f9e2} 2025/09/12 02:06:50 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 77333d1f, StatelessResetToken: 0xa13a52a581ec65380cdec6428c1fdb23} 2025/09/12 02:06:50 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 920, Offset + Data length: 920} 2025/09/12 02:06:50 server -> Sending packet 4 (1366 bytes) for connection b317e83c2cde0e8d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.PingFrame{} 2025/09/12 02:06:50 server -> Sending packet 5 (127 bytes) for connection b317e83c2cde0e8d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 920, Data length: 104, Offset + Data length: 1024} 2025/09/12 02:06:50 server <- Reading packet 1 (33 bytes) for connection 56c90fcd, 1-RTT 2025/09/12 02:06:50 server Short Header{DestConnectionID: 56c90fcd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 200µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:50 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:50 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:50 server <- Reading packet 3 (26 bytes) for connection 56c90fcd, 1-RTT 2025/09/12 02:06:50 server Short Header{DestConnectionID: 56c90fcd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:50 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:50 Replacing connection for connection IDs [56c90fcd 77333d1f 7591b2d7 b317e83c2cde0e8d 1cfdc7ea] with a closed connection. 2025/09/12 02:06:50 server Connection b317e83c2cde0e8d closed. 2025/09/12 02:06:50 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:50 server <- Received Initial packet. 2025/09/12 02:06:50 Created qlog file: /logs/qlog/28262327c113e254b12aef3337684aca.sqlog 2025/09/12 02:06:50 server Changing connection ID to 2d5ff96d. 2025/09/12 02:06:50 Adding connection IDs 28262327c113e254b12aef3337684aca and 2d5ff96d for a new connection. 2025/09/12 02:06:50 server <- Reading packet 0 (1280 bytes) for connection 28262327c113e254b12aef3337684aca, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: 28262327c113e254b12aef3337684aca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:50 server -> Sending packet 0 (37 bytes) for connection 28262327c113e254b12aef3337684aca, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2d5ff96d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:50 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:50 server <- Reading packet 1 (1280 bytes) for connection 28262327c113e254b12aef3337684aca, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: 28262327c113e254b12aef3337684aca, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 1232, Data length: 276, Offset + Data length: 1508} 2025/09/12 02:06:50 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:50 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:50 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:50 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:50 Adding connection ID 038a2f42. 2025/09/12 02:06:50 Adding connection ID ef7b2029. 2025/09/12 02:06:50 Adding connection ID 6229a142. 2025/09/12 02:06:50 server -> Sending packet 1 (1280 bytes) for connection 28262327c113e254b12aef3337684aca, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 2d5ff96d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:50 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:50 server -> Sending packet 0 (848 bytes) for connection 28262327c113e254b12aef3337684aca, Handshake 2025/09/12 02:06:50 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5ff96d, PacketNumber: 0, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 038a2f42, StatelessResetToken: 0x2b0444c539cbbf4462545f024ab0e069} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6229a142, StatelessResetToken: 0xfb9d799a3430a677e73d70b470c557d5} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ef7b2029, StatelessResetToken: 0x998d29afaf94c3cd63ec4144cd5bd7aa} 2025/09/12 02:06:50 server <- Reading packet 2 (1280 bytes) for connection 2d5ff96d, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: 2d5ff96d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:50 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:50 server newly acked packets (1): [1] 2025/09/12 02:06:50 server updated RTT: 33.06937ms (σ: 16.534685ms) 2025/09/12 02:06:50 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/09/12 02:06:50 server -> Sending packet 28 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:50 server -> Sending packet 29 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:50 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:06:50 server -> Sending packet 24 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:50 server -> Sending packet 25 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:50 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:50 server -> Sending packet 1 (757 bytes) for connection 28262327c113e254b12aef3337684aca, Handshake 2025/09/12 02:06:50 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5ff96d, PacketNumber: 1, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:06:50 server -> Sending packet 2 (757 bytes) for connection 28262327c113e254b12aef3337684aca, Handshake 2025/09/12 02:06:50 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 2d5ff96d, PacketNumber: 2, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:06:50 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:06:50 server -> Sending packet 25 (1045 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:50 server Skipping packet number 24 2025/09/12 02:06:50 server -> Sending packet 26 (358 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec5dd8ba, StatelessResetToken: 0xbb47c416d601b36c8ffa85154db3d42d} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b429bc2, StatelessResetToken: 0x73b09b1c2fd2803ed3839d3923122fd8} 2025/09/12 02:06:50 server -> &wire.NewTokenFrame{Token: 0x9de576d17e7928b2b87e6597c307535789775b80561970c1632d7d8c3ac233f0289adbf9fb508cf1d00fad949ff8d4aad9f61963112d287480452ec3467728047deee3ba1054e7c23adabd3dcb8943b31a9e41be51bed2ebcf} 2025/09/12 02:06:50 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52262b2d, StatelessResetToken: 0x42a5dfbed375099414854a05caa0aeed} 2025/09/12 02:06:50 server <- Reading packet 0 (75 bytes) for connection 2d5ff96d, Handshake 2025/09/12 02:06:50 server Long Header{Type: Handshake, DestConnectionID: 2d5ff96d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:50 server Dropping Initial keys. 2025/09/12 02:06:50 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:50 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:50 server Dropping Handshake keys. 2025/09/12 02:06:50 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:50 server -> Sending packet 2 (360 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.NewTokenFrame{Token: 0x098de4541a11f01271cc6daa57035162c898828c56d5914dc7144240fad12aabd9f0690bf6d8b1056c44f8dee71ed95afe7dbd4eae2410ced4c2d92ec83b2ae075bdae8f3450a7e7bbf9b773337d88179d6bbf076f7a87ffeb24c0} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ef7b2029, StatelessResetToken: 0x998d29afaf94c3cd63ec4144cd5bd7aa} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6229a142, StatelessResetToken: 0xfb9d799a3430a677e73d70b470c557d5} 2025/09/12 02:06:50 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 038a2f42, StatelessResetToken: 0x2b0444c539cbbf4462545f024ab0e069} 2025/09/12 02:06:50 server -> Sending packet 3 (360 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.NewTokenFrame{Token: 0x098de4541a11f01271cc6daa57035162c898828c56d5914dc7144240fad12aabd9f0690bf6d8b1056c44f8dee71ed95afe7dbd4eae2410ced4c2d92ec83b2ae075bdae8f3450a7e7bbf9b773337d88179d6bbf076f7a87ffeb24c0} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 038a2f42, StatelessResetToken: 0x2b0444c539cbbf4462545f024ab0e069} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6229a142, StatelessResetToken: 0xfb9d799a3430a677e73d70b470c557d5} 2025/09/12 02:06:50 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:50 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ef7b2029, StatelessResetToken: 0x998d29afaf94c3cd63ec4144cd5bd7aa} 2025/09/12 02:06:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:50 server <- Reading packet 1 (33 bytes) for connection 038a2f42, 1-RTT 2025/09/12 02:06:50 server Short Header{DestConnectionID: 038a2f42, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 184µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:50 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:50 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:50 server -> Sending packet 4 (27 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 90.028µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:50 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:06:50 server -> Sending packet 16 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:50 server -> Sending packet 17 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:50 server <- Reading packet 6 (42 bytes) for connection 038a2f42, 1-RTT 2025/09/12 02:06:50 server Short Header{DestConnectionID: 038a2f42, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:50 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:50 server -> Sending packet 5 (1366 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.PingFrame{} 2025/09/12 02:06:50 Received request: GET /ashiwssyax 2025/09/12 02:06:50 server -> Sending packet 6 (29 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 1, Smallest: 1}}, DelayTime: 156.922µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:50 server -> Sending packet 7 (1045 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:50 server <- Reading packet 8 (33 bytes) for connection 038a2f42, 1-RTT 2025/09/12 02:06:50 server Short Header{DestConnectionID: 038a2f42, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 3}}, DelayTime: 72µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 02:06:50 server newly acked packets (3): [3 5 7] 2025/09/12 02:06:50 server updated RTT: 33.071ms (σ: 12.404ms) 2025/09/12 02:06:50 server ECN capability confirmed. 2025/09/12 02:06:50 server Canceling loss detection timer. 2025/09/12 02:06:50 server -> Sending packet 8 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:50 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:50 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:50 server <- Received Initial packet. 2025/09/12 02:06:50 Created qlog file: /logs/qlog/9355b1d47926d732459b8ba35e8001a6.sqlog 2025/09/12 02:06:50 server Changing connection ID to f5dd59b1. 2025/09/12 02:06:50 Adding connection IDs 9355b1d47926d732459b8ba35e8001a6 and f5dd59b1 for a new connection. 2025/09/12 02:06:50 server <- Reading packet 0 (1280 bytes) for connection 9355b1d47926d732459b8ba35e8001a6, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: 9355b1d47926d732459b8ba35e8001a6, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 02:06:50 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:50 server -> Sending packet 0 (37 bytes) for connection 9355b1d47926d732459b8ba35e8001a6, Initial 2025/09/12 02:06:50 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f5dd59b1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:50 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:51 Removing connection ID 28262327c113e254b12aef3337684aca. 2025/09/12 02:06:51 server <- Reading packet 2 (1280 bytes) for connection f5dd59b1, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: f5dd59b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:51 server <- &wire.CryptoFrame{Offset: 1232, Data length: 279, Offset + Data length: 1511} 2025/09/12 02:06:51 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:51 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:51 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:51 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:51 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:51 Adding connection ID 02f960ea. 2025/09/12 02:06:51 Adding connection ID f406c41f. 2025/09/12 02:06:51 Adding connection ID 125605b1. 2025/09/12 02:06:51 server -> Sending packet 1 (1280 bytes) for connection 9355b1d47926d732459b8ba35e8001a6, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: f5dd59b1, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:51 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:51 server -> Sending packet 0 (838 bytes) for connection 9355b1d47926d732459b8ba35e8001a6, Handshake 2025/09/12 02:06:51 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: f5dd59b1, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f406c41f, StatelessResetToken: 0xb589073492b607ebd33d82886ffd2801} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 02f960ea, StatelessResetToken: 0x36e9f863934232f60de30fd2fe5a702d} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 125605b1, StatelessResetToken: 0xcf0c1bddf0e0db450d441f0c5cc2f3aa} 2025/09/12 02:06:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:51 server -> Sending packet 10 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:51 server -> Sending packet 11 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:51 Removing connection ID 2d5ff96d. 2025/09/12 02:06:51 server <- Reading packet 4 (1280 bytes) for connection f5dd59b1, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: f5dd59b1, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:51 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:51 server newly acked packets (1): [1] 2025/09/12 02:06:51 server updated RTT: 33.428455ms (σ: 16.714227ms) 2025/09/12 02:06:51 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:51 server <- Reading packet 0 (75 bytes) for connection 02f960ea, Handshake 2025/09/12 02:06:51 server Long Header{Type: Handshake, DestConnectionID: 02f960ea, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:51 server Dropping Initial keys. 2025/09/12 02:06:51 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:51 server newly acked packets (1): [0] 2025/09/12 02:06:51 server updated RTT: 33.423ms (σ: 12.543ms) 2025/09/12 02:06:51 server Canceling loss detection timer. 2025/09/12 02:06:51 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:51 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:51 server Dropping Handshake keys. 2025/09/12 02:06:51 server <- Reading packet 0 (25 bytes) for connection 02f960ea, 1-RTT 2025/09/12 02:06:51 server Short Header{DestConnectionID: 02f960ea, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:51 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:51 server <- Reading packet 1 (47 bytes) for connection 02f960ea, 1-RTT 2025/09/12 02:06:51 server Short Header{DestConnectionID: 02f960ea, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 456µs} 2025/09/12 02:06:51 server newly acked packets (1): [0] 2025/09/12 02:06:51 server updated RTT: 33.43ms (σ: 9.421ms) 2025/09/12 02:06:51 server Canceling loss detection timer. 2025/09/12 02:06:51 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:51 server -> Sending packet 1 (296 bytes) for connection 9355b1d47926d732459b8ba35e8001a6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 412.336µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:51 server -> &wire.NewTokenFrame{Token: 0x40eb3dfa322b06f8e915db665895b8f8b51d56580bbf6a75642b1c61ee37b4cb74d114f47eab388775bf4228e4d879c8619c22948c36101dad0cce137dec1df866be3c41828b4bcf51b238125a0e3639fab8d65e2f9dee12379696} 2025/09/12 02:06:51 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:51 Received request: GET /plxyfwpamb 2025/09/12 02:06:51 server -> Sending packet 2 (1045 bytes) for connection 9355b1d47926d732459b8ba35e8001a6, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:51 server <- Reading packet 2 (31 bytes) for connection 02f960ea, 1-RTT 2025/09/12 02:06:51 server Short Header{DestConnectionID: 02f960ea, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 64µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:51 server newly acked packets (2): [1 2] 2025/09/12 02:06:51 server updated RTT: 33.208ms (σ: 7.508ms) 2025/09/12 02:06:51 server ECN capability confirmed. 2025/09/12 02:06:51 server Canceling loss detection timer. 2025/09/12 02:06:51 server Ignoring all packets below 2. 2025/09/12 02:06:51 server <- Reading packet 3 (26 bytes) for connection 02f960ea, 1-RTT 2025/09/12 02:06:51 server Short Header{DestConnectionID: 02f960ea, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:51 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:51 Replacing connection for connection IDs [02f960ea f406c41f 125605b1 9355b1d47926d732459b8ba35e8001a6 f5dd59b1] with a closed connection. 2025/09/12 02:06:51 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:51 server Connection 9355b1d47926d732459b8ba35e8001a6 closed. 2025/09/12 02:06:51 server <- Received Initial packet. 2025/09/12 02:06:51 Created qlog file: /logs/qlog/3dc66c4907caba68b8.sqlog 2025/09/12 02:06:51 server Changing connection ID to e0f3d7ef. 2025/09/12 02:06:51 Adding connection IDs 3dc66c4907caba68b8 and e0f3d7ef for a new connection. 