2025/04/30 08:47:55 Increased receive buffer size to 14336 kiB 2025/04/30 08:47:55 Increased send buffer size to 14336 kiB 2025/04/30 08:47:55 Setting DF for IPv4 and IPv6. 2025/04/30 08:47:55 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 08:47:55 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 08:47:55 server Listening for udp connections on [::]:443 2025/04/30 08:47:56 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 08:47:56 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 08:47:56 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 08:47:56 server <- Received Initial packet. 2025/04/30 08:47:56 Created qlog file: /logs/qlog/200a88a57384366248c6834bf88e731c.sqlog 2025/04/30 08:47:56 server Changing connection ID to f6fe7208. 2025/04/30 08:47:56 Adding connection IDs 200a88a57384366248c6834bf88e731c and f6fe7208 for a new connection. 2025/04/30 08:47:56 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:47:56 server <- Reading packet 0 (333 bytes) for connection 200a88a57384366248c6834bf88e731c, Initial 2025/04/30 08:47:56 server Long Header{Type: Initial, DestConnectionID: 200a88a57384366248c6834bf88e731c, SrcConnectionID: b1e1b0826ca0b526c5b6d387ce59f498f5a5db2f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:47:56 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:47:56 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:56 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:56 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:56 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: b1e1b0826ca0b526c5b6d387ce59f498f5a5db2f, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:47:56 Adding connection ID 947e4212. 2025/04/30 08:47:56 Adding connection ID 3f652250. 2025/04/30 08:47:56 Adding connection ID 0e8f26c8. 2025/04/30 08:47:56 Adding connection ID 8fec9067. 2025/04/30 08:47:56 Adding connection ID b292af54. 2025/04/30 08:47:56 server coalesced packet has different destination connection ID: 00000000, expected 200a88a57384366248c6834bf88e731c 2025/04/30 08:47:56 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 200a88a57384366248c6834bf88e731c 2025/04/30 08:47:56 server Long Header{Type: Initial, DestConnectionID: b1e1b0826ca0b526c5b6d387ce59f498f5a5db2f, SrcConnectionID: f6fe7208, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 310, Version: v1} 2025/04/30 08:47:56 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:47:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:56 server Long Header{Type: Handshake, DestConnectionID: b1e1b0826ca0b526c5b6d387ce59f498f5a5db2f, SrcConnectionID: f6fe7208, PacketNumber: 0, PacketNumberLen: 2, Length: 744, Version: v1} 2025/04/30 08:47:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 08:47:56 server Short Header{DestConnectionID: b1e1b0826ca0b526c5b6d387ce59f498f5a5db2f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3f652250, StatelessResetToken: 0x670a5ce0f8e6a568add212dcc640fba6} 2025/04/30 08:47:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 947e4212, StatelessResetToken: 0x637918a22022cba45a58f4ead8f14ec4} 2025/04/30 08:47:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0e8f26c8, StatelessResetToken: 0x0844f20f6d43cc56868cebc34443cd64} 2025/04/30 08:47:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b292af54, StatelessResetToken: 0xccb057bf65343571be518aee2096efe4} 2025/04/30 08:47:56 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8fec9067, StatelessResetToken: 0x31edb3a60e1510557968ff941057b7b1} 2025/04/30 08:47:56 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:56 server -> Sending packet 1 (1280 bytes) for connection 200a88a57384366248c6834bf88e731c, Initial 2025/04/30 08:47:56 server Long Header{Type: Initial, DestConnectionID: b1e1b0826ca0b526c5b6d387ce59f498f5a5db2f, SrcConnectionID: f6fe7208, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:47:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:56 server -> Sending packet 2 (1280 bytes) for connection 200a88a57384366248c6834bf88e731c, Initial 2025/04/30 08:47:56 server Long Header{Type: Initial, DestConnectionID: b1e1b0826ca0b526c5b6d387ce59f498f5a5db2f, SrcConnectionID: f6fe7208, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:47:56 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:56 server Canceling loss detection timer. 