2025/04/30 11:00:05 Increased receive buffer size to 14336 kiB 2025/04/30 11:00:05 Increased send buffer size to 14336 kiB 2025/04/30 11:00:05 Setting DF for IPv4 and IPv6. 2025/04/30 11:00:05 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 11:00:05 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 11:00:05 server Listening for udp connections on [::]:443 2025/04/30 11:00:05 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:00:05 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:00:05 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 11:00:06 server <- Received Initial packet. 2025/04/30 11:00:06 Created qlog file: /logs/qlog/0275ceeb44057ae1ac21c26b554d326d5872b7.sqlog 2025/04/30 11:00:06 server Changing connection ID to 6d28000a. 2025/04/30 11:00:06 Adding connection IDs 0275ceeb44057ae1ac21c26b554d326d5872b7 and 6d28000a for a new connection. 2025/04/30 11:00:06 server <- Reading packet 0 (1280 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:06 server Long Header{Type: Initial, DestConnectionID: 0275ceeb44057ae1ac21c26b554d326d5872b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:00:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:00:06 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:00:06 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:00:06 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:00:06 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: (empty), InitialMaxStreamDataBidiLocal: 524288, InitialMaxStreamDataBidiRemote: 524288, InitialMaxStreamDataUni: 524288, InitialMaxData: 786432, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 26ms, ActiveConnectionIDLimit: 4} 2025/04/30 11:00:06 Adding connection ID 6606542d. 2025/04/30 11:00:06 Adding connection ID 85032517. 2025/04/30 11:00:06 Adding connection ID fb42654e. 2025/04/30 11:00:06 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7 2025/04/30 11:00:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d28000a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 431, Version: v1} 2025/04/30 11:00:06 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:00:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:00:06 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6d28000a, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:00:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:00:06 server Short Header{DestConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:00:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6606542d, StatelessResetToken: 0x085a5b1d85abbfc17f8e86a155b7b4cb} 2025/04/30 11:00:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fb42654e, StatelessResetToken: 0xaa3e818780c3436a5905e7aa12176ad7} 2025/04/30 11:00:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 85032517, StatelessResetToken: 0xb3b7a7ce607508d033851b3491e48fd3} 2025/04/30 11:00:06 server <- Reading packet 1 (1280 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:06 server Long Header{Type: Initial, DestConnectionID: 0275ceeb44057ae1ac21c26b554d326d5872b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:00:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:00:06 server -> Sending packet 1 (37 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d28000a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:00:06 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:00:06 server <- Reading packet 2 (1280 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:06 server Long Header{Type: Initial, DestConnectionID: 0275ceeb44057ae1ac21c26b554d326d5872b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:00:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:00:06 server -> Sending packet 2 (37 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d28000a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:00:06 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:00:06 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 11:00:06 server -> Sending packet 3 (1280 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d28000a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:00:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:00:06 server -> Sending packet 4 (1280 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:06 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d28000a, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:00:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:00:07 Tracking 5 connection IDs and 0 reset tokens. 2025/04/30 11:00:07 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 11:00:07 server -> Sending packet 1 (744 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Handshake 2025/04/30 11:00:07 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6d28000a, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:00:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:00:07 server -> Sending packet 2 (744 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Handshake 2025/04/30 11:00:07 server Long Header{Type: Handshake, DestConnectionID: (empty), SrcConnectionID: 6d28000a, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 11:00:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 11:00:07 server <- Reading packet 3 (1280 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:07 server Long Header{Type: Initial, DestConnectionID: 0275ceeb44057ae1ac21c26b554d326d5872b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:00:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:00:07 server -> Sending packet 5 (37 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d28000a, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:00:07 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:00:07 server <- Reading packet 4 (1280 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:07 server Long Header{Type: Initial, DestConnectionID: 0275ceeb44057ae1ac21c26b554d326d5872b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:00:07 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:00:07 server -> Sending packet 6 (37 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d28000a, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:00:07 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:00:07 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 11:00:07 server -> Sending packet 7 (1280 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d28000a, Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:00:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:00:07 server -> Sending packet 8 (1280 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:07 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d28000a, Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1266, Version: v1} 2025/04/30 11:00:07 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 11:00:08 server <- Reading packet 5 (1280 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:08 server Long Header{Type: Initial, DestConnectionID: 0275ceeb44057ae1ac21c26b554d326d5872b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:00:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:00:08 