2025/09/12 02:06:51 server <- Reading packet 0 (1280 bytes) for connection 3dc66c4907caba68b8, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: 3dc66c4907caba68b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:51 server <- &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 02:06:51 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:51 server -> Sending packet 0 (37 bytes) for connection 3dc66c4907caba68b8, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e0f3d7ef, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:51 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:51 server <- Reading packet 1 (1280 bytes) for connection 3dc66c4907caba68b8, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: 3dc66c4907caba68b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:51 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:51 server <- &wire.CryptoFrame{Offset: 1239, Data length: 276, Offset + Data length: 1515} 2025/09/12 02:06:51 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:51 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:51 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:51 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:51 Adding connection ID 242542bd. 2025/09/12 02:06:51 Adding connection ID 83a0e45f. 2025/09/12 02:06:51 Adding connection ID 5118452c. 2025/09/12 02:06:51 server -> Sending packet 1 (1280 bytes) for connection 3dc66c4907caba68b8, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e0f3d7ef, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:51 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:51 server -> Sending packet 0 (832 bytes) for connection 3dc66c4907caba68b8, Handshake 2025/09/12 02:06:51 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e0f3d7ef, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 83a0e45f, StatelessResetToken: 0x35aa3bea479d772b676d95f39b907286} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 242542bd, StatelessResetToken: 0x12865e1887be6a052f0d2fd09fd5d6d2} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5118452c, StatelessResetToken: 0x81a8f1f5a7922728e578c4fa49bc6498} 2025/09/12 02:06:51 Removing connection IDs [56c90fcd 77333d1f 7591b2d7 b317e83c2cde0e8d 1cfdc7ea] for a closed connection after it has been retired. 2025/09/12 02:06:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:51 server -> Sending packet 13 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:51 server -> Sending packet 14 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:51 server -> Sending packet 15 (1409 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.PingFrame{} 2025/09/12 02:06:51 Removing connection IDs [02f960ea f406c41f 125605b1 9355b1d47926d732459b8ba35e8001a6 f5dd59b1] for a closed connection after it has been retired. 2025/09/12 02:06:51 server <- Reading packet 2 (1280 bytes) for connection 3dc66c4907caba68b8, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: 3dc66c4907caba68b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:51 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:51 server <- &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 02:06:51 server -> Sending packet 2 (37 bytes) for connection 3dc66c4907caba68b8, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e0f3d7ef, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:51 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:51 server <- Reading packet 3 (1280 bytes) for connection 3dc66c4907caba68b8, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: 3dc66c4907caba68b8, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:51 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:51 server <- &wire.CryptoFrame{Offset: 1239, Data length: 276, Offset + Data length: 1515} 2025/09/12 02:06:51 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:51 server -> Sending packet 3 (1280 bytes) for connection 3dc66c4907caba68b8, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e0f3d7ef, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:51 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:51 server -> Sending packet 4 (1280 bytes) for connection 3dc66c4907caba68b8, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e0f3d7ef, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:51 server <- Reading packet 4 (1280 bytes) for connection e0f3d7ef, Initial 2025/09/12 02:06:51 server Long Header{Type: Initial, DestConnectionID: e0f3d7ef, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:51 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s} 2025/09/12 02:06:51 server newly acked packets (1): [4] 2025/09/12 02:06:51 server updated RTT: 34.159275ms (σ: 17.079637ms) 2025/09/12 02:06:51 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:51 server -> Sending packet 1 (741 bytes) for connection 3dc66c4907caba68b8, Handshake 2025/09/12 02:06:51 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e0f3d7ef, PacketNumber: 1, PacketNumberLen: 2, Length: 728, Version: v1} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/12 02:06:51 server -> Sending packet 2 (741 bytes) for connection 3dc66c4907caba68b8, Handshake 2025/09/12 02:06:51 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e0f3d7ef, PacketNumber: 2, PacketNumberLen: 2, Length: 728, Version: v1} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/09/12 02:06:51 server <- Reading packet 2 (70 bytes) for connection 242542bd, Handshake 2025/09/12 02:06:51 server Long Header{Type: Handshake, DestConnectionID: 242542bd, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:51 server Dropping Initial keys. 2025/09/12 02:06:51 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:51 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:51 server Dropping Handshake keys. 2025/09/12 02:06:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:51 server -> Sending packet 2 (360 bytes) for connection 3dc66c4907caba68b8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5118452c, StatelessResetToken: 0x81a8f1f5a7922728e578c4fa49bc6498} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 83a0e45f, StatelessResetToken: 0x35aa3bea479d772b676d95f39b907286} 2025/09/12 02:06:51 server -> &wire.NewTokenFrame{Token: 0xe5ddcb19f3f7c1b14563dee059a689413d9e63f680846eb6a850c29c5e16163d19fb411e2fb9578fd0d4eaccf9680020e287241864b2c8ca39581687cd5e54f36ea501f451f6a24b914d89b31439e84248cfa00344a34d8ad54e49} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 242542bd, StatelessResetToken: 0x12865e1887be6a052f0d2fd09fd5d6d2} 2025/09/12 02:06:51 server -> Sending packet 3 (360 bytes) for connection 3dc66c4907caba68b8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 83a0e45f, StatelessResetToken: 0x35aa3bea479d772b676d95f39b907286} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5118452c, StatelessResetToken: 0x81a8f1f5a7922728e578c4fa49bc6498} 2025/09/12 02:06:51 server -> &wire.NewTokenFrame{Token: 0xe5ddcb19f3f7c1b14563dee059a689413d9e63f680846eb6a850c29c5e16163d19fb411e2fb9578fd0d4eaccf9680020e287241864b2c8ca39581687cd5e54f36ea501f451f6a24b914d89b31439e84248cfa00344a34d8ad54e49} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 242542bd, StatelessResetToken: 0x12865e1887be6a052f0d2fd09fd5d6d2} 2025/09/12 02:06:51 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:51 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:51 server -> Sending packet 5 (360 bytes) for connection 3dc66c4907caba68b8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:51 server -> &wire.NewTokenFrame{Token: 0xe5ddcb19f3f7c1b14563dee059a689413d9e63f680846eb6a850c29c5e16163d19fb411e2fb9578fd0d4eaccf9680020e287241864b2c8ca39581687cd5e54f36ea501f451f6a24b914d89b31439e84248cfa00344a34d8ad54e49} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 83a0e45f, StatelessResetToken: 0x35aa3bea479d772b676d95f39b907286} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 242542bd, StatelessResetToken: 0x12865e1887be6a052f0d2fd09fd5d6d2} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5118452c, StatelessResetToken: 0x81a8f1f5a7922728e578c4fa49bc6498} 2025/09/12 02:06:51 server -> Sending packet 6 (360 bytes) for connection 3dc66c4907caba68b8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 242542bd, StatelessResetToken: 0x12865e1887be6a052f0d2fd09fd5d6d2} 2025/09/12 02:06:51 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5118452c, StatelessResetToken: 0x81a8f1f5a7922728e578c4fa49bc6498} 2025/09/12 02:06:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 83a0e45f, StatelessResetToken: 0x35aa3bea479d772b676d95f39b907286} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:51 server -> &wire.NewTokenFrame{Token: 0xe5ddcb19f3f7c1b14563dee059a689413d9e63f680846eb6a850c29c5e16163d19fb411e2fb9578fd0d4eaccf9680020e287241864b2c8ca39581687cd5e54f36ea501f451f6a24b914d89b31439e84248cfa00344a34d8ad54e49} 2025/09/12 02:06:51 server -> Sending packet 7 (1366 bytes) for connection 3dc66c4907caba68b8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.PingFrame{} 2025/09/12 02:06:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:06:51 server -> Sending packet 17 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:51 server -> Sending packet 18 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:51 server <- Reading packet 3 (35 bytes) for connection 242542bd, 1-RTT 2025/09/12 02:06:51 server Short Header{DestConnectionID: 242542bd, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 240µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:51 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:51 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:51 server -> Sending packet 8 (27 bytes) for connection 3dc66c4907caba68b8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 129.342µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:51 Removing connection ID 3dc66c4907caba68b8. 2025/09/12 02:06:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:06:51 server -> Sending packet 19 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:51 server -> Sending packet 20 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:06:51 server -> Sending packet 23 (22 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:51 server Skipping packet number 22 2025/09/12 02:06:51 server -> Sending packet 24 (286 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:51 server -> &wire.NewTokenFrame{Token: 0xcb648934d918c8ea594e4b1ff69e88696cd31f78ab2b077e3a14534e8120242bf96ce6ad7b3808a77fd436eb0a5e0d2e744c192a356221cb319ac14aa2d3b09a43431acfc7d77c87d136fb7843ba00803789c592372d7aaeec} 2025/09/12 02:06:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:51 server <- Reading packet 7 (42 bytes) for connection 242542bd, 1-RTT 2025/09/12 02:06:51 server Short Header{DestConnectionID: 242542bd, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:51 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:51 server <- Reading packet 8 (42 bytes) for connection 242542bd, 1-RTT 2025/09/12 02:06:51 server Short Header{DestConnectionID: 242542bd, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:51 server -> Sending packet 9 (29 bytes) for connection 3dc66c4907caba68b8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 108.363µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:51 Received request: GET /bxsvlgnpem 2025/09/12 02:06:51 server -> Sending packet 10 (1045 bytes) for connection 3dc66c4907caba68b8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:51 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:51 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:52 Removing connection ID e0f3d7ef. 2025/09/12 02:06:52 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:06:52 server -> Sending packet 24 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:52 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:52 server -> Sending packet 25 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:52 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:52 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:06:52 server -> Sending packet 12 (360 bytes) for connection 3dc66c4907caba68b8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:52 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5118452c, StatelessResetToken: 0x81a8f1f5a7922728e578c4fa49bc6498} 2025/09/12 02:06:52 server -> &wire.NewTokenFrame{Token: 0xe5ddcb19f3f7c1b14563dee059a689413d9e63f680846eb6a850c29c5e16163d19fb411e2fb9578fd0d4eaccf9680020e287241864b2c8ca39581687cd5e54f36ea501f451f6a24b914d89b31439e84248cfa00344a34d8ad54e49} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 242542bd, StatelessResetToken: 0x12865e1887be6a052f0d2fd09fd5d6d2} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 83a0e45f, StatelessResetToken: 0x35aa3bea479d772b676d95f39b907286} 2025/09/12 02:06:52 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:52 server Skipping packet number 11 2025/09/12 02:06:52 server -> Sending packet 13 (1045 bytes) for connection 3dc66c4907caba68b8, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:52 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:52 server <- Reading packet 9 (1366 bytes) for connection 242542bd, 1-RTT 2025/09/12 02:06:52 server Short Header{DestConnectionID: 242542bd, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server <- &wire.PingFrame{} 2025/09/12 02:06:52 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:52 server <- Reading packet 11 (26 bytes) for connection 242542bd, 1-RTT 2025/09/12 02:06:52 server Short Header{DestConnectionID: 242542bd, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:52 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:52 Replacing connection for connection IDs [242542bd 83a0e45f 5118452c] with a closed connection. 2025/09/12 02:06:52 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:52 server Connection 3dc66c4907caba68b8 closed. 2025/09/12 02:06:52 server <- Received Initial packet. 2025/09/12 02:06:52 Created qlog file: /logs/qlog/7d3f3c3a5acf373df3.sqlog 2025/09/12 02:06:52 server Changing connection ID to 1d8a5bb2. 2025/09/12 02:06:52 Adding connection IDs 7d3f3c3a5acf373df3 and 1d8a5bb2 for a new connection. 2025/09/12 02:06:52 server <- Reading packet 0 (1280 bytes) for connection 7d3f3c3a5acf373df3, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: 7d3f3c3a5acf373df3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 02:06:52 server -> Sending packet 0 (37 bytes) for connection 7d3f3c3a5acf373df3, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1d8a5bb2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:52 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:52 server <- Reading packet 1 (1280 bytes) for connection 7d3f3c3a5acf373df3, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: 7d3f3c3a5acf373df3, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 02:06:52 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:52 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:52 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:52 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:52 Adding connection ID d91e7d59. 2025/09/12 02:06:52 Adding connection ID e85e7a7a. 2025/09/12 02:06:52 Adding connection ID db716a26. 2025/09/12 02:06:52 server -> Sending packet 1 (1280 bytes) for connection 7d3f3c3a5acf373df3, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1d8a5bb2, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:52 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:52 server -> Sending packet 0 (830 bytes) for connection 7d3f3c3a5acf373df3, Handshake 2025/09/12 02:06:52 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 1d8a5bb2, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/09/12 02:06:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/09/12 02:06:52 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: db716a26, StatelessResetToken: 0x4a529d64fa943366b104cf2cd8214a3b} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d91e7d59, StatelessResetToken: 0x29119cf9913cf0811b5e6da25abe5040} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e85e7a7a, StatelessResetToken: 0x42c3421e6250f72aa93d8bd1fd2f83ee} 2025/09/12 02:06:52 server <- Reading packet 2 (1280 bytes) for connection 1d8a5bb2, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: 1d8a5bb2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 1239, Data length: 275, Offset + Data length: 1514} 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:52 server -> Sending packet 2 (37 bytes) for connection 7d3f3c3a5acf373df3, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1d8a5bb2, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:52 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:52 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:06:52 server -> Sending packet 20 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:52 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:52 server -> Sending packet 21 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:52 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:52 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:52 server -> Sending packet 3 (1280 bytes) for connection 7d3f3c3a5acf373df3, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1d8a5bb2, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:52 server -> Sending packet 4 (1280 bytes) for connection 7d3f3c3a5acf373df3, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 1d8a5bb2, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:52 server <- Reading packet 4 (1280 bytes) for connection 1d8a5bb2, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: 1d8a5bb2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:52 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:52 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/09/12 02:06:52 server <- Reading packet 5 (1185 bytes) for connection d91e7d59, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: d91e7d59, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/09/12 02:06:52 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:52 server newly acked packets (1): [4] 2025/09/12 02:06:52 server updated RTT: 34.188089ms (σ: 17.094044ms) 2025/09/12 02:06:52 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/09/12 02:06:52 server <- Reading packet 0 (70 bytes) for connection d91e7d59, Handshake 2025/09/12 02:06:52 server Long Header{Type: Handshake, DestConnectionID: d91e7d59, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:52 server Dropping Initial keys. 