2025/04/30 08:47:56 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:47:57 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:47:57 server <- Reading packet 2 (56 bytes) for connection f6fe7208, Initial 2025/04/30 08:47:57 server Long Header{Type: Initial, DestConnectionID: f6fe7208, SrcConnectionID: b1e1b0826ca0b526c5b6d387ce59f498f5a5db2f, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:57 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 56µs} 2025/04/30 08:47:57 server newly acked packets (1): [2] 2025/04/30 08:47:57 server updated RTT: 34.252367ms (σ: 17.126183ms) 2025/04/30 08:47:57 server coalesced packet has different destination connection ID: 00000000, expected f6fe7208 2025/04/30 08:47:57 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:47:57 server -> Sending packet 1 (777 bytes) for connection 200a88a57384366248c6834bf88e731c, Handshake 2025/04/30 08:47:57 server Long Header{Type: Handshake, DestConnectionID: b1e1b0826ca0b526c5b6d387ce59f498f5a5db2f, SrcConnectionID: f6fe7208, PacketNumber: 1, PacketNumberLen: 2, Length: 744, Version: v1} 2025/04/30 08:47:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 08:47:57 server -> Sending packet 2 (777 bytes) for connection 200a88a57384366248c6834bf88e731c, Handshake 2025/04/30 08:47:57 server Long Header{Type: Handshake, DestConnectionID: b1e1b0826ca0b526c5b6d387ce59f498f5a5db2f, SrcConnectionID: f6fe7208, PacketNumber: 2, PacketNumberLen: 2, Length: 744, Version: v1} 2025/04/30 08:47:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 08:47:57 server Parsed a coalesced packet. Part 1: 96 bytes. Remaining: 164 bytes. 2025/04/30 08:47:57 server <- Reading packet 3 (96 bytes) for connection f6fe7208, Handshake 2025/04/30 08:47:57 server Long Header{Type: Handshake, DestConnectionID: f6fe7208, SrcConnectionID: b1e1b0826ca0b526c5b6d387ce59f498f5a5db2f, PacketNumber: 3, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:47:57 server Dropping Initial keys. 2025/04/30 08:47:57 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 512µs} 2025/04/30 08:47:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:57 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:57 Retiring connection ID 200a88a57384366248c6834bf88e731c in 5s. 2025/04/30 08:47:57 server Dropping Handshake keys. 2025/04/30 08:47:57 server <- Reading packet 4 (164 bytes) for connection f6fe7208, 1-RTT 2025/04/30 08:47:57 server Short Header{DestConnectionID: f6fe7208, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:57 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: eb1bdf07bbfc5d2ca402cfdc83948e37722702c5, StatelessResetToken: 0x25881c4889cbc0d8f7493d7e269f1966} 2025/04/30 08:47:57 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 467f0e50de8da72be04b7e6381704015b20916fd, StatelessResetToken: 0x82fb11bbb64e923b45c066dbbf3f2632} 2025/04/30 08:47:57 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bd18a6bfaef023976bc16cf37489e5dd4603cb0f, StatelessResetToken: 0xe566263112c56a340bafba54679d20b1} 2025/04/30 08:47:57 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:57 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:57 Received request: GET /qpvuehafeh 2025/04/30 08:47:57 server -> Sending packet 2 (398 bytes) for connection 200a88a57384366248c6834bf88e731c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:57 server Short Header{DestConnectionID: eb1bdf07bbfc5d2ca402cfdc83948e37722702c5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:57 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 368.929µs} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8fec9067, StatelessResetToken: 0x31edb3a60e1510557968ff941057b7b1} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 947e4212, StatelessResetToken: 0x637918a22022cba45a58f4ead8f14ec4} 2025/04/30 08:47:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:57 server -> &wire.NewTokenFrame{Token: 0x444956b055d97683b6983866073895de2b56349c0605c2e7653e363dfd9b6d630739534ba929f1bafcab5ae9320b96459ba5e8694b10e0397f4e8b4591fe393d6c2d9a8ec5f176c34cc919fdea8ace2472972db18581} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3f652250, StatelessResetToken: 0x670a5ce0f8e6a568add212dcc640fba6} 2025/04/30 08:47:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:57 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b292af54, StatelessResetToken: 0xccb057bf65343571be518aee2096efe4} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0e8f26c8, StatelessResetToken: 0x0844f20f6d43cc56868cebc34443cd64} 2025/04/30 08:47:57 server -> Sending packet 3 (393 bytes) for connection 