server -> Sending packet 9 (37 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d28000a, Token: (empty), PacketNumber: 9, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:00:08 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:00:08 server <- Reading packet 6 (1280 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:08 server Long Header{Type: Initial, DestConnectionID: 0275ceeb44057ae1ac21c26b554d326d5872b7, SrcConnectionID: (empty), Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/04/30 11:00:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 272, Offset + Data length: 272} 2025/04/30 11:00:08 server -> Sending packet 10 (37 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, Initial 2025/04/30 11:00:08 server Long Header{Type: Initial, DestConnectionID: (empty), SrcConnectionID: 6d28000a, Token: (empty), PacketNumber: 10, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 11:00:08 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:00:08 server Parsed a coalesced packet. Part 1: 1185 bytes. Remaining: 95 bytes. 2025/04/30 11:00:08 server <- Reading packet 7 (1185 bytes) for connection 6606542d, Initial 2025/04/30 11:00:08 server Long Header{Type: Initial, DestConnectionID: 6606542d, SrcConnectionID: (empty), Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1171, Version: v1} 2025/04/30 11:00:08 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 11:00:08 server Parsed a coalesced packet. Part 2: 70 bytes. Remaining: 25 bytes. 2025/04/30 11:00:08 server <- Reading packet 0 (70 bytes) for connection 6606542d, Handshake 2025/04/30 11:00:08 server Long Header{Type: Handshake, DestConnectionID: 6606542d, SrcConnectionID: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 57, Version: v1} 2025/04/30 11:00:08 server Dropping Initial keys. 2025/04/30 11:00:08 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 11:00:08 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 11:00:08 Retiring connection ID 0275ceeb44057ae1ac21c26b554d326d5872b7 in 5s. 2025/04/30 11:00:08 server Dropping Handshake keys. 2025/04/30 11:00:08 server <- Reading packet 0 (25 bytes) for connection 6606542d, 1-RTT 2025/04/30 11:00:08 server Short Header{DestConnectionID: 6606542d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:00:08 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 11:00:08 Retiring connection ID 6d28000a in 5s. 2025/04/30 11:00:08 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 11:00:08 server Parsed a coalesced packet. Part 1: 36 bytes. Remaining: 42 bytes. 2025/04/30 11:00:08 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:00:08 server <- Reading packet 1 (42 bytes) for connection 6606542d, 1-RTT 2025/04/30 11:00:08 server Short Header{DestConnectionID: 6606542d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:00:08 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 11:00:08 server <- Reading packet 2 (29 bytes) for connection 6606542d, 1-RTT 2025/04/30 11:00:08 server Short Header{DestConnectionID: 6606542d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:00:08 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.024ms} 2025/04/30 11:00:08 server newly acked packets (1): [0] 2025/04/30 11:00:08 server updated RTT: 1.503955876s (σ: 751.977938ms) 2025/04/30 11:00:08 server Canceling loss detection timer. 2025/04/30 11:00:08 server -> Sending packet 1 (256 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:00:08 server Short Header{DestConnectionID: (empty), PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:00:08 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 431.014µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 11:00:08 server -> &wire.HandshakeDoneFrame{} 2025/04/30 11:00:08 server -> &wire.NewTokenFrame{Token: 0xa5884bd7d41617edd21039a82e9f2fdcb9f13564b1eddd0935ae14859346987e63496f8d55d894e8424ea29e39a7a42060733391372a07586648ee50c1389ec79a7d04504ea1915d69365f51bcd53052ba3f6ec2fee9} 2025/04/30 11:00:08 Received request: GET /ttvkxdseai 2025/04/30 11:00:08 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 11:00:08 server -> Sending packet 2 (1045 bytes) for connection 0275ceeb44057ae1ac21c26b554d326d5872b7, 1-RTT (ECN: ECT(0)) 2025/04/30 11:00:08 server Short Header{DestConnectionID: (empty), PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:00:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 11:00:08 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:00:08 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:00:08 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:00:08 server Dropping %!s(logging.PacketType=1) packet (36 bytes) because we already dropped the keys. 2025/04/30 11:00:08 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:00:08 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:00:09 Tracking 5 connection IDs and 0 reset tokens. 2025/04/30 11:00:09 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:00:09 server Dropping %!s(logging.PacketType=1) packet (70 bytes) because we already dropped the keys. 2025/04/30 11:00:09 server <- Reading packet 3 (1366 bytes) for connection 6606542d, 1-RTT 2025/04/30 11:00:09 server Short Header{DestConnectionID: 6606542d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:00:09 server <- &wire.PingFrame{} 2025/04/30 11:00:09 server Setting ACK timer to max ack delay: 25ms 2025/04/30 11:00:09 server <- Reading packet 4 (31 bytes) for connection 6606542d, 1-RTT 2025/04/30 11:00:09 server Short Header{DestConnectionID: 6606542d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:00:09 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 48µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 11:00:09 server newly acked packets (2): [1 2] 2025/04/30 11:00:09 server updated RTT: 1.503702s (σ: 564.488ms) 2025/04/30 11:00:09 server ECN capability confirmed. 2025/04/30 11:00:09 server Canceling loss detection timer. 2025/04/30 11:00:09 server Ignoring all packets below 3. 2025/04/30 11:00:09 server <- Reading packet 5 (26 bytes) for connection 6606542d, 1-RTT 2025/04/30 11:00:09 server Short Header{DestConnectionID: 6606542d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 11:00:09 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 11:00:09 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 11:00:09 Replacing connection for connection IDs [fb42654e 6606542d 85032517] with a closed connection. 2025/04/30 11:00:09 Error accepting stream: Application error 0x0 (remote) 2025/04/30 11:00:09 server Connection 0275ceeb44057ae1ac21c26b554d326d5872b7 closed. 2025/04/30 11:00:11 Tracking 5 connection IDs and 0 reset tokens. 2025/04/30 11:00:13 Tracking 5 connection IDs and 0 reset tokens. 2025/04/30 11:00:13 Removing connection ID 6d28000a after it has been retired. 2025/04/30 11:00:13 Removing connection ID 0275ceeb44057ae1ac21c26b554d326d5872b7 after it has been retired. 2025/04/30 11:00:14 Removing connection IDs [fb42654e 6606542d 85032517] for a closed connection after it has been retired. 2025/04/30 11:00:15 Tracking 0 connection IDs and 0 reset tokens.