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:52 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:52 server Dropping Handshake keys. 2025/09/12 02:06:52 server <- Reading packet 0 (25 bytes) for connection d91e7d59, 1-RTT 2025/09/12 02:06:52 server Short Header{DestConnectionID: d91e7d59, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:52 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:52 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:52 server -> Sending packet 2 (365 bytes) for connection 7d3f3c3a5acf373df3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:52 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 277.819µs} 2025/09/12 02:06:52 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:52 server -> &wire.NewTokenFrame{Token: 0x061eebb1558ada49148fd4a867a2a2630e81b81ad12cd53adeb6f58a4868256738d0c60fba1e9d844245e56a64e499d7b8507357f55ed5393f5a412e13545080bf3186633f74fa75f48206fa3d2f5bfe85c41f291c14a4efe9257f} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e85e7a7a, StatelessResetToken: 0x42c3421e6250f72aa93d8bd1fd2f83ee} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: db716a26, StatelessResetToken: 0x4a529d64fa943366b104cf2cd8214a3b} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d91e7d59, StatelessResetToken: 0x29119cf9913cf0811b5e6da25abe5040} 2025/09/12 02:06:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:52 server -> Sending packet 3 (360 bytes) for connection 7d3f3c3a5acf373df3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:52 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d91e7d59, StatelessResetToken: 0x29119cf9913cf0811b5e6da25abe5040} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: db716a26, StatelessResetToken: 0x4a529d64fa943366b104cf2cd8214a3b} 2025/09/12 02:06:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e85e7a7a, StatelessResetToken: 0x42c3421e6250f72aa93d8bd1fd2f83ee} 2025/09/12 02:06:52 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:52 server -> &wire.NewTokenFrame{Token: 0x061eebb1558ada49148fd4a867a2a2630e81b81ad12cd53adeb6f58a4868256738d0c60fba1e9d844245e56a64e499d7b8507357f55ed5393f5a412e13545080bf3186633f74fa75f48206fa3d2f5bfe85c41f291c14a4efe9257f} 2025/09/12 02:06:52 server <- Reading packet 2 (31 bytes) for connection d91e7d59, 1-RTT 2025/09/12 02:06:52 server Short Header{DestConnectionID: d91e7d59, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 201.272ms} 2025/09/12 02:06:52 server <- Reading packet 3 (33 bytes) for connection d91e7d59, 1-RTT 2025/09/12 02:06:52 server Short Header{DestConnectionID: d91e7d59, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 176µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:52 server newly acked packets (1): [3] 2025/09/12 02:06:52 server updated RTT: 33.838ms (σ: 13.519ms) 2025/09/12 02:06:52 server ECN capability confirmed. 2025/09/12 02:06:52 server Canceling loss detection timer. 2025/09/12 02:06:52 Removing connection IDs [242542bd 83a0e45f 5118452c] for a closed connection after it has been retired. 2025/09/12 02:06:52 server <- Reading packet 5 (25 bytes) for connection d91e7d59, 1-RTT 2025/09/12 02:06:52 server Short Header{DestConnectionID: d91e7d59, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:52 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:52 server -> Sending packet 4 (31 bytes) for connection 7d3f3c3a5acf373df3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:52 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 97.913µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:52 server <- Reading packet 6 (42 bytes) for connection d91e7d59, 1-RTT 2025/09/12 02:06:52 server Short Header{DestConnectionID: d91e7d59, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:52 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:52 Received request: GET /yzkqmdprux 2025/09/12 02:06:52 server -> Sending packet 5 (1057 bytes) for connection 7d3f3c3a5acf373df3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:52 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 291.756µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:06:52 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:52 server <- Reading packet 7 (26 bytes) for connection d91e7d59, 1-RTT 2025/09/12 02:06:52 server Short Header{DestConnectionID: d91e7d59, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:52 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:52 Replacing connection for connection IDs [d91e7d59 e85e7a7a db716a26 7d3f3c3a5acf373df3 1d8a5bb2] with a closed connection. 2025/09/12 02:06:52 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:52 server Connection 7d3f3c3a5acf373df3 closed. 2025/09/12 02:06:52 server <- Received Initial packet. 2025/09/12 02:06:52 Created qlog file: /logs/qlog/88c462504c4ea687fb769466b29e.sqlog 2025/09/12 02:06:52 server Changing connection ID to 6eab650b. 2025/09/12 02:06:52 Adding connection IDs 88c462504c4ea687fb769466b29e and 6eab650b for a new connection. 2025/09/12 02:06:52 server <- Reading packet 0 (1280 bytes) for connection 88c462504c4ea687fb769466b29e, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: 88c462504c4ea687fb769466b29e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 02:06:52 server -> Sending packet 0 (37 bytes) for connection 88c462504c4ea687fb769466b29e, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6eab650b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:52 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:52 server <- Reading packet 1 (1280 bytes) for connection 88c462504c4ea687fb769466b29e, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: 88c462504c4ea687fb769466b29e, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 1234, Data length: 282, Offset + Data length: 1516} 2025/09/12 02:06:52 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:52 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:52 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:52 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:52 Adding connection ID 4e17983c. 2025/09/12 02:06:52 Adding connection ID 9d05df42. 2025/09/12 02:06:52 Adding connection ID 5b6a8a23. 2025/09/12 02:06:52 server -> Sending packet 1 (1280 bytes) for connection 88c462504c4ea687fb769466b29e, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6eab650b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:52 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:52 server -> Sending packet 0 (837 bytes) for connection 88c462504c4ea687fb769466b29e, Handshake 2025/09/12 02:06:52 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6eab650b, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:52 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9d05df42, StatelessResetToken: 0xc46d70d8f6c70f1b9de5032c6f9d9c42} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5b6a8a23, StatelessResetToken: 0xa3fde401a3be6a9c1a7c223ad950286e} 2025/09/12 02:06:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4e17983c, StatelessResetToken: 0x7b4bbefa05320c64fe2f873e2282548e} 2025/09/12 02:06:52 server <- Reading packet 2 (1280 bytes) for connection 6eab650b, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: 6eab650b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 1234, Data length: 282, Offset + Data length: 1516} 2025/09/12 02:06:52 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:52 server -> Sending packet 2 (37 bytes) for connection 88c462504c4ea687fb769466b29e, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6eab650b, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:52 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:52 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:52 server -> Sending packet 3 (1280 bytes) for connection 88c462504c4ea687fb769466b29e, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6eab650b, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:52 server -> Sending packet 4 (1280 bytes) for connection 88c462504c4ea687fb769466b29e, Initial 2025/09/12 02:06:52 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6eab650b, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:53 Removing connection IDs [d91e7d59 e85e7a7a db716a26 7d3f3c3a5acf373df3 1d8a5bb2] for a closed connection after it has been retired. 2025/09/12 02:06:53 server <- Reading packet 5 (1280 bytes) for connection 6eab650b, Initial 2025/09/12 02:06:53 server Long Header{Type: Initial, DestConnectionID: 6eab650b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:53 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:53 server <- &wire.CryptoFrame{Offset: 1234, Data length: 282, Offset + Data length: 1516} 2025/09/12 02:06:53 server -> Sending packet 5 (39 bytes) for connection 88c462504c4ea687fb769466b29e, Initial 2025/09/12 02:06:53 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6eab650b, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:53 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:53 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:06:53 server -> Sending packet 16 (22 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:53 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:53 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:53 server Skipping packet number 15 2025/09/12 02:06:53 server -> Sending packet 17 (288 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:53 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:53 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:53 server -> &wire.NewTokenFrame{Token: 0x4dc0c43ddab9c98120f750f44f1ba467c988545365b0b10d4f42469db0f7012a374b6577bf39c42d8dd34b2fa4297242b41639f9fc847bcba36cbd248db6824fd9adee8006cce6b2ffa76e93d9e01bf6094cafcaf18ea7fdc50172} 2025/09/12 02:06:53 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/09/12 02:06:53 server -> Sending packet 24 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:53 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:53 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:53 server -> Sending packet 25 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:53 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:53 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:53 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:06:53 server -> Sending packet 1 (746 bytes) for connection 88c462504c4ea687fb769466b29e, Handshake 2025/09/12 02:06:53 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6eab650b, PacketNumber: 1, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:53 server -> Sending packet 2 (746 bytes) for connection 88c462504c4ea687fb769466b29e, Handshake 2025/09/12 02:06:53 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6eab650b, PacketNumber: 2, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:53 server <- Reading packet 7 (1280 bytes) for connection 6eab650b, Initial 2025/09/12 02:06:53 server Long Header{Type: Initial, DestConnectionID: 6eab650b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:53 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:53 server <- &wire.CryptoFrame{Offset: 1234, Data length: 282, Offset + Data length: 1516} 2025/09/12 02:06:53 server -> Sending packet 6 (41 bytes) for connection 88c462504c4ea687fb769466b29e, Initial 2025/09/12 02:06:53 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6eab650b, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 27, Version: v1} 2025/09/12 02:06:53 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:53 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:06:53 server -> Sending packet 22 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:53 server Short Header{DestConnectionID: (empty), PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:53 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:53 server -> Sending packet 23 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:53 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:53 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:53 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 02:06:53 server -> Sending packet 7 (1280 bytes) for connection 88c462504c4ea687fb769466b29e, Initial 2025/09/12 02:06:53 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6eab650b, Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:53 server -> Sending packet 8 (1280 bytes) for connection 88c462504c4ea687fb769466b29e, Initial 2025/09/12 02:06:53 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6eab650b, Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:53 server <- Reading packet 8 (1280 bytes) for connection 6eab650b, Initial 2025/09/12 02:06:53 server Long Header{Type: Initial, DestConnectionID: 6eab650b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:53 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:53 server <- Reading packet 9 (1280 bytes) for connection 6eab650b, Initial 2025/09/12 02:06:53 server Long Header{Type: Initial, DestConnectionID: 6eab650b, SrcConnectionID: (empty), Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:53 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:53 server newly acked packets (1): [8] 2025/09/12 02:06:53 server updated RTT: 34.293189ms (σ: 17.146594ms) 2025/09/12 02:06:53 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:53 server -> Sending packet 3 (746 bytes) for connection 88c462504c4ea687fb769466b29e, Handshake 2025/09/12 02:06:53 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6eab650b, PacketNumber: 3, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:53 server -> Sending packet 4 (746 bytes) for connection 88c462504c4ea687fb769466b29e, Handshake 2025/09/12 02:06:53 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6eab650b, PacketNumber: 4, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:53 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:54 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:06:54 server -> Sending packet 5 (746 bytes) for connection 88c462504c4ea687fb769466b29e, Handshake 2025/09/12 02:06:54 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6eab650b, PacketNumber: 5, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:54 server -> Sending packet 6 (746 bytes) for connection 88c462504c4ea687fb769466b29e, Handshake 2025/09/12 02:06:54 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6eab650b, PacketNumber: 6, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:54 server Queueing packet (42 bytes) for later decryption 2025/09/12 02:06:54 server <- Reading packet 3 (70 bytes) for connection 6eab650b, Handshake 2025/09/12 02:06:54 server Long Header{Type: Handshake, DestConnectionID: 6eab650b, SrcConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:54 server Dropping Initial keys. 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:54 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:54 server Dropping Handshake keys. 2025/09/12 02:06:54 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:54 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:54 server -> Sending packet 2 (360 bytes) for connection 88c462504c4ea687fb769466b29e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4e17983c, StatelessResetToken: 0x7b4bbefa05320c64fe2f873e2282548e} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9d05df42, StatelessResetToken: 0xc46d70d8f6c70f1b9de5032c6f9d9c42} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5b6a8a23, StatelessResetToken: 0xa3fde401a3be6a9c1a7c223ad950286e} 2025/09/12 02:06:54 server -> &wire.NewTokenFrame{Token: 0xdff7fcb82b8cdeee5e578602767e3e333c82e35471b7e9f2ee84fffaad6975cf5e07c5ac3fbfab4d28f6dc044371862268665380e05c60eb466a23eccf031110aa52c12bea8d39be53a169d29e85c6a46bfd986c288d7777fec0c8} 2025/09/12 02:06:54 server -> Sending packet 3 (360 bytes) for connection 88c462504c4ea687fb769466b29e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4e17983c, StatelessResetToken: 0x7b4bbefa05320c64fe2f873e2282548e} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9d05df42, StatelessResetToken: 0xc46d70d8f6c70f1b9de5032c6f9d9c42} 2025/09/12 02:06:54 server -> &wire.NewTokenFrame{Token: 0xdff7fcb82b8cdeee5e578602767e3e333c82e35471b7e9f2ee84fffaad6975cf5e07c5ac3fbfab4d28f6dc044371862268665380e05c60eb466a23eccf031110aa52c12bea8d39be53a169d29e85c6a46bfd986c288d7777fec0c8} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5b6a8a23, StatelessResetToken: 0xa3fde401a3be6a9c1a7c223ad950286e} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:54 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:54 server <- Reading packet 0 (42 bytes) for connection 6eab650b, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 6eab650b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:54 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:54 server -> Sending packet 4 (30 bytes) for connection 88c462504c4ea687fb769466b29e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 244.410568ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:54 Received request: GET /mvzydtnbud 2025/09/12 02:06:54 server -> Sending packet 5 (1045 bytes) for connection 88c462504c4ea687fb769466b29e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:54 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:06:54 server -> Sending packet 23 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:54 server -> Sending packet 24 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:54 server <- Reading packet 2 (52 bytes) for connection 4e17983c, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 4e17983c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 232µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:54 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:54 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:54 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:54 server <- Reading packet 3 (44 bytes) for connection 4e17983c, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 4e17983c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:54 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:54 server -> Sending packet 6 (29 bytes) for connection 88c462504c4ea687fb769466b29e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 174.202µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:54 server <- Reading packet 4 (31 bytes) for connection 4e17983c, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 4e17983c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 64µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:06:54 server newly acked packets (2): [3 5] 2025/09/12 02:06:54 server updated RTT: 33.982ms (σ: 13.481ms) 2025/09/12 02:06:54 server ECN capability confirmed. 2025/09/12 02:06:54 server Canceling loss detection timer. 