200a88a57384366248c6834bf88e731c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:57 server Short Header{DestConnectionID: eb1bdf07bbfc5d2ca402cfdc83948e37722702c5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: b292af54, StatelessResetToken: 0xccb057bf65343571be518aee2096efe4} 2025/04/30 08:47:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 947e4212, StatelessResetToken: 0x637918a22022cba45a58f4ead8f14ec4} 2025/04/30 08:47:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8fec9067, StatelessResetToken: 0x31edb3a60e1510557968ff941057b7b1} 2025/04/30 08:47:57 server -> &wire.NewTokenFrame{Token: 0x444956b055d97683b6983866073895de2b56349c0605c2e7653e363dfd9b6d630739534ba929f1bafcab5ae9320b96459ba5e8694b10e0397f4e8b4591fe393d6c2d9a8ec5f176c34cc919fdea8ace2472972db18581} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0e8f26c8, StatelessResetToken: 0x0844f20f6d43cc56868cebc34443cd64} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3f652250, StatelessResetToken: 0x670a5ce0f8e6a568add212dcc640fba6} 2025/04/30 08:47:57 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:57 server -> Sending packet 4 (1065 bytes) for connection 200a88a57384366248c6834bf88e731c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:57 server Short Header{DestConnectionID: eb1bdf07bbfc5d2ca402cfdc83948e37722702c5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:57 server <- Reading packet 5 (67 bytes) for connection f6fe7208, 1-RTT 2025/04/30 08:47:57 server Short Header{DestConnectionID: f6fe7208, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:57 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 136µs} 2025/04/30 08:47:57 server newly acked packets (1): [3] 2025/04/30 08:47:57 server updated RTT: 33.926ms (σ: 13.494ms) 2025/04/30 08:47:57 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:47:57 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: efac32f82bf7d7a63f2208336ea8330728d4dc7d, StatelessResetToken: 0x87c826e9cb137caf3078bc36fe6df618} 2025/04/30 08:47:57 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:57 server Sending ACK because the ACK timer expired. 2025/04/30 08:47:57 server -> Sending packet 5 (45 bytes) for connection 200a88a57384366248c6834bf88e731c, 1-RTT (ECN: Not-ECT) 2025/04/30 08:47:57 server Short Header{DestConnectionID: eb1bdf07bbfc5d2ca402cfdc83948e37722702c5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:57 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 25.383592ms} 2025/04/30 08:47:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:57 server -> Sending packet 7 (1065 bytes) for connection 200a88a57384366248c6834bf88e731c, 1-RTT (ECN: Not-ECT) 2025/04/30 08:47:57 server Short Header{DestConnectionID: eb1bdf07bbfc5d2ca402cfdc83948e37722702c5, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:57 server -> Sending packet 8 (1065 bytes) for connection 200a88a57384366248c6834bf88e731c, 1-RTT (ECN: Not-ECT) 2025/04/30 08:47:57 server Short Header{DestConnectionID: eb1bdf07bbfc5d2ca402cfdc83948e37722702c5, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:57 server <- Reading packet 6 (32 bytes) for connection f6fe7208, 1-RTT 2025/04/30 08:47:57 server Short Header{DestConnectionID: f6fe7208, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:57 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:47:57 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:47:57 Replacing connection for connection IDs [b292af54 f6fe7208 947e4212 3f652250 0e8f26c8 8fec9067] with a closed connection. 2025/04/30 08:47:57 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:47:57 server Connection 200a88a57384366248c6834bf88e731c closed. 2025/04/30 08:47:57 server <- Received Initial packet. 2025/04/30 08:47:57 Created qlog file: /logs/qlog/221ff4e125358edac835174ebb267085.sqlog 2025/04/30 08:47:57 server Changing connection ID to 1a0c18f3. 2025/04/30 08:47:57 Adding connection IDs 221ff4e125358edac835174ebb267085 and 1a0c18f3 for a new connection. 2025/04/30 08:47:57 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:47:57 server <- Reading packet 0 (333 bytes) for connection 221ff4e125358edac835174ebb267085, Initial 2025/04/30 08:47:57 server Long Header{Type: Initial, DestConnectionID: 221ff4e125358edac835174ebb267085, SrcConnectionID: 47aaccb2a2a29cebeb676436097747f9104567ff, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:47:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:47:57 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:57 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:57 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:57 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 47aaccb2a2a29cebeb676436097747f9104567ff, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:47:57 Adding connection ID 486a1125. 