2025/09/12 02:06:54 server -> Sending packet 7 (22 bytes) for connection 88c462504c4ea687fb769466b29e, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:54 server <- Reading packet 5 (26 bytes) for connection 4e17983c, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 4e17983c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:54 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:54 Replacing connection for connection IDs [4e17983c 9d05df42 5b6a8a23 88c462504c4ea687fb769466b29e 6eab650b] with a closed connection. 2025/09/12 02:06:54 server Connection 88c462504c4ea687fb769466b29e closed. 2025/09/12 02:06:54 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:54 server <- Received Initial packet. 2025/09/12 02:06:54 Created qlog file: /logs/qlog/b3da89b810b5e92448403495e4491abb.sqlog 2025/09/12 02:06:54 server Changing connection ID to 57b71ea7. 2025/09/12 02:06:54 Adding connection IDs b3da89b810b5e92448403495e4491abb and 57b71ea7 for a new connection. 2025/09/12 02:06:54 server <- Reading packet 0 (1280 bytes) for connection b3da89b810b5e92448403495e4491abb, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: b3da89b810b5e92448403495e4491abb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 67, Data length: 1165, Offset + Data length: 1232} 2025/09/12 02:06:54 server -> Sending packet 0 (37 bytes) for connection b3da89b810b5e92448403495e4491abb, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 57b71ea7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:54 server <- Reading packet 1 (1280 bytes) for connection b3da89b810b5e92448403495e4491abb, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: b3da89b810b5e92448403495e4491abb, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1254, Version: v1} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 1232, Data length: 275, Offset + Data length: 1507} 2025/09/12 02:06:54 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:54 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:54 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:54 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:54 Adding connection ID 8c3ba208. 2025/09/12 02:06:54 Adding connection ID c9d9c8e3. 2025/09/12 02:06:54 Adding connection ID f6462c7c. 2025/09/12 02:06:54 server -> Sending packet 1 (1280 bytes) for connection b3da89b810b5e92448403495e4491abb, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 57b71ea7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:54 server -> Sending packet 0 (848 bytes) for connection b3da89b810b5e92448403495e4491abb, Handshake 2025/09/12 02:06:54 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 57b71ea7, PacketNumber: 0, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8c3ba208, StatelessResetToken: 0x50f3e1e27fb05d9c71a180ccd885c160} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c9d9c8e3, StatelessResetToken: 0x91a4e1e0b800434cb6095a797b5a839e} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f6462c7c, StatelessResetToken: 0xb18207e857d1e74a224dbf2200cd033c} 2025/09/12 02:06:54 server <- Reading packet 2 (1280 bytes) for connection 57b71ea7, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: 57b71ea7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:54 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:54 server newly acked packets (1): [1] 2025/09/12 02:06:54 server updated RTT: 33.033054ms (σ: 16.516527ms) 2025/09/12 02:06:54 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:54 server <- Reading packet 0 (75 bytes) for connection 8c3ba208, Handshake 2025/09/12 02:06:54 server Long Header{Type: Handshake, DestConnectionID: 8c3ba208, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:54 server Dropping Initial keys. 2025/09/12 02:06:54 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:54 server newly acked packets (1): [0] 2025/09/12 02:06:54 server updated RTT: 33.03ms (σ: 12.392ms) 2025/09/12 02:06:54 server Canceling loss detection timer. 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:54 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:54 server Dropping Handshake keys. 2025/09/12 02:06:54 server <- Reading packet 0 (25 bytes) for connection 8c3ba208, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 8c3ba208, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:54 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:54 server -> Sending packet 1 (293 bytes) for connection b3da89b810b5e92448403495e4491abb, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 291.113µs} 2025/09/12 02:06:54 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:54 server -> &wire.NewTokenFrame{Token: 0xcdb59e13fb27b9ce414d28842017167f7727e9adff02937d90c12593e9ddd8778d42b2509daa87ac6ee55e850ed5323542d308a7739bb2433013d2946b30b3a253b79d684d494efda1d3402873e63c7649a00e002398615edcfdca} 2025/09/12 02:06:54 server <- Reading packet 3 (32 bytes) for connection 8c3ba208, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 8c3ba208, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 25.352ms, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:54 server newly acked packets (2): [0 1] 2025/09/12 02:06:54 server updated RTT: 35.928ms (σ: 15.091ms) 2025/09/12 02:06:54 server ECN capability confirmed. 2025/09/12 02:06:54 server Canceling loss detection timer. 2025/09/12 02:06:54 server Ignoring all packets below 1. 2025/09/12 02:06:54 server <- Reading packet 5 (42 bytes) for connection 8c3ba208, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 8c3ba208, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:54 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:54 server <- Reading packet 6 (42 bytes) for connection 8c3ba208, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 8c3ba208, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:54 server -> Sending packet 2 (29 bytes) for connection b3da89b810b5e92448403495e4491abb, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 98.223µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:54 Received request: GET /ajrhltsbpv 2025/09/12 02:06:54 server -> Sending packet 3 (1045 bytes) for connection b3da89b810b5e92448403495e4491abb, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:54 server <- Reading packet 7 (33 bytes) for connection 8c3ba208, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 8c3ba208, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 72µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:54 server newly acked packets (1): [3] 2025/09/12 02:06:54 server updated RTT: 35.379ms (σ: 12.415ms) 2025/09/12 02:06:54 server Canceling loss detection timer. 2025/09/12 02:06:54 server <- Reading packet 8 (26 bytes) for connection 8c3ba208, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 8c3ba208, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:54 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:54 Replacing connection for connection IDs [8c3ba208 c9d9c8e3 f6462c7c b3da89b810b5e92448403495e4491abb 57b71ea7] with a closed connection. 2025/09/12 02:06:54 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:54 server Connection b3da89b810b5e92448403495e4491abb closed. 2025/09/12 02:06:54 server <- Received Initial packet. 2025/09/12 02:06:54 Created qlog file: /logs/qlog/5f7aed2b7b7cffa3488845f77e7a.sqlog 2025/09/12 02:06:54 server Changing connection ID to b2f3883f. 2025/09/12 02:06:54 Adding connection IDs 5f7aed2b7b7cffa3488845f77e7a and b2f3883f for a new connection. 2025/09/12 02:06:54 server <- Reading packet 1 (1280 bytes) for connection 5f7aed2b7b7cffa3488845f77e7a, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: 5f7aed2b7b7cffa3488845f77e7a, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1256, Version: v1} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 1234, Data length: 279, Offset + Data length: 1513} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:54 server -> Sending packet 0 (37 bytes) for connection 5f7aed2b7b7cffa3488845f77e7a, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2f3883f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:54 Removing connection IDs [4e17983c 9d05df42 5b6a8a23 88c462504c4ea687fb769466b29e 6eab650b] for a closed connection after it has been retired. 2025/09/12 02:06:54 server <- Reading packet 3 (1280 bytes) for connection b2f3883f, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: b2f3883f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 02:06:54 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:54 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:54 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:54 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:54 Adding connection ID 291389c0. 2025/09/12 02:06:54 Adding connection ID 562abfed. 2025/09/12 02:06:54 Adding connection ID c653d9d5. 2025/09/12 02:06:54 server -> Sending packet 1 (1280 bytes) for connection 5f7aed2b7b7cffa3488845f77e7a, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2f3883f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:54 server -> Sending packet 0 (837 bytes) for connection 5f7aed2b7b7cffa3488845f77e7a, Handshake 2025/09/12 02:06:54 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b2f3883f, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 562abfed, StatelessResetToken: 0xad38817ccb9e2821883aeffb3ed0fb7d} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 291389c0, StatelessResetToken: 0x0ca58c94552de076243948a3d090d355} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c653d9d5, StatelessResetToken: 0xa325014036339ebc3d244df9db16c570} 2025/09/12 02:06:54 server <- Reading packet 4 (1280 bytes) for connection b2f3883f, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: b2f3883f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 67, Data length: 1167, Offset + Data length: 1234} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:54 server -> Sending packet 2 (39 bytes) for connection 5f7aed2b7b7cffa3488845f77e7a, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b2f3883f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 0s} 2025/09/12 02:06:54 server <- Reading packet 5 (1280 bytes) for connection b2f3883f, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: b2f3883f, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:54 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:54 server newly acked packets (1): [1] 2025/09/12 02:06:54 server updated RTT: 33.041036ms (σ: 16.520518ms) 2025/09/12 02:06:54 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:54 server -> Sending packet 1 (746 bytes) for connection 5f7aed2b7b7cffa3488845f77e7a, Handshake 2025/09/12 02:06:54 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b2f3883f, PacketNumber: 1, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:54 server -> Sending packet 2 (746 bytes) for connection 5f7aed2b7b7cffa3488845f77e7a, Handshake 2025/09/12 02:06:54 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b2f3883f, PacketNumber: 2, PacketNumberLen: 2, Length: 733, Version: v1} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/09/12 02:06:54 Removing connection IDs [8c3ba208 c9d9c8e3 f6462c7c b3da89b810b5e92448403495e4491abb 57b71ea7] for a closed connection after it has been retired. 2025/09/12 02:06:54 server <- Reading packet 0 (75 bytes) for connection b2f3883f, Handshake 2025/09/12 02:06:54 server Long Header{Type: Handshake, DestConnectionID: b2f3883f, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:54 server Dropping Initial keys. 2025/09/12 02:06:54 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:54 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:54 server Dropping Handshake keys. 2025/09/12 02:06:54 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:54 server -> Sending packet 2 (360 bytes) for connection 5f7aed2b7b7cffa3488845f77e7a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 562abfed, StatelessResetToken: 0xad38817ccb9e2821883aeffb3ed0fb7d} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:54 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:54 server -> &wire.NewTokenFrame{Token: 0x5e5bb8ba33051c5639f09425b137192bf0a72b5ca73a2e8ca575c7e6c8af44edc4c292b4876b9a868fa91b88d299e525fb6d4c3090e12869028aca77217e051a047facdded852db5e2e50d455e35c418b3e0087ec644c7085c9707} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 291389c0, StatelessResetToken: 0x0ca58c94552de076243948a3d090d355} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c653d9d5, StatelessResetToken: 0xa325014036339ebc3d244df9db16c570} 2025/09/12 02:06:54 server -> Sending packet 3 (360 bytes) for connection 5f7aed2b7b7cffa3488845f77e7a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c653d9d5, StatelessResetToken: 0xa325014036339ebc3d244df9db16c570} 2025/09/12 02:06:54 server -> &wire.NewTokenFrame{Token: 0x5e5bb8ba33051c5639f09425b137192bf0a72b5ca73a2e8ca575c7e6c8af44edc4c292b4876b9a868fa91b88d299e525fb6d4c3090e12869028aca77217e051a047facdded852db5e2e50d455e35c418b3e0087ec644c7085c9707} 2025/09/12 02:06:54 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 562abfed, StatelessResetToken: 0xad38817ccb9e2821883aeffb3ed0fb7d} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 291389c0, StatelessResetToken: 0x0ca58c94552de076243948a3d090d355} 2025/09/12 02:06:54 server <- Reading packet 0 (42 bytes) for connection b2f3883f, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: b2f3883f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:54 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:54 server -> Sending packet 4 (27 bytes) for connection 5f7aed2b7b7cffa3488845f77e7a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 395.233µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:54 Received request: GET /ipwsqqhmre 2025/09/12 02:06:54 server -> Sending packet 5 (1045 bytes) for connection 5f7aed2b7b7cffa3488845f77e7a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:54 server <- Reading packet 1 (33 bytes) for connection 291389c0, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 291389c0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 136µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:54 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:54 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:54 server <- Reading packet 2 (31 bytes) for connection 291389c0, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 291389c0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 56µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:06:54 server newly acked packets (2): [3 5] 2025/09/12 02:06:54 server updated RTT: 32.889ms (σ: 12.693ms) 2025/09/12 02:06:54 server ECN capability confirmed. 2025/09/12 02:06:54 server Canceling loss detection timer. 2025/09/12 02:06:54 server -> Sending packet 6 (30 bytes) for connection 5f7aed2b7b7cffa3488845f77e7a, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 67.586µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:54 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:54 server <- Reading packet 3 (26 bytes) for connection 291389c0, 1-RTT 2025/09/12 02:06:54 server Short Header{DestConnectionID: 291389c0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:54 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:54 Replacing connection for connection IDs [291389c0 562abfed c653d9d5 5f7aed2b7b7cffa3488845f77e7a b2f3883f] with a closed connection. 2025/09/12 02:06:54 server Connection 5f7aed2b7b7cffa3488845f77e7a closed. 2025/09/12 02:06:54 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:54 server <- Received Initial packet. 2025/09/12 02:06:54 Created qlog file: /logs/qlog/fedf1ef869a5018fad.sqlog 2025/09/12 02:06:54 server Changing connection ID to 3ff5a871. 2025/09/12 02:06:54 Adding connection IDs fedf1ef869a5018fad and 3ff5a871 for a new connection. 2025/09/12 02:06:54 server <- Reading packet 0 (1280 bytes) for connection fedf1ef869a5018fad, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: fedf1ef869a5018fad, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:54 server -> Sending packet 0 (37 bytes) for connection fedf1ef869a5018fad, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3ff5a871, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:54 server <- Reading packet 3 (1280 bytes) for connection 3ff5a871, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: 3ff5a871, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:54 server <- &wire.CryptoFrame{Offset: 1239, Data length: 278, Offset + Data length: 1517} 2025/09/12 02:06:54 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:54 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:54 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:54 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:54 Adding connection ID 3f647bac. 2025/09/12 02:06:54 Adding connection ID 0827fc1b. 2025/09/12 02:06:54 Adding connection ID a8e519a4. 2025/09/12 02:06:54 server -> Sending packet 1 (1280 bytes) for connection fedf1ef869a5018fad, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3ff5a871, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:54 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:54 server -> Sending packet 0 (842 bytes) for connection fedf1ef869a5018fad, Handshake 2025/09/12 02:06:54 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3ff5a871, PacketNumber: 0, PacketNumberLen: 2, Length: 738, Version: v1} 2025/09/12 02:06:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/12 02:06:54 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0827fc1b, StatelessResetToken: 0x9a05b9a0b8311ba7741222d3e2341f8c} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a8e519a4, StatelessResetToken: 0xd1b10c04d014397591b5cb2171d5be2b} 2025/09/12 02:06:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3f647bac, StatelessResetToken: 0xc99eda4a68d42dac807779ccb281ff7b} 2025/09/12 02:06:54 server <- Reading packet 4 (1280 bytes) for connection 3ff5a871, Initial 2025/09/12 02:06:54 server Long Header{Type: Initial, DestConnectionID: 3ff5a871, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:54 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:54 server newly acked packets (1): [1] 2025/09/12 02:06:54 server updated RTT: 33.142376ms (σ: 16.571188ms) 2025/09/12 02:06:55 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:55 server -> Sending packet 1 (751 bytes) for connection fedf1ef869a5018fad, Handshake 2025/09/12 02:06:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3ff5a871, PacketNumber: 1, PacketNumberLen: 2, Length: 738, Version: v1} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/12 02:06:55 server -> Sending packet 2 (751 bytes) for connection fedf1ef869a5018fad, Handshake 2025/09/12 02:06:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3ff5a871, PacketNumber: 2, PacketNumberLen: 2, Length: 738, Version: v1} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/12 02:06:55 Removing connection IDs [291389c0 562abfed c653d9d5 5f7aed2b7b7cffa3488845f77e7a b2f3883f] for a closed connection after it has been retired. 2025/09/12 02:06:55 server <- Reading packet 5 (1280 bytes) for connection 3ff5a871, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: 3ff5a871, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:55 server <- &wire.PingFrame{} 2025/09/12 02:06:55 server -> Sending packet 2 (39 bytes) for connection fedf1ef869a5018fad, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 3ff5a871, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:55 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:06:55 server -> Sending packet 3 (751 bytes) for connection fedf1ef869a5018fad, Handshake 2025/09/12 02:06:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3ff5a871, PacketNumber: 3, PacketNumberLen: 2, Length: 738, Version: v1} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/12 02:06:55 server -> Sending packet 4 (751 bytes) for connection fedf1ef869a5018fad, Handshake 2025/09/12 02:06:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 3ff5a871, PacketNumber: 4, PacketNumberLen: 2, Length: 738, Version: v1} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/09/12 02:06:55 server <- Reading packet 1 (70 bytes) for connection 3ff5a871, Handshake 2025/09/12 02:06:55 server Long Header{Type: Handshake, DestConnectionID: 3ff5a871, SrcConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:55 server Dropping Initial keys. 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:55 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:55 server Dropping Handshake keys. 2025/09/12 02:06:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:55 server -> Sending packet 2 (360 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.NewTokenFrame{Token: 0x0b231646e2b6dbc305f3e90e7f10044592f08e013f25457c7bb2f39c400ed8457ae09004ea03c0465d0f7e44eae4c1518a96e5e3f784e9ca60233dae1f45fe4ec9ccc451b863a710b4bf79bd990c2b6ab87e41cca5bc609d8cacff} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3f647bac, StatelessResetToken: 0xc99eda4a68d42dac807779ccb281ff7b} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a8e519a4, StatelessResetToken: 0xd1b10c04d014397591b5cb2171d5be2b} 2025/09/12 02:06:55 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0827fc1b, StatelessResetToken: 0x9a05b9a0b8311ba7741222d3e2341f8c} 2025/09/12 02:06:55 server -> Sending packet 3 (360 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0827fc1b, StatelessResetToken: 0x9a05b9a0b8311ba7741222d3e2341f8c} 2025/09/12 02:06:55 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a8e519a4, StatelessResetToken: 0xd1b10c04d014397591b5cb2171d5be2b} 2025/09/12 02:06:55 server -> &wire.NewTokenFrame{Token: 0x0b231646e2b6dbc305f3e90e7f10044592f08e013f25457c7bb2f39c400ed8457ae09004ea03c0465d0f7e44eae4c1518a96e5e3f784e9ca60233dae1f45fe4ec9ccc451b863a710b4bf79bd990c2b6ab87e41cca5bc609d8cacff} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3f647bac, StatelessResetToken: 0xc99eda4a68d42dac807779ccb281ff7b} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:55 server <- Reading packet 2 (52 bytes) for connection 3f647bac, 1-RTT 2025/09/12 02:06:55 server Short Header{DestConnectionID: 3f647bac, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 120µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:55 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:55 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:55 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:55 server -> Sending packet 4 (27 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 151.6µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:55 Received request: GET /cpghqrxiqw 2025/09/12 02:06:55 server <- Reading packet 3 (44 bytes) for connection 3f647bac, 1-RTT 2025/09/12 02:06:55 server Short Header{DestConnectionID: 3f647bac, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:55 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:55 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:55 server -> Sending packet 5 (1053 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 237.938µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:55 server <- Received Initial packet. 2025/09/12 02:06:55 Created qlog file: /logs/qlog/859159edb2bdcddad58efb8b47.sqlog 2025/09/12 02:06:55 server Changing connection ID to e4503237. 2025/09/12 02:06:55 Adding connection IDs 859159edb2bdcddad58efb8b47 and e4503237 for a new connection. 2025/09/12 02:06:55 server <- Reading packet 0 (1280 bytes) for connection 859159edb2bdcddad58efb8b47, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: 859159edb2bdcddad58efb8b47, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 67, Data length: 1168, Offset + Data length: 1235} 2025/09/12 02:06:55 server -> Sending packet 0 (37 bytes) for connection 859159edb2bdcddad58efb8b47, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e4503237, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:55 server <- Reading packet 1 (1280 bytes) for connection 859159edb2bdcddad58efb8b47, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: 859159edb2bdcddad58efb8b47, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1257, Version: v1} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 1235, Data length: 275, Offset + Data length: 1510} 2025/09/12 02:06:55 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:55 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:55 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:55 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:55 Adding connection ID d122ea24. 2025/09/12 02:06:55 Adding connection ID 6776a5b8. 2025/09/12 02:06:55 Adding connection ID 66380f23. 2025/09/12 02:06:55 server -> Sending packet 1 (1280 bytes) for connection 859159edb2bdcddad58efb8b47, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: e4503237, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:55 server -> Sending packet 0 (840 bytes) for connection 859159edb2bdcddad58efb8b47, Handshake 2025/09/12 02:06:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: e4503237, PacketNumber: 0, PacketNumberLen: 2, Length: 736, Version: v1} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6776a5b8, StatelessResetToken: 0xffd5bda4d18be054e611587d2913d58e} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 66380f23, StatelessResetToken: 0xbe9e099ffb6e9791e635bea57e1cc69f} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d122ea24, StatelessResetToken: 0x29d716e624bc97f49e0a123e4293083d} 2025/09/12 02:06:55 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:55 server <- Reading packet 0 (75 bytes) for connection d122ea24, Handshake 2025/09/12 02:06:55 server Long Header{Type: Handshake, DestConnectionID: d122ea24, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:55 server Dropping Initial keys. 2025/09/12 02:06:55 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:55 server newly acked packets (1): [0] 2025/09/12 02:06:55 server updated RTT: 33.305703ms (σ: 16.652851ms) 2025/09/12 02:06:55 server Canceling loss detection timer. 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:55 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:55 server Dropping Handshake keys. 2025/09/12 02:06:55 server <- Reading packet 0 (25 bytes) for connection d122ea24, 1-RTT 2025/09/12 02:06:55 server Short Header{DestConnectionID: d122ea24, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:55 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:55 server <- Reading packet 1 (28 bytes) for connection d122ea24, 1-RTT 2025/09/12 02:06:55 server Short Header{DestConnectionID: d122ea24, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 472µs} 2025/09/12 02:06:55 server newly acked packets (1): [0] 2025/09/12 02:06:55 server updated RTT: 33.306ms (σ: 12.491ms) 2025/09/12 02:06:55 server Canceling loss detection timer. 2025/09/12 02:06:55 server <- Reading packet 2 (42 bytes) for connection d122ea24, 1-RTT 2025/09/12 02:06:55 server Short Header{DestConnectionID: d122ea24, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:55 server -> Sending packet 1 (296 bytes) for connection 859159edb2bdcddad58efb8b47, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 376.462µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:55 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:55 server -> &wire.NewTokenFrame{Token: 0x340f3c5900f22d92a333c3bb11f7fd19bc9c3dc78e2a0b83629918bc10a6c41368da946eac383b490d2aeb84ce26a87e8999f318c21443792a9b1349e51429588fa5d73ab15cd3d8b759b86bfc1f3113b020bfecb18f4d9313f1c3} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:55 Received request: GET /ckgmeyminq 2025/09/12 02:06:55 server -> Sending packet 2 (1045 bytes) for connection 859159edb2bdcddad58efb8b47, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:55 server <- Reading packet 5 (26 bytes) for connection d122ea24, 1-RTT 2025/09/12 02:06:55 server Short Header{DestConnectionID: d122ea24, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:55 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:55 Replacing connection for connection IDs [6776a5b8 66380f23 d122ea24 859159edb2bdcddad58efb8b47 e4503237] with a closed connection. 2025/09/12 02:06:55 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:55 server Connection 859159edb2bdcddad58efb8b47 closed. 2025/09/12 02:06:55 server <- Received Initial packet. 2025/09/12 02:06:55 Created qlog file: /logs/qlog/8d86537f1515c98df2.sqlog 2025/09/12 02:06:55 server Changing connection ID to eb6dc387. 2025/09/12 02:06:55 Adding connection IDs 8d86537f1515c98df2 and eb6dc387 for a new connection. 2025/09/12 02:06:55 server <- Reading packet 1 (1280 bytes) for connection 8d86537f1515c98df2, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: 8d86537f1515c98df2, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1261, Version: v1} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 1239, Data length: 277, Offset + Data length: 1516} 2025/09/12 02:06:55 server -> Sending packet 0 (37 bytes) for connection 8d86537f1515c98df2, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb6dc387, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:55 server <- Reading packet 2 (1280 bytes) for connection eb6dc387, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: eb6dc387, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:55 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:55 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:55 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:55 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:55 Adding connection ID db81265d. 2025/09/12 02:06:55 Adding connection ID 4db138c5. 2025/09/12 02:06:55 Adding connection ID bf9041fa. 2025/09/12 02:06:55 server -> Sending packet 1 (1280 bytes) for connection 8d86537f1515c98df2, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb6dc387, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:55 server -> Sending packet 0 (838 bytes) for connection 8d86537f1515c98df2, Handshake 2025/09/12 02:06:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb6dc387, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: db81265d, StatelessResetToken: 0x08e83b27755a4a7e573248e9e62edd96} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4db138c5, StatelessResetToken: 0x8cecbd0ca20d3c42beaf82ed0a644298} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bf9041fa, StatelessResetToken: 0x76734461cce568dcd4105016623989ba} 2025/09/12 02:06:55 server <- Reading packet 4 (1280 bytes) for connection eb6dc387, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: eb6dc387, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 67, Data length: 1172, Offset + Data length: 1239} 2025/09/12 02:06:55 server -> Sending packet 2 (39 bytes) for connection 8d86537f1515c98df2, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb6dc387, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 25, Version: v1} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/09/12 02:06:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:55 server -> Sending packet 7 (360 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3f647bac, StatelessResetToken: 0xc99eda4a68d42dac807779ccb281ff7b} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:55 server -> &wire.NewTokenFrame{Token: 0x0b231646e2b6dbc305f3e90e7f10044592f08e013f25457c7bb2f39c400ed8457ae09004ea03c0465d0f7e44eae4c1518a96e5e3f784e9ca60233dae1f45fe4ec9ccc451b863a710b4bf79bd990c2b6ab87e41cca5bc609d8cacff} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a8e519a4, StatelessResetToken: 0xd1b10c04d014397591b5cb2171d5be2b} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0827fc1b, StatelessResetToken: 0x9a05b9a0b8311ba7741222d3e2341f8c} 2025/09/12 02:06:55 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:55 server Skipping packet number 6 2025/09/12 02:06:55 server -> Sending packet 8 (1045 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:55 server -> Sending packet 9 (1366 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.PingFrame{} 2025/09/12 02:06:55 Removing connection ID fedf1ef869a5018fad. 2025/09/12 02:06:55 Removing connection ID 3ff5a871. 2025/09/12 02:06:55 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:55 server -> Sending packet 3 (1280 bytes) for connection 8d86537f1515c98df2, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb6dc387, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:55 server -> Sending packet 4 (1280 bytes) for connection 8d86537f1515c98df2, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb6dc387, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:55 Removing connection IDs [6776a5b8 66380f23 d122ea24 859159edb2bdcddad58efb8b47 e4503237] for a closed connection after it has been retired. 2025/09/12 02:06:55 server <- Reading packet 6 (1280 bytes) for connection eb6dc387, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: eb6dc387, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:55 server <- &wire.PingFrame{} 2025/09/12 02:06:55 server -> Sending packet 5 (41 bytes) for connection 8d86537f1515c98df2, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: eb6dc387, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 27, Version: v1} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 0s} 2025/09/12 02:06:55 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:06:55 server -> Sending packet 1 (747 bytes) for connection 8d86537f1515c98df2, Handshake 2025/09/12 02:06:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb6dc387, PacketNumber: 1, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 02:06:55 server -> Sending packet 2 (747 bytes) for connection 8d86537f1515c98df2, Handshake 2025/09/12 02:06:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: eb6dc387, PacketNumber: 2, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 02:06:55 server <- Reading packet 0 (75 bytes) for connection eb6dc387, Handshake 2025/09/12 02:06:55 server Long Header{Type: Handshake, DestConnectionID: eb6dc387, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:55 server Dropping Initial keys. 2025/09/12 02:06:55 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:55 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:55 server Dropping Handshake keys. 2025/09/12 02:06:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:55 server -> Sending packet 2 (358 bytes) for connection 8d86537f1515c98df2, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bf9041fa, StatelessResetToken: 0x76734461cce568dcd4105016623989ba} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: db81265d, StatelessResetToken: 0x08e83b27755a4a7e573248e9e62edd96} 2025/09/12 02:06:55 server -> &wire.NewTokenFrame{Token: 0xfe1c68095330709b23de03e15b84ca1acd3a6334a850cd6b3341b9dd40db9920b63cb33cdfd4294328aa27ef62e79a1f1d8dd832a5bf8989818a5378b5f41d856fdf76b38c13d94606d62c7434d79504c87a230aea7be6999f} 2025/09/12 02:06:55 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4db138c5, StatelessResetToken: 0x8cecbd0ca20d3c42beaf82ed0a644298} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:55 server -> Sending packet 3 (358 bytes) for connection 8d86537f1515c98df2, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:55 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4db138c5, StatelessResetToken: 0x8cecbd0ca20d3c42beaf82ed0a644298} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: db81265d, StatelessResetToken: 0x08e83b27755a4a7e573248e9e62edd96} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bf9041fa, StatelessResetToken: 0x76734461cce568dcd4105016623989ba} 2025/09/12 02:06:55 server -> &wire.NewTokenFrame{Token: 0xfe1c68095330709b23de03e15b84ca1acd3a6334a850cd6b3341b9dd40db9920b63cb33cdfd4294328aa27ef62e79a1f1d8dd832a5bf8989818a5378b5f41d856fdf76b38c13d94606d62c7434d79504c87a230aea7be6999f} 2025/09/12 02:06:55 server -> Sending packet 4 (1366 bytes) for connection 8d86537f1515c98df2, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.PingFrame{} 2025/09/12 02:06:55 server <- Reading packet 0 (42 bytes) for connection eb6dc387, 1-RTT 2025/09/12 02:06:55 server Short Header{DestConnectionID: eb6dc387, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:55 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:55 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/09/12 02:06:55 server -> Sending packet 5 (27 bytes) for connection 8d86537f1515c98df2, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 105.25µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:55 Received request: GET /dixduxkygh 2025/09/12 02:06:55 server -> Sending packet 6 (1045 bytes) for connection 8d86537f1515c98df2, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:55 server <- Reading packet 1 (31 bytes) for connection eb6dc387, 1-RTT 2025/09/12 02:06:55 server Short Header{DestConnectionID: eb6dc387, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:55 server newly acked packets (1): [4] 2025/09/12 02:06:55 server updated RTT: 32.487677ms (σ: 16.243838ms) 2025/09/12 02:06:55 server ECN capability confirmed. 