2025/04/30 08:47:57 Adding connection ID 32504fef. 2025/04/30 08:47:57 Adding connection ID 83f98d87. 2025/04/30 08:47:57 Adding connection ID 2f1a1450. 2025/04/30 08:47:57 Adding connection ID f03a4002. 2025/04/30 08:47:57 server coalesced packet has different destination connection ID: 00000000, expected 221ff4e125358edac835174ebb267085 2025/04/30 08:47:57 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 221ff4e125358edac835174ebb267085 2025/04/30 08:47:57 server Long Header{Type: Initial, DestConnectionID: 47aaccb2a2a29cebeb676436097747f9104567ff, SrcConnectionID: 1a0c18f3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 322, Version: v1} 2025/04/30 08:47:57 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:47:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:57 server Long Header{Type: Handshake, DestConnectionID: 47aaccb2a2a29cebeb676436097747f9104567ff, SrcConnectionID: 1a0c18f3, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 08:47:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 08:47:57 server Short Header{DestConnectionID: 47aaccb2a2a29cebeb676436097747f9104567ff, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 486a1125, StatelessResetToken: 0x22db6c98b0a9a49c49b09c3196d8b9ad} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2f1a1450, StatelessResetToken: 0xde22ca770cb7d82b548b3136cd716944} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 83f98d87, StatelessResetToken: 0x0e6bfd33fa2a23d2dd4436437eaf2865} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 32504fef, StatelessResetToken: 0x9ce98525715c7491bdbdf31d39102341} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f03a4002, StatelessResetToken: 0xadd5dcf7c68f8a825edf71c4be0a996c} 2025/04/30 08:47:57 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:57 server -> Sending packet 1 (1280 bytes) for connection 221ff4e125358edac835174ebb267085, Initial 2025/04/30 08:47:57 server Long Header{Type: Initial, DestConnectionID: 47aaccb2a2a29cebeb676436097747f9104567ff, SrcConnectionID: 1a0c18f3, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:47:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:57 server -> Sending packet 2 (1280 bytes) for connection 221ff4e125358edac835174ebb267085, Initial 2025/04/30 08:47:57 server Long Header{Type: Initial, DestConnectionID: 47aaccb2a2a29cebeb676436097747f9104567ff, SrcConnectionID: 1a0c18f3, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:47:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:57 server Canceling loss detection timer. 2025/04/30 08:47:57 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:47:57 Tracking 14 connection IDs and 0 reset tokens. 2025/04/30 08:47:57 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:47:57 server <- Reading packet 1 (56 bytes) for connection 1a0c18f3, Initial 2025/04/30 08:47:57 server Long Header{Type: Initial, DestConnectionID: 1a0c18f3, SrcConnectionID: 47aaccb2a2a29cebeb676436097747f9104567ff, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:57 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 200µs} 2025/04/30 08:47:57 server newly acked packets (1): [2] 2025/04/30 08:47:57 server updated RTT: 34.162743ms (σ: 17.081371ms) 2025/04/30 08:47:57 server coalesced packet has different destination connection ID: 00000000, expected 1a0c18f3 2025/04/30 08:47:57 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:47:57 server -> Sending packet 1 (765 bytes) for connection 221ff4e125358edac835174ebb267085, Handshake 2025/04/30 08:47:57 server Long Header{Type: Handshake, DestConnectionID: 47aaccb2a2a29cebeb676436097747f9104567ff, SrcConnectionID: 1a0c18f3, PacketNumber: 1, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 08:47:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 08:47:57 server -> Sending packet 2 (765 bytes) for connection 221ff4e125358edac835174ebb267085, Handshake 2025/04/30 08:47:57 server Long Header{Type: Handshake, DestConnectionID: 47aaccb2a2a29cebeb676436097747f9104567ff, SrcConnectionID: 1a0c18f3, PacketNumber: 2, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 08:47:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 08:47:57 server Parsed a coalesced packet. Part 1: 95 bytes. Remaining: 164 bytes. 