2025/09/12 02:06:55 server setting loss timer for packet 3 (1-RTT) to 36.548636ms (in 2025-09-12 02:06:55.959081068 +0000 UTC m=+19.857404831) 2025/09/12 02:06:55 server <- Reading packet 2 (33 bytes) for connection eb6dc387, 1-RTT 2025/09/12 02:06:55 server Short Header{DestConnectionID: eb6dc387, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 96µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:55 server newly acked packets (1): [6] 2025/09/12 02:06:55 server updated RTT: 32.543ms (σ: 12.295ms) 2025/09/12 02:06:55 server lost packet 3 (reordering threshold) 2025/09/12 02:06:55 server Canceling loss detection timer. 2025/09/12 02:06:55 server Parsed a coalesced packet. Part 1: 35 bytes. Remaining: 26 bytes. 2025/09/12 02:06:55 server Dropping %!s(logging.PacketType=1) packet (35 bytes) because we already dropped the keys. 2025/09/12 02:06:55 server <- Reading packet 3 (26 bytes) for connection eb6dc387, 1-RTT 2025/09/12 02:06:55 server Short Header{DestConnectionID: eb6dc387, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:55 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:55 Replacing connection for connection IDs [db81265d 4db138c5 bf9041fa eb6dc387 8d86537f1515c98df2] with a closed connection. 2025/09/12 02:06:55 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:55 server Connection 8d86537f1515c98df2 closed. 2025/09/12 02:06:55 server <- Received Initial packet. 2025/09/12 02:06:55 Created qlog file: /logs/qlog/b1ee3e879cbc0f72.sqlog 2025/09/12 02:06:55 server Changing connection ID to 4b5ede56. 2025/09/12 02:06:55 Adding connection IDs b1ee3e879cbc0f72 and 4b5ede56 for a new connection. 2025/09/12 02:06:55 server <- Reading packet 0 (1280 bytes) for connection b1ee3e879cbc0f72, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: b1ee3e879cbc0f72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 67, Data length: 1173, Offset + Data length: 1240} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:55 server -> Sending packet 0 (37 bytes) for connection b1ee3e879cbc0f72, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b5ede56, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:55 server <- Reading packet 1 (1280 bytes) for connection b1ee3e879cbc0f72, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: b1ee3e879cbc0f72, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1262, Version: v1} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 1240, Data length: 277, Offset + Data length: 1517} 2025/09/12 02:06:55 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:55 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:55 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:55 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:55 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:55 Adding connection ID 2d7a6b4d. 2025/09/12 02:06:55 Adding connection ID 99b3306b. 2025/09/12 02:06:55 Adding connection ID 10bc2d63. 2025/09/12 02:06:55 server -> Sending packet 1 (1280 bytes) for connection b1ee3e879cbc0f72, Initial 2025/09/12 02:06:55 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b5ede56, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:55 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:55 server -> Sending packet 0 (833 bytes) for connection b1ee3e879cbc0f72, Handshake 2025/09/12 02:06:55 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 4b5ede56, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/09/12 02:06:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/09/12 02:06:55 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 10bc2d63, StatelessResetToken: 0x4f1f70a7125ac0fb6bd58538e5fd9a88} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2d7a6b4d, StatelessResetToken: 0xec4295a84d524c6997cce3bb70f9ac11} 2025/09/12 02:06:55 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 99b3306b, StatelessResetToken: 0xfde8c98f20236a2a0d14ea18978afe36} 2025/09/12 02:06:56 server <- Reading packet 2 (1280 bytes) for connection 4b5ede56, Initial 2025/09/12 02:06:56 server Long Header{Type: Initial, DestConnectionID: 4b5ede56, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:56 server <- &wire.CryptoFrame{Offset: 1240, Data length: 277, Offset + Data length: 1517} 2025/09/12 02:06:56 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:56 server -> Sending packet 2 (37 bytes) for connection b1ee3e879cbc0f72, Initial 2025/09/12 02:06:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b5ede56, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:56 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:56 server <- Reading packet 3 (1280 bytes) for connection 4b5ede56, Initial 2025/09/12 02:06:56 server Long Header{Type: Initial, DestConnectionID: 4b5ede56, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:56 server <- &wire.CryptoFrame{Offset: 1240, Data length: 277, Offset + Data length: 1517} 2025/09/12 02:06:56 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:56 server -> Sending packet 3 (37 bytes) for connection b1ee3e879cbc0f72, Initial 2025/09/12 02:06:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b5ede56, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:56 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:56 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/09/12 02:06:56 server -> Sending packet 11 (360 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:56 server Short Header{DestConnectionID: (empty), PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0827fc1b, StatelessResetToken: 0x9a05b9a0b8311ba7741222d3e2341f8c} 2025/09/12 02:06:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a8e519a4, StatelessResetToken: 0xd1b10c04d014397591b5cb2171d5be2b} 2025/09/12 02:06:56 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:56 server -> &wire.NewTokenFrame{Token: 0x0b231646e2b6dbc305f3e90e7f10044592f08e013f25457c7bb2f39c400ed8457ae09004ea03c0465d0f7e44eae4c1518a96e5e3f784e9ca60233dae1f45fe4ec9ccc451b863a710b4bf79bd990c2b6ab87e41cca5bc609d8cacff} 2025/09/12 02:06:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3f647bac, StatelessResetToken: 0xc99eda4a68d42dac807779ccb281ff7b} 2025/09/12 02:06:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:56 server Skipping packet number 10 2025/09/12 02:06:56 server -> Sending packet 12 (1045 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:56 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:56 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:56 server -> Sending packet 4 (1280 bytes) for connection b1ee3e879cbc0f72, Initial 2025/09/12 02:06:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b5ede56, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:56 server -> Sending packet 5 (1280 bytes) for connection b1ee3e879cbc0f72, Initial 2025/09/12 02:06:56 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 4b5ede56, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:56 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:56 server <- Reading packet 0 (75 bytes) for connection 2d7a6b4d, Handshake 2025/09/12 02:06:56 server Long Header{Type: Handshake, DestConnectionID: 2d7a6b4d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:56 server Dropping Initial keys. 2025/09/12 02:06:56 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:56 server newly acked packets (1): [0] 2025/09/12 02:06:56 server updated RTT: 233.757815ms (σ: 116.878907ms) 2025/09/12 02:06:56 server Canceling loss detection timer. 2025/09/12 02:06:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:56 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:56 server Dropping Handshake keys. 2025/09/12 02:06:56 server <- Reading packet 0 (25 bytes) for connection 2d7a6b4d, 1-RTT 2025/09/12 02:06:56 server Short Header{DestConnectionID: 2d7a6b4d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:56 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:56 server -> Sending packet 1 (293 bytes) for connection b1ee3e879cbc0f72, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:56 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 306.442µs} 2025/09/12 02:06:56 server -> &wire.NewTokenFrame{Token: 0x728754a67e2064ef383d654162c14d3d521e5bb04776cf63c673422fc7e780c04fda0dced3b7726a31c7638de9399328b3208d100b44dae6a1c4101907be643b65de85007d71185449e67ff1d5ecf16d841c89e8be70116cd9299d} 2025/09/12 02:06:56 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:56 server <- Reading packet 1 (31 bytes) for connection 2d7a6b4d, 1-RTT 2025/09/12 02:06:56 server Short Header{DestConnectionID: 2d7a6b4d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.696ms} 2025/09/12 02:06:56 server newly acked packets (1): [0] 2025/09/12 02:06:56 server updated RTT: 233.787ms (σ: 87.719ms) 2025/09/12 02:06:56 Removing connection IDs [db81265d 4db138c5 bf9041fa eb6dc387 8d86537f1515c98df2] for a closed connection after it has been retired. 2025/09/12 02:06:56 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:56 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:56 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:56 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:56 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:56 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:56 server -> Sending packet 3 (288 bytes) for connection b1ee3e879cbc0f72, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:56 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:56 server -> &wire.NewTokenFrame{Token: 0x728754a67e2064ef383d654162c14d3d521e5bb04776cf63c673422fc7e780c04fda0dced3b7726a31c7638de9399328b3208d100b44dae6a1c4101907be643b65de85007d71185449e67ff1d5ecf16d841c89e8be70116cd9299d} 2025/09/12 02:06:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:56 server -> Sending packet 4 (288 bytes) for connection b1ee3e879cbc0f72, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:56 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server -> &wire.NewTokenFrame{Token: 0x728754a67e2064ef383d654162c14d3d521e5bb04776cf63c673422fc7e780c04fda0dced3b7726a31c7638de9399328b3208d100b44dae6a1c4101907be643b65de85007d71185449e67ff1d5ecf16d841c89e8be70116cd9299d} 2025/09/12 02:06:56 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:56 server <- Reading packet 5 (42 bytes) for connection 2d7a6b4d, 1-RTT 2025/09/12 02:06:56 server Short Header{DestConnectionID: 2d7a6b4d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:56 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:56 server -> Sending packet 5 (29 bytes) for connection b1ee3e879cbc0f72, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:56 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 85.54µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:56 Received request: GET /yjtlbbqqzi 2025/09/12 02:06:56 server -> Sending packet 6 (1045 bytes) for connection b1ee3e879cbc0f72, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:56 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:56 server <- Reading packet 6 (34 bytes) for connection 2d7a6b4d, 1-RTT 2025/09/12 02:06:56 server Short Header{DestConnectionID: 2d7a6b4d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.24ms, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:56 server newly acked packets (1): [4] 2025/09/12 02:06:56 server updated RTT: 211.618ms (σ: 110.127ms) 2025/09/12 02:06:56 server ECN capability confirmed. 2025/09/12 02:06:56 server <- Reading packet 9 (25 bytes) for connection 2d7a6b4d, 1-RTT 2025/09/12 02:06:56 server Short Header{DestConnectionID: 2d7a6b4d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:56 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:56 server -> Sending packet 7 (31 bytes) for connection b1ee3e879cbc0f72, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:56 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:56 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 101.278µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:06:57 server <- Reading packet 11 (1366 bytes) for connection 2d7a6b4d, 1-RTT 2025/09/12 02:06:57 server Short Header{DestConnectionID: 2d7a6b4d, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server <- &wire.PingFrame{} 2025/09/12 02:06:57 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:57 server -> Sending packet 8 (33 bytes) for connection b1ee3e879cbc0f72, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 87.964µs, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 02:06:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/09/12 02:06:57 server -> Sending packet 27 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:57 server -> Sending packet 28 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/09/12 02:06:57 server -> Sending packet 14 (360 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:57 server -> &wire.NewTokenFrame{Token: 0x0b231646e2b6dbc305f3e90e7f10044592f08e013f25457c7bb2f39c400ed8457ae09004ea03c0465d0f7e44eae4c1518a96e5e3f784e9ca60233dae1f45fe4ec9ccc451b863a710b4bf79bd990c2b6ab87e41cca5bc609d8cacff} 2025/09/12 02:06:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3f647bac, StatelessResetToken: 0xc99eda4a68d42dac807779ccb281ff7b} 2025/09/12 02:06:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a8e519a4, StatelessResetToken: 0xd1b10c04d014397591b5cb2171d5be2b} 2025/09/12 02:06:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0827fc1b, StatelessResetToken: 0x9a05b9a0b8311ba7741222d3e2341f8c} 2025/09/12 02:06:57 server Skipping packet number 13 2025/09/12 02:06:57 server -> Sending packet 15 (1045 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: Not-ECT) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:57 server <- Reading packet 14 (25 bytes) for connection 2d7a6b4d, 1-RTT 2025/09/12 02:06:57 server Short Header{DestConnectionID: 2d7a6b4d, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:57 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:57 server -> Sending packet 9 (35 bytes) for connection b1ee3e879cbc0f72, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 0, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 79.328µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 02:06:57 server <- Reading packet 15 (1409 bytes) for connection 2d7a6b4d, 1-RTT 2025/09/12 02:06:57 server Short Header{DestConnectionID: 2d7a6b4d, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server <- &wire.PingFrame{} 2025/09/12 02:06:57 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:57 server Sending ACK because the ACK timer expired. 2025/09/12 02:06:57 server -> Sending packet 10 (36 bytes) for connection b1ee3e879cbc0f72, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 0, AckRanges: {{Largest: 15, Smallest: 14}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 25.25233ms, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 02:06:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:57 server -> Sending packet 12 (1045 bytes) for connection b1ee3e879cbc0f72, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:57 server -> Sending packet 13 (1045 bytes) for connection b1ee3e879cbc0f72, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:57 server -> Sending packet 14 (1366 bytes) for connection b1ee3e879cbc0f72, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.PingFrame{} 2025/09/12 02:06:57 server <- Reading packet 16 (39 bytes) for connection 2d7a6b4d, 1-RTT 2025/09/12 02:06:57 server Short Header{DestConnectionID: 2d7a6b4d, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 128µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 02:06:57 server <- Reading packet 17 (26 bytes) for connection 2d7a6b4d, 1-RTT 2025/09/12 02:06:57 server Short Header{DestConnectionID: 2d7a6b4d, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:57 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:57 Replacing connection for connection IDs [2d7a6b4d 99b3306b 10bc2d63 b1ee3e879cbc0f72 4b5ede56] with a closed connection. 2025/09/12 02:06:57 server Connection b1ee3e879cbc0f72 closed. 2025/09/12 02:06:57 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:57 server <- Received Initial packet. 2025/09/12 02:06:57 Created qlog file: /logs/qlog/caa8924928218701da7c5813086a636010f799.sqlog 2025/09/12 02:06:57 server Changing connection ID to 6363b565. 2025/09/12 02:06:57 Adding connection IDs caa8924928218701da7c5813086a636010f799 and 6363b565 for a new connection. 2025/09/12 02:06:57 server <- Reading packet 1 (1280 bytes) for connection caa8924928218701da7c5813086a636010f799, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: caa8924928218701da7c5813086a636010f799, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 1229, Data length: 281, Offset + Data length: 1510} 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:57 server -> Sending packet 0 (37 bytes) for connection caa8924928218701da7c5813086a636010f799, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6363b565, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:57 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:06:57 server -> Sending packet 25 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:57 server -> Sending packet 26 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:57 server <- Reading packet 2 (1280 bytes) for connection 6363b565, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: 6363b565, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:57 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:57 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:57 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:57 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:57 Adding connection ID da095cee. 2025/09/12 02:06:57 Adding connection ID dfd954fd. 2025/09/12 02:06:57 Adding connection ID f71f9cee. 2025/09/12 02:06:57 server -> Sending packet 1 (1280 bytes) for connection caa8924928218701da7c5813086a636010f799, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6363b565, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:57 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:57 server -> Sending packet 0 (839 bytes) for connection caa8924928218701da7c5813086a636010f799, Handshake 2025/09/12 02:06:57 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6363b565, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/09/12 02:06:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: da095cee, StatelessResetToken: 0xe4a5a640d3d717a9e5292d57b876030e} 2025/09/12 02:06:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f71f9cee, StatelessResetToken: 0xd9880ee663cf9ceb5618ada2fd50e3c1} 2025/09/12 02:06:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: dfd954fd, StatelessResetToken: 0xe332cbf064601c556e057a429c525d8c} 2025/09/12 02:06:57 server <- Reading packet 3 (1280 bytes) for connection 6363b565, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: 6363b565, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:57 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:57 server newly acked packets (1): [1] 2025/09/12 02:06:57 server updated RTT: 33.389235ms (σ: 16.694617ms) 2025/09/12 02:06:57 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 44 bytes. 2025/09/12 02:06:57 server <- Reading packet 0 (75 bytes) for connection da095cee, Handshake 2025/09/12 02:06:57 server Long Header{Type: Handshake, DestConnectionID: da095cee, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:57 server Dropping Initial keys. 2025/09/12 02:06:57 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:57 server newly acked packets (1): [0] 2025/09/12 02:06:57 server updated RTT: 33.386ms (σ: 12.526ms) 2025/09/12 02:06:57 server Canceling loss detection timer. 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:57 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:57 server Dropping Handshake keys. 2025/09/12 02:06:57 server <- Reading packet 0 (44 bytes) for connection da095cee, 1-RTT 2025/09/12 02:06:57 server Short Header{DestConnectionID: da095cee, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:57 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:57 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:57 server <- Reading packet 1 (29 bytes) for connection da095cee, 1-RTT 2025/09/12 02:06:57 server Short Header{DestConnectionID: da095cee, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 576µs} 2025/09/12 02:06:57 server newly acked packets (1): [0] 2025/09/12 02:06:57 server updated RTT: 33.383ms (σ: 9.398ms) 2025/09/12 02:06:57 server Canceling loss detection timer. 2025/09/12 02:06:57 Received request: GET /prnngopeja 2025/09/12 02:06:57 server -> Sending packet 1 (296 bytes) for connection caa8924928218701da7c5813086a636010f799, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 470.157µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:57 server -> &wire.NewTokenFrame{Token: 0xc54272fc97cd72c5f041917fb7f8ccdaaf6e1ab5b1714800f29c60464a87cba8a948aa56e348cc9ce3e4b00ba990e5443107c785ce35cc7c8863059e7a414044f854fdc491fabfa5caad16fc79d70db06019c58ef7765a305114a7} 2025/09/12 02:06:57 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:57 server -> Sending packet 2 (1045 bytes) for connection caa8924928218701da7c5813086a636010f799, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:57 server <- Reading packet 2 (31 bytes) for connection da095cee, 1-RTT 2025/09/12 02:06:57 server Short Header{DestConnectionID: da095cee, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:57 server newly acked packets (2): [1 2] 2025/09/12 02:06:57 server updated RTT: 33.168ms (σ: 7.477ms) 2025/09/12 02:06:57 server ECN capability confirmed. 2025/09/12 02:06:57 server Canceling loss detection timer. 2025/09/12 02:06:57 server Ignoring all packets below 2. 2025/09/12 02:06:57 server -> Sending packet 3 (22 bytes) for connection caa8924928218701da7c5813086a636010f799, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:57 server <- Reading packet 3 (26 bytes) for connection da095cee, 1-RTT 2025/09/12 02:06:57 server Short Header{DestConnectionID: da095cee, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:57 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:57 Replacing connection for connection IDs [da095cee dfd954fd f71f9cee caa8924928218701da7c5813086a636010f799 6363b565] with a closed connection. 2025/09/12 02:06:57 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:57 server Connection caa8924928218701da7c5813086a636010f799 closed. 2025/09/12 02:06:57 server <- Received Initial packet. 2025/09/12 02:06:57 Created qlog file: /logs/qlog/515db943d610dd029df4eb71fc103ed2ad55.sqlog 2025/09/12 02:06:57 server Changing connection ID to 60811d81. 2025/09/12 02:06:57 Adding connection IDs 515db943d610dd029df4eb71fc103ed2ad55 and 60811d81 for a new connection. 2025/09/12 02:06:57 server <- Reading packet 1 (1280 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: 515db943d610dd029df4eb71fc103ed2ad55, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1252, Version: v1} 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 1230, Data length: 282, Offset + Data length: 1512} 2025/09/12 02:06:57 server -> Sending packet 0 (37 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 60811d81, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:57 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:57 server <- Reading packet 2 (1280 bytes) for connection 60811d81, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: 60811d81, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:57 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:57 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:57 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:57 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:57 Adding connection ID 839fc754. 2025/09/12 02:06:57 Adding connection ID 4df4be5d. 2025/09/12 02:06:57 Adding connection ID f484207c. 2025/09/12 02:06:57 server -> Sending packet 1 (1280 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 60811d81, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:57 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:57 server -> Sending packet 0 (838 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, Handshake 2025/09/12 02:06:57 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 60811d81, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/09/12 02:06:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4df4be5d, StatelessResetToken: 0xcfe7a7230e919ef41af815c5d3d4e0ef} 2025/09/12 02:06:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f484207c, StatelessResetToken: 0x39a9d8911c2f1d8ade8ca81082c0937e} 2025/09/12 02:06:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 839fc754, StatelessResetToken: 0xd91ee730f12050d7cf9ef4be4881d2b8} 2025/09/12 02:06:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:06:57 server -> Sending packet 26 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:57 server -> Sending packet 27 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:57 server <- Reading packet 3 (1280 bytes) for connection 60811d81, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: 60811d81, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:57 server -> Sending packet 2 (37 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 60811d81, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:57 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:57 server <- Reading packet 4 (1280 bytes) for connection 60811d81, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: 60811d81, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 67, Data length: 1163, Offset + Data length: 1230} 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:57 server -> Sending packet 3 (37 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 60811d81, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:57 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 0s} 2025/09/12 02:06:57 Removing connection IDs [da095cee dfd954fd f71f9cee caa8924928218701da7c5813086a636010f799 6363b565] for a closed connection after it has been retired. 2025/09/12 02:06:57 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:06:57 server -> Sending packet 4 (1280 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 60811d81, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:57 server -> Sending packet 5 (1280 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 60811d81, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:57 server <- Reading packet 5 (1280 bytes) for connection 60811d81, Initial 2025/09/12 02:06:57 server Long Header{Type: Initial, DestConnectionID: 60811d81, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:57 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/09/12 02:06:57 server Parsed a coalesced packet. Part 1: 75 bytes. Remaining: 25 bytes. 2025/09/12 02:06:57 server <- Reading packet 0 (75 bytes) for connection 839fc754, Handshake 2025/09/12 02:06:57 server Long Header{Type: Handshake, DestConnectionID: 839fc754, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 62, Version: v1} 2025/09/12 02:06:57 server Dropping Initial keys. 2025/09/12 02:06:57 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:57 server newly acked packets (1): [0] 2025/09/12 02:06:57 server updated RTT: 233.706678ms (σ: 116.853339ms) 2025/09/12 02:06:57 server Canceling loss detection timer. 2025/09/12 02:06:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:57 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:57 server Dropping Handshake keys. 2025/09/12 02:06:57 server <- Reading packet 0 (25 bytes) for connection 839fc754, 1-RTT 2025/09/12 02:06:57 server Short Header{DestConnectionID: 839fc754, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:57 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:57 server -> Sending packet 1 (293 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 354.541µs} 2025/09/12 02:06:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:57 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:57 server -> &wire.NewTokenFrame{Token: 0x3956f15771df63f04d229c020150763b4deba857e4b926872edcf2f561a1cacef49a95fc52bf8960a04fba8953199779409c978a6df562efa87e388d8eebb2db8f6d07c715d1d72b3697c9f283e5831bc8043b4a32ddca18782ae8} 2025/09/12 02:06:57 server <- Reading packet 1 (50 bytes) for connection 839fc754, 1-RTT 2025/09/12 02:06:57 server Short Header{DestConnectionID: 839fc754, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200.72ms} 2025/09/12 02:06:57 server newly acked packets (1): [0] 2025/09/12 02:06:57 server updated RTT: 233.731ms (σ: 87.689ms) 2025/09/12 02:06:57 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:57 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:57 Received request: GET /mchsrzuqht 2025/09/12 02:06:57 server -> Sending packet 2 (1054 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:57 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:57 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 544.599µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:58 server <- Reading packet 4 (42 bytes) for connection 839fc754, 1-RTT 2025/09/12 02:06:58 server Short Header{DestConnectionID: 839fc754, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:58 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:58 server -> Sending packet 3 (29 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:58 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 75.541µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:58 server <- Reading packet 5 (42 bytes) for connection 839fc754, 1-RTT 2025/09/12 02:06:58 server Short Header{DestConnectionID: 839fc754, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:58 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:58 server Sending ACK because the ACK timer expired. 2025/09/12 02:06:58 server -> Sending packet 4 (30 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:58 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 25.263491ms, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:58 server <- Reading packet 8 (42 bytes) for connection 839fc754, 1-RTT 2025/09/12 02:06:58 server Short Header{DestConnectionID: 839fc754, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:58 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:58 server -> Sending packet 5 (31 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:58 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 130.663µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:06:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:58 server -> Sending packet 7 (288 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:58 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server -> &wire.NewTokenFrame{Token: 0x3956f15771df63f04d229c020150763b4deba857e4b926872edcf2f561a1cacef49a95fc52bf8960a04fba8953199779409c978a6df562efa87e388d8eebb2db8f6d07c715d1d72b3697c9f283e5831bc8043b4a32ddca18782ae8} 2025/09/12 02:06:58 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:58 server Skipping packet number 6 2025/09/12 02:06:58 server -> Sending packet 8 (1045 bytes) for connection 515db943d610dd029df4eb71fc103ed2ad55, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:58 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:58 server <- Reading packet 11 (26 bytes) for connection 839fc754, 1-RTT 2025/09/12 02:06:58 server Short Header{DestConnectionID: 839fc754, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:58 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:58 Replacing connection for connection IDs [839fc754 4df4be5d f484207c 515db943d610dd029df4eb71fc103ed2ad55 60811d81] with a closed connection. 2025/09/12 02:06:58 server Connection 515db943d610dd029df4eb71fc103ed2ad55 closed. 2025/09/12 02:06:58 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/09/12 02:06:58 server -> Sending packet 28 (1045 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:58 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:58 server Skipping packet number 27 2025/09/12 02:06:58 server -> Sending packet 29 (358 bytes) for connection 5776a09ccc618ba487, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:58 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server -> &wire.NewTokenFrame{Token: 0x9de576d17e7928b2b87e6597c307535789775b80561970c1632d7d8c3ac233f0289adbf9fb508cf1d00fad949ff8d4aad9f61963112d287480452ec3467728047deee3ba1054e7c23adabd3dcb8943b31a9e41be51bed2ebcf} 2025/09/12 02:06:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec5dd8ba, StatelessResetToken: 0xbb47c416d601b36c8ffa85154db3d42d} 2025/09/12 02:06:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 52262b2d, StatelessResetToken: 0x42a5dfbed375099414854a05caa0aeed} 2025/09/12 02:06:58 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b429bc2, StatelessResetToken: 0x73b09b1c2fd2803ed3839d3923122fd8} 2025/09/12 02:06:58 server <- Received Initial packet. 2025/09/12 02:06:58 Created qlog file: /logs/qlog/bb47f22d6132b873b02a2c72ddd6fb4470286d.sqlog 2025/09/12 02:06:58 server Changing connection ID to b61325d4. 2025/09/12 02:06:58 Adding connection IDs bb47f22d6132b873b02a2c72ddd6fb4470286d and b61325d4 for a new connection. 2025/09/12 02:06:58 server <- Reading packet 3 (1280 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, Initial 2025/09/12 02:06:58 server Long Header{Type: Initial, DestConnectionID: bb47f22d6132b873b02a2c72ddd6fb4470286d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/09/12 02:06:58 server <- &wire.CryptoFrame{Offset: 63, Data length: 4, Offset + Data length: 67} 2025/09/12 02:06:58 server <- &wire.CryptoFrame{Offset: 1229, Data length: 277, Offset + Data length: 1506} 2025/09/12 02:06:58 server -> Sending packet 0 (37 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, Initial 2025/09/12 02:06:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b61325d4, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:06:58 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/09/12 02:06:58 server <- Reading packet 4 (1280 bytes) for connection b61325d4, Initial 2025/09/12 02:06:58 server Long Header{Type: Initial, DestConnectionID: b61325d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:58 server <- &wire.CryptoFrame{Offset: 67, Data length: 1162, Offset + Data length: 1229} 2025/09/12 02:06:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 63, Offset + Data length: 63} 2025/09/12 02:06:58 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:58 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:58 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:58 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4, EnableResetStreamAt: false} 2025/09/12 02:06:58 Adding connection ID dafeb3a3. 