2025/04/30 08:47:57 server <- Reading packet 2 (95 bytes) for connection 1a0c18f3, Handshake 2025/04/30 08:47:57 server Long Header{Type: Handshake, DestConnectionID: 1a0c18f3, SrcConnectionID: 47aaccb2a2a29cebeb676436097747f9104567ff, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:47:57 server Dropping Initial keys. 2025/04/30 08:47:57 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 456µs} 2025/04/30 08:47:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:57 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:57 Retiring connection ID 221ff4e125358edac835174ebb267085 in 5s. 2025/04/30 08:47:57 server Dropping Handshake keys. 2025/04/30 08:47:57 server <- Reading packet 3 (164 bytes) for connection 1a0c18f3, 1-RTT 2025/04/30 08:47:57 server Short Header{DestConnectionID: 1a0c18f3, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:57 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9393766ed58453ad3386026acef6e46a5cf12a97, StatelessResetToken: 0x39a0224f05281a32b43f0f2ce5008448} 2025/04/30 08:47:57 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aa260c942bc073b28952753caa1df875381ca63e, StatelessResetToken: 0xbe9ea93cc7bf426555efcca73ea071b4} 2025/04/30 08:47:57 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4a8d59e972e67605d19d29a39d718823b745a786, StatelessResetToken: 0x36d31c0d6fc51f174e616349bd30fdd9} 2025/04/30 08:47:57 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:57 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:57 server -> Sending packet 2 (398 bytes) for connection 221ff4e125358edac835174ebb267085, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:57 Received request: GET /mvfzrvjrdp 2025/04/30 08:47:57 server Short Header{DestConnectionID: 9393766ed58453ad3386026acef6e46a5cf12a97, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:57 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 397.183µs} 2025/04/30 08:47:57 server -> &wire.NewTokenFrame{Token: 0xc51a9d107e2606ccfe4c7398f8c3e38b347bc1acd71e209def9f529350656e6fb5ad9bccbb52258ed952e2c3f86e8040306454745d9685a54bb20afe039a7e002baa11e08765d30d0a1ad1381b8d3a0eba2b0992df6c} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2f1a1450, StatelessResetToken: 0xde22ca770cb7d82b548b3136cd716944} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f03a4002, StatelessResetToken: 0xadd5dcf7c68f8a825edf71c4be0a996c} 2025/04/30 08:47:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 32504fef, StatelessResetToken: 0x9ce98525715c7491bdbdf31d39102341} 2025/04/30 08:47:57 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 83f98d87, StatelessResetToken: 0x0e6bfd33fa2a23d2dd4436437eaf2865} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 486a1125, StatelessResetToken: 0x22db6c98b0a9a49c49b09c3196d8b9ad} 2025/04/30 08:47:57 server -> Sending packet 3 (393 bytes) for connection 221ff4e125358edac835174ebb267085, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:57 server Short Header{DestConnectionID: 9393766ed58453ad3386026acef6e46a5cf12a97, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f03a4002, StatelessResetToken: 0xadd5dcf7c68f8a825edf71c4be0a996c} 2025/04/30 08:47:57 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 32504fef, StatelessResetToken: 0x9ce98525715c7491bdbdf31d39102341} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 486a1125, StatelessResetToken: 0x22db6c98b0a9a49c49b09c3196d8b9ad} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 83f98d87, StatelessResetToken: 0x0e6bfd33fa2a23d2dd4436437eaf2865} 2025/04/30 08:47:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2f1a1450, StatelessResetToken: 0xde22ca770cb7d82b548b3136cd716944} 2025/04/30 08:47:57 server -> &wire.NewTokenFrame{Token: 0xc51a9d107e2606ccfe4c7398f8c3e38b347bc1acd71e209def9f529350656e6fb5ad9bccbb52258ed952e2c3f86e8040306454745d9685a54bb20afe039a7e002baa11e08765d30d0a1ad1381b8d3a0eba2b0992df6c} 2025/04/30 08:47:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:57 server -> Sending packet 4 (1065 bytes) for connection 221ff4e125358edac835174ebb267085, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:57 server Short Header{DestConnectionID: 9393766ed58453ad3386026acef6e46a5cf12a97, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:57 server <- Reading packet 5 (32 bytes) for connection 1a0c18f3, 1-RTT 2025/04/30 08:47:57 server Short Header{DestConnectionID: 1a0c18f3, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:57 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:47:57 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:47:57 Replacing connection for connection IDs [1a0c18f3 486a1125 32504fef 83f98d87 2f1a1450 f03a4002] with a closed connection. 2025/04/30 08:47:57 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:47:57 server Connection 221ff4e125358edac835174ebb267085 closed. 2025/04/30 08:47:59 Tracking 14 connection IDs and 0 reset tokens. 2025/04/30 08:48:00 server <- Received Initial packet. 2025/04/30 08:48:00 Created qlog file: /logs/qlog/6af7da8f64db25aa3e6691377d7d3a59.sqlog 2025/04/30 08:48:00 server Changing connection ID to a7239102. 2025/04/30 08:48:00 Adding connection IDs 6af7da8f64db25aa3e6691377d7d3a59 and a7239102 for a new connection. 2025/04/30 08:48:00 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:00 server <- Reading packet 0 (333 bytes) for connection 6af7da8f64db25aa3e6691377d7d3a59, Initial 2025/04/30 08:48:00 server Long Header{Type: Initial, DestConnectionID: 6af7da8f64db25aa3e6691377d7d3a59, SrcConnectionID: 0efb6a90e96c53a61b603a8a0892414a1484271b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:00 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:00 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:00 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:00 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:00 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0efb6a90e96c53a61b603a8a0892414a1484271b, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:00 Adding connection ID 8197a5ba. 2025/04/30 08:48:00 Adding connection ID 655df05e. 2025/04/30 08:48:00 Adding connection ID 9f2205e3. 2025/04/30 08:48:00 Adding connection ID 98d1baf9. 2025/04/30 08:48:00 Adding connection ID 0efd68a5. 2025/04/30 08:48:00 server coalesced packet has different destination connection ID: 00000000, expected 6af7da8f64db25aa3e6691377d7d3a59 2025/04/30 08:48:00 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6af7da8f64db25aa3e6691377d7d3a59 2025/04/30 08:48:00 server Long Header{Type: Initial, DestConnectionID: 0efb6a90e96c53a61b603a8a0892414a1484271b, SrcConnectionID: a7239102, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 313, Version: v1} 2025/04/30 08:48:00 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:00 server Long Header{Type: Handshake, DestConnectionID: 0efb6a90e96c53a61b603a8a0892414a1484271b, SrcConnectionID: a7239102, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 08:48:00 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 08:48:00 server Short Header{DestConnectionID: 0efb6a90e96c53a61b603a8a0892414a1484271b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 98d1baf9, StatelessResetToken: 0x05f9dfe58edcc6ec3848bf1b7533385e} 2025/04/30 08:48:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 0efd68a5, StatelessResetToken: 0x9eb972ec41e281246dbc84a4986c3a2b} 2025/04/30 08:48:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 655df05e, StatelessResetToken: 0x59b8253e7b61426fcba4c1c8a174455e} 2025/04/30 08:48:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9f2205e3, StatelessResetToken: 0xbd895d52149d307a52e9751639e54477} 2025/04/30 08:48:00 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8197a5ba, StatelessResetToken: 0xdd5a01cc8a1699f7534cec2077ebc54d} 2025/04/30 08:48:01 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:48:01 server -> Sending packet 1 (1280 bytes) for connection 6af7da8f64db25aa3e6691377d7d3a59, Initial 2025/04/30 08:48:01 server Long Header{Type: Initial, DestConnectionID: 0efb6a90e96c53a61b603a8a0892414a1484271b, SrcConnectionID: a7239102, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:01 server -> Sending packet 2 (1280 bytes) for connection 6af7da8f64db25aa3e6691377d7d3a59, Initial 2025/04/30 08:48:01 server Long Header{Type: Initial, DestConnectionID: 0efb6a90e96c53a61b603a8a0892414a1484271b, SrcConnectionID: a7239102, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:01 server Canceling loss detection timer. 2025/04/30 08:48:01 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:48:01 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:48:01 server <- Reading packet 1 (56 bytes) for connection a7239102, Initial 2025/04/30 08:48:01 server Long Header{Type: Initial, DestConnectionID: a7239102, SrcConnectionID: 0efb6a90e96c53a61b603a8a0892414a1484271b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:01 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 296µs} 2025/04/30 08:48:01 server coalesced packet has different destination connection ID: 00000000, expected a7239102 2025/04/30 08:48:01 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:48:01 server <- Reading packet 2 (56 bytes) for connection a7239102, Initial 2025/04/30 08:48:01 server Long Header{Type: Initial, DestConnectionID: a7239102, SrcConnectionID: 0efb6a90e96c53a61b603a8a0892414a1484271b, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:01 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 72µs} 2025/04/30 08:48:01 server newly acked packets (1): [2] 2025/04/30 08:48:01 server updated RTT: 34.148683ms (σ: 17.074341ms) 2025/04/30 08:48:01 server coalesced packet has different destination connection ID: 00000000, expected a7239102 2025/04/30 08:48:01 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:48:01 server -> Sending packet 1 (774 bytes) for connection 6af7da8f64db25aa3e6691377d7d3a59, Handshake 2025/04/30 08:48:01 server Long Header{Type: Handshake, DestConnectionID: 0efb6a90e96c53a61b603a8a0892414a1484271b, SrcConnectionID: a7239102, PacketNumber: 1, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 08:48:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 08:48:01 server -> Sending packet 2 (774 bytes) for connection 6af7da8f64db25aa3e6691377d7d3a59, Handshake 2025/04/30 08:48:01 server Long Header{Type: Handshake, DestConnectionID: 0efb6a90e96c53a61b603a8a0892414a1484271b, SrcConnectionID: a7239102, PacketNumber: 2, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 08:48:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 08:48:01 server Parsed a coalesced packet. Part 1: 95 bytes. Remaining: 164 bytes. 2025/04/30 08:48:01 server <- Reading packet 3 (95 bytes) for connection a7239102, Handshake 2025/04/30 08:48:01 server Long Header{Type: Handshake, DestConnectionID: a7239102, SrcConnectionID: 0efb6a90e96c53a61b603a8a0892414a1484271b, PacketNumber: 3, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:01 server Dropping Initial keys. 2025/04/30 08:48:01 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 472µs} 2025/04/30 08:48:01 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:01 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:01 Retiring connection ID 6af7da8f64db25aa3e6691377d7d3a59 in 5s. 2025/04/30 08:48:01 server Dropping Handshake keys. 2025/04/30 08:48:01 server <- Reading packet 4 (164 bytes) for connection a7239102, 1-RTT 2025/04/30 08:48:01 server Short Header{DestConnectionID: a7239102, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:01 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: fca29571512cd5842f0410d7531472654511aa16, StatelessResetToken: 0xdc7290add0836b27fd0dbaa8d31d85ce} 2025/04/30 08:48:01 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cb3a4625b93555879dd26294d03f4a0ca0cb47bf, StatelessResetToken: 0xecd74f58c585096d50942e240b565758} 2025/04/30 08:48:01 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f8eefba87d9d838b5679fc7a85d939255e03882d, StatelessResetToken: 0x71e14bad6b3fb54b4947d3b95d3df32c} 2025/04/30 08:48:01 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:01 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:01 server Dropping %!s(logging.PacketType=1) packet (55 bytes) because we already dropped the keys. 2025/04/30 08:48:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:01 server -> Sending packet 2 (398 bytes) for connection 6af7da8f64db25aa3e6691377d7d3a59, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:01 server Short Header{DestConnectionID: fca29571512cd5842f0410d7531472654511aa16, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:01 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 399.243µs} 2025/04/30 08:48:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 655df05e, StatelessResetToken: 0x59b8253e7b61426fcba4c1c8a174455e} 2025/04/30 08:48:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 0efd68a5, StatelessResetToken: 0x9eb972ec41e281246dbc84a4986c3a2b} 2025/04/30 08:48:01 server -> &wire.NewTokenFrame{Token: 0x8667845fdaf3b55d37f3aca2908510874196847954678127b3b993aa848fb50493064bf6a470877f85200b8633cd1443f63fc80842e199c2193e43f0358ddd95ac4ee9bf85cbfa1d81b44a29dba93ef89a3776f1b591} 2025/04/30 08:48:01 Received request: GET /ggsmwtpxin 2025/04/30 08:48:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8197a5ba, StatelessResetToken: 0xdd5a01cc8a1699f7534cec2077ebc54d} 2025/04/30 08:48:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9f2205e3, StatelessResetToken: 0xbd895d52149d307a52e9751639e54477} 2025/04/30 08:48:01 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 98d1baf9, StatelessResetToken: 0x05f9dfe58edcc6ec3848bf1b7533385e} 2025/04/30 08:48:01 server -> Sending packet 3 (393 bytes) for connection 6af7da8f64db25aa3e6691377d7d3a59, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:01 server Short Header{DestConnectionID: fca29571512cd5842f0410d7531472654511aa16, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 655df05e, StatelessResetToken: 0x59b8253e7b61426fcba4c1c8a174455e} 2025/04/30 08:48:01 server -> &wire.NewTokenFrame{Token: 0x8667845fdaf3b55d37f3aca2908510874196847954678127b3b993aa848fb50493064bf6a470877f85200b8633cd1443f63fc80842e199c2193e43f0358ddd95ac4ee9bf85cbfa1d81b44a29dba93ef89a3776f1b591} 2025/04/30 08:48:01 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:01 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 0efd68a5, StatelessResetToken: 0x9eb972ec41e281246dbc84a4986c3a2b} 2025/04/30 08:48:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8197a5ba, StatelessResetToken: 0xdd5a01cc8a1699f7534cec2077ebc54d} 2025/04/30 08:48:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 98d1baf9, StatelessResetToken: 0x05f9dfe58edcc6ec3848bf1b7533385e} 2025/04/30 08:48:01 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9f2205e3, StatelessResetToken: 0xbd895d52149d307a52e9751639e54477} 2025/04/30 08:48:01 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:01 server -> Sending packet 4 (1065 bytes) for connection 6af7da8f64db25aa3e6691377d7d3a59, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:01 server Short Header{DestConnectionID: fca29571512cd5842f0410d7531472654511aa16, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:01 server <- Reading packet 6 (32 bytes) for connection a7239102, 1-RTT 2025/04/30 08:48:01 server Short Header{DestConnectionID: a7239102, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:01 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:01 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:01 Replacing connection for connection IDs [9f2205e3 98d1baf9 0efd68a5 a7239102 8197a5ba 655df05e] with a closed connection. 2025/04/30 08:48:01 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:01 server Connection 6af7da8f64db25aa3e6691377d7d3a59 closed. 2025/04/30 08:48:01 Tracking 21 connection IDs and 0 reset tokens. 2025/04/30 08:48:02 Removing connection ID 200a88a57384366248c6834bf88e731c after it has been retired. 2025/04/30 08:48:02 Removing connection IDs [b292af54 f6fe7208 947e4212 3f652250 0e8f26c8 8fec9067] for a closed connection after it has been retired. 2025/04/30 08:48:02 Removing connection ID 221ff4e125358edac835174ebb267085 after it has been retired. 2025/04/30 08:48:02 Removing connection IDs [1a0c18f3 486a1125 32504fef 83f98d87 2f1a1450 f03a4002] for a closed connection after it has been retired. 2025/04/30 08:48:03 Tracking 7 connection IDs and 0 reset tokens. 2025/04/30 08:48:04 server <- Received Initial packet. 2025/04/30 08:48:04 Created qlog file: /logs/qlog/5787384c78d9817f76efa18635a79eb9.sqlog 2025/04/30 08:48:04 server Changing connection ID to c9d62183. 2025/04/30 08:48:04 Adding connection IDs 5787384c78d9817f76efa18635a79eb9 and c9d62183 for a new connection. 2025/04/30 08:48:04 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:04 server <- Reading packet 0 (333 bytes) for connection 5787384c78d9817f76efa18635a79eb9, Initial 2025/04/30 08:48:04 server Long Header{Type: Initial, DestConnectionID: 5787384c78d9817f76efa18635a79eb9, SrcConnectionID: ecfe9b4ee0219419728027d2e6c11fa8c820e104, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:04 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:04 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:04 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:04 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: ecfe9b4ee0219419728027d2e6c11fa8c820e104, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:04 Adding connection ID b0e8332d. 2025/04/30 08:48:04 Adding connection ID d2b30e53. 2025/04/30 08:48:04 Adding connection ID 8bc3d607. 2025/04/30 08:48:04 Adding connection ID bfd58cae. 2025/04/30 08:48:04 Adding connection ID 7f421b4e. 2025/04/30 08:48:04 server coalesced packet has different destination connection ID: 00000000, expected 5787384c78d9817