2025/09/12 02:06:58 Adding connection ID 27f73fbc. 2025/09/12 02:06:58 Adding connection ID 5e9b748c. 2025/09/12 02:06:58 server -> Sending packet 1 (1280 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, Initial 2025/09/12 02:06:58 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: b61325d4, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:58 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/09/12 02:06:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 1178, Offset + Data length: 1178} 2025/09/12 02:06:58 server -> Sending packet 0 (850 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, Handshake 2025/09/12 02:06:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b61325d4, PacketNumber: 0, PacketNumberLen: 2, Length: 746, Version: v1} 2025/09/12 02:06:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/09/12 02:06:58 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5e9b748c, StatelessResetToken: 0x45c33ad843e7963ee93a51e7628db361} 2025/09/12 02:06:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 27f73fbc, StatelessResetToken: 0x2efcc80cc1c0933340b71c3e595a8213} 2025/09/12 02:06:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dafeb3a3, StatelessResetToken: 0x78330c97a647b69197e90676b9f7e1d5} 2025/09/12 02:06:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/09/12 02:06:58 server <- Reading packet 5 (1280 bytes) for connection b61325d4, Initial 2025/09/12 02:06:58 server Long Header{Type: Initial, DestConnectionID: b61325d4, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/09/12 02:06:58 server -> Sending packet 26 (22 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:58 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:06:58 server newly acked packets (1): [1] 2025/09/12 02:06:58 server updated RTT: 33.301121ms (σ: 16.65056ms) 2025/09/12 02:06:58 server Short Header{DestConnectionID: (empty), PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:58 server Skipping packet number 25 2025/09/12 02:06:58 server -> Sending packet 27 (286 bytes) for connection f45a315839dde928, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:58 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:58 server -> &wire.NewTokenFrame{Token: 0xcb648934d918c8ea594e4b1ff69e88696cd31f78ab2b077e3a14534e8120242bf96ce6ad7b3808a77fd436eb0a5e0d2e744c192a356221cb319ac14aa2d3b09a43431acfc7d77c87d136fb7843ba00803789c592372d7aaeec} 2025/09/12 02:06:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:58 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:58 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/09/12 02:06:58 server -> Sending packet 1 (759 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, Handshake 2025/09/12 02:06:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b61325d4, PacketNumber: 1, PacketNumberLen: 2, Length: 746, Version: v1} 2025/09/12 02:06:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/09/12 02:06:58 server -> Sending packet 2 (759 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, Handshake 2025/09/12 02:06:58 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: b61325d4, PacketNumber: 2, PacketNumberLen: 2, Length: 746, Version: v1} 2025/09/12 02:06:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/09/12 02:06:59 server <- Reading packet 2 (70 bytes) for connection b61325d4, Handshake 2025/09/12 02:06:59 server Long Header{Type: Handshake, DestConnectionID: b61325d4, SrcConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 57, Version: v1} 2025/09/12 02:06:59 server Dropping Initial keys. 2025/09/12 02:06:59 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:06:59 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:06:59 server Dropping Handshake keys. 2025/09/12 02:06:59 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/09/12 02:06:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:59 server -> Sending packet 2 (360 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 27f73fbc, StatelessResetToken: 0x2efcc80cc1c0933340b71c3e595a8213} 2025/09/12 02:06:59 server -> &wire.NewTokenFrame{Token: 0x467d3eb2f81f4b8c42af8790ad9e0941f2228d9f3e46b2e2472bfe4005c439caad61c5f6ad16f2f42e3360a3d82b624a68f42025bad94fc17be8846efae97e10cee3bb0a73713e0c8aae1c76eb33d972dd4b1b89c599c56d5ee7df} 2025/09/12 02:06:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5e9b748c, StatelessResetToken: 0x45c33ad843e7963ee93a51e7628db361} 2025/09/12 02:06:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dafeb3a3, StatelessResetToken: 0x78330c97a647b69197e90676b9f7e1d5} 2025/09/12 02:06:59 server -> Sending packet 3 (360 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5e9b748c, StatelessResetToken: 0x45c33ad843e7963ee93a51e7628db361} 2025/09/12 02:06:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 27f73fbc, StatelessResetToken: 0x2efcc80cc1c0933340b71c3e595a8213} 2025/09/12 02:06:59 server -> &wire.NewTokenFrame{Token: 0x467d3eb2f81f4b8c42af8790ad9e0941f2228d9f3e46b2e2472bfe4005c439caad61c5f6ad16f2f42e3360a3d82b624a68f42025bad94fc17be8846efae97e10cee3bb0a73713e0c8aae1c76eb33d972dd4b1b89c599c56d5ee7df} 2025/09/12 02:06:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dafeb3a3, StatelessResetToken: 0x78330c97a647b69197e90676b9f7e1d5} 2025/09/12 02:06:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:59 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:59 server <- Reading packet 2 (52 bytes) for connection dafeb3a3, 1-RTT 2025/09/12 02:06:59 server Short Header{DestConnectionID: dafeb3a3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 216µs, ECT0: 1, ECT1: 0, CE: 0} 2025/09/12 02:06:59 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:59 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:06:59 server <- Reading packet 3 (44 bytes) for connection dafeb3a3, 1-RTT 2025/09/12 02:06:59 server Short Header{DestConnectionID: dafeb3a3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:59 server -> Sending packet 4 (27 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 Received request: GET /rowqcsvwww 2025/09/12 02:06:59 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 172.762µs, ECT0: 2, ECT1: 0, CE: 0} 2025/09/12 02:06:59 server -> Sending packet 5 (1045 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:06:59 server -> Sending packet 17 (360 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: Not-ECT) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3f647bac, StatelessResetToken: 0xc99eda4a68d42dac807779ccb281ff7b} 2025/09/12 02:06:59 server -> &wire.NewTokenFrame{Token: 0x0b231646e2b6dbc305f3e90e7f10044592f08e013f25457c7bb2f39c400ed8457ae09004ea03c0465d0f7e44eae4c1518a96e5e3f784e9ca60233dae1f45fe4ec9ccc451b863a710b4bf79bd990c2b6ab87e41cca5bc609d8cacff} 2025/09/12 02:06:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a8e519a4, StatelessResetToken: 0xd1b10c04d014397591b5cb2171d5be2b} 2025/09/12 02:06:59 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0827fc1b, StatelessResetToken: 0x9a05b9a0b8311ba7741222d3e2341f8c} 2025/09/12 02:06:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:59 server Skipping packet number 16 2025/09/12 02:06:59 server -> Sending packet 18 (1045 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: Not-ECT) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:59 server <- Reading packet 6 (44 bytes) for connection dafeb3a3, 1-RTT 2025/09/12 02:06:59 server Short Header{DestConnectionID: dafeb3a3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:59 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:59 server -> Sending packet 6 (1366 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.PingFrame{} 2025/09/12 02:06:59 server -> Sending packet 7 (29 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 182.481µs, ECT0: 3, ECT1: 0, CE: 0} 2025/09/12 02:06:59 server <- Reading packet 8 (1366 bytes) for connection dafeb3a3, 1-RTT 2025/09/12 02:06:59 server Short Header{DestConnectionID: dafeb3a3, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server <- &wire.PingFrame{} 2025/09/12 02:06:59 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:59 server -> Sending packet 8 (31 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 65.934µs, ECT0: 4, ECT1: 0, CE: 0} 2025/09/12 02:06:59 server <- Reading packet 9 (44 bytes) for connection dafeb3a3, 1-RTT 2025/09/12 02:06:59 server Short Header{DestConnectionID: dafeb3a3, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:59 server Setting ACK timer to max ack delay: 25ms 2025/09/12 02:06:59 Removing connection ID bb47f22d6132b873b02a2c72ddd6fb4470286d. 2025/09/12 02:06:59 server Sending ACK because the ACK timer expired. 2025/09/12 02:06:59 server -> Sending packet 9 (32 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 25.390673ms, ECT0: 5, ECT1: 0, CE: 0} 2025/09/12 02:06:59 Removing connection ID b61325d4. 2025/09/12 02:06:59 server <- Reading packet 11 (44 bytes) for connection dafeb3a3, 1-RTT 2025/09/12 02:06:59 server Short Header{DestConnectionID: dafeb3a3, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:59 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:06:59 server <- Reading packet 12 (44 bytes) for connection dafeb3a3, 1-RTT 2025/09/12 02:06:59 server Short Header{DestConnectionID: dafeb3a3, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:06:59 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:06:59 server -> Sending packet 10 (33 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 150.55µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 02:06:59 Removing connection IDs [2d7a6b4d 99b3306b 10bc2d63 b1ee3e879cbc0f72 4b5ede56] for a closed connection after it has been retired. 2025/09/12 02:06:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/09/12 02:06:59 server -> Sending packet 12 (360 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.NewTokenFrame{Token: 0x467d3eb2f81f4b8c42af8790ad9e0941f2228d9f3e46b2e2472bfe4005c439caad61c5f6ad16f2f42e3360a3d82b624a68f42025bad94fc17be8846efae97e10cee3bb0a73713e0c8aae1c76eb33d972dd4b1b89c599c56d5ee7df} 2025/09/12 02:06:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 27f73fbc, StatelessResetToken: 0x2efcc80cc1c0933340b71c3e595a8213} 2025/09/12 02:06:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dafeb3a3, StatelessResetToken: 0x78330c97a647b69197e90676b9f7e1d5} 2025/09/12 02:06:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:06:59 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:06:59 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5e9b748c, StatelessResetToken: 0x45c33ad843e7963ee93a51e7628db361} 2025/09/12 02:06:59 server Skipping packet number 11 2025/09/12 02:06:59 server -> Sending packet 13 (1045 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: Not-ECT) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:59 server <- Reading packet 14 (37 bytes) for connection dafeb3a3, 1-RTT 2025/09/12 02:06:59 server Short Header{DestConnectionID: dafeb3a3, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 2}}, DelayTime: 160µs, ECT0: 6, ECT1: 0, CE: 0} 2025/09/12 02:06:59 server newly acked packets (1): [12] 2025/09/12 02:06:59 server updated RTT: 33.066ms (σ: 12.955ms) 2025/09/12 02:06:59 server ECN capability confirmed. 2025/09/12 02:06:59 server lost packet 6 (time threshold) 2025/09/12 02:06:59 server -> Sending packet 14 (1323 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.PingFrame{} 2025/09/12 02:06:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/09/12 02:06:59 server -> Sending packet 16 (1045 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:59 server -> Sending packet 17 (1045 bytes) for connection bb47f22d6132b873b02a2c72ddd6fb4470286d, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:06:59 server <- Reading packet 15 (39 bytes) for connection dafeb3a3, 1-RTT 2025/09/12 02:06:59 server Short Header{DestConnectionID: dafeb3a3, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server <- &wire.AckFrame{LargestAcked: 16, LowestAcked: 2, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 2}}, DelayTime: 128µs, ECT0: 7, ECT1: 0, CE: 0} 2025/09/12 02:06:59 server <- Reading packet 16 (26 bytes) for connection dafeb3a3, 1-RTT 2025/09/12 02:06:59 server Short Header{DestConnectionID: dafeb3a3, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/09/12 02:06:59 server Closing connection with error: Application error 0x0 (remote) 2025/09/12 02:06:59 Replacing connection for connection IDs [dafeb3a3 27f73fbc 5e9b748c] with a closed connection. 2025/09/12 02:06:59 Error accepting stream: Application error 0x0 (remote) 2025/09/12 02:06:59 server Connection bb47f22d6132b873b02a2c72ddd6fb4470286d closed. 2025/09/12 02:06:59 Removing connection IDs [dafeb3a3 27f73fbc 5e9b748c] for a closed connection after it has been retired. 2025/09/12 02:06:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/09/12 02:06:59 server -> Sending packet 27 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:06:59 server -> Sending packet 28 (22 bytes) for connection 49afbe3c7ce77f41, 1-RTT (ECN: ECT(0)) 2025/09/12 02:06:59 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:06:59 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:07:00 Removing connection IDs [839fc754 4df4be5d f484207c 515db943d610dd029df4eb71fc103ed2ad55 60811d81] for a closed connection after it has been retired. 2025/09/12 02:07:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/09/12 02:07:01 server -> Sending packet 31 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:07:01 server Short Header{DestConnectionID: (empty), PacketNumber: 31, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:01 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:07:01 server -> Sending packet 32 (22 bytes) for connection 4081ba7b99d42402884471e0c7b3, 1-RTT (ECN: ECT(0)) 2025/09/12 02:07:01 server Short Header{DestConnectionID: (empty), PacketNumber: 32, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:01 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:07:03 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/09/12 02:07:03 server -> Sending packet 20 (360 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: Not-ECT) 2025/09/12 02:07:03 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3f647bac, StatelessResetToken: 0xc99eda4a68d42dac807779ccb281ff7b} 2025/09/12 02:07:03 server -> &wire.NewTokenFrame{Token: 0x0b231646e2b6dbc305f3e90e7f10044592f08e013f25457c7bb2f39c400ed8457ae09004ea03c0465d0f7e44eae4c1518a96e5e3f784e9ca60233dae1f45fe4ec9ccc451b863a710b4bf79bd990c2b6ab87e41cca5bc609d8cacff} 2025/09/12 02:07:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a8e519a4, StatelessResetToken: 0xd1b10c04d014397591b5cb2171d5be2b} 2025/09/12 02:07:03 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0827fc1b, StatelessResetToken: 0x9a05b9a0b8311ba7741222d3e2341f8c} 2025/09/12 02:07:03 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:07:03 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:07:03 server Skipping packet number 19 2025/09/12 02:07:03 server -> Sending packet 21 (1045 bytes) for connection fedf1ef869a5018fad, 1-RTT (ECN: Not-ECT) 2025/09/12 02:07:03 server Short Header{DestConnectionID: (empty), PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:03 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:07:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/09/12 02:07:04 server -> Sending packet 19 (22 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:07:04 server Short Header{DestConnectionID: (empty), PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:07:04 server Skipping packet number 18 2025/09/12 02:07:04 server -> Sending packet 20 (288 bytes) for connection 718bd98e12efce035365, 1-RTT (ECN: ECT(0)) 2025/09/12 02:07:04 server Short Header{DestConnectionID: (empty), PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:07:04 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:07:04 server -> &wire.NewTokenFrame{Token: 0x4dc0c43ddab9c98120f750f44f1ba467c988545365b0b10d4f42469db0f7012a374b6577bf39c42d8dd34b2fa4297242b41639f9fc847bcba36cbd248db6824fd9adee8006cce6b2ffa76e93d9e01bf6094cafcaf18ea7fdc50172} 2025/09/12 02:07:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/09/12 02:07:04 server -> Sending packet 29 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:07:04 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:07:04 server -> Sending packet 30 (22 bytes) for connection 28262327c113e254b12aef3337684aca, 1-RTT (ECN: ECT(0)) 2025/09/12 02:07:04 server Short Header{DestConnectionID: (empty), PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:04 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:07:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/09/12 02:07:05 server -> Sending packet 28 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:07:05 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:05 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:07:05 server -> Sending packet 29 (22 bytes) for connection 1a0dcc310fc7dcad76e83374e4be, 1-RTT (ECN: ECT(0)) 2025/09/12 02:07:05 server Short Header{DestConnectionID: (empty), PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:05 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/09/12 02:07:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/09/12 02:07:07 server -> Sending packet 27 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:07:07 server Short Header{DestConnectionID: (empty), PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:07:07 server -> Sending packet 28 (1045 bytes) for connection 0f2c72d323569b8f, 1-RTT (ECN: ECT(0)) 2025/09/12 02:07:07 server Short Header{DestConnectionID: (empty), PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:07:08 server Destroying connection: timeout: no recent network activity 2025/09/12 02:07:08 Removing connection ID 28841ec7. 2025/09/12 02:07:08 Removing connection ID 93e47a50. 2025/09/12 02:07:08 Removing connection ID 732a06f1. 2025/09/12 02:07:08 Error accepting stream: timeout: no recent network activity 2025/09/12 02:07:08 server Connection 0f2c72d323569b8f closed. 2025/09/12 02:07:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/09/12 02:07:09 server -> Sending packet 30 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:07:09 server Short Header{DestConnectionID: (empty), PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:07:09 server -> Sending packet 31 (1045 bytes) for connection 5a875719f737684cc269, 1-RTT (ECN: ECT(0)) 2025/09/12 02:07:09 server Short Header{DestConnectionID: (empty), PacketNumber: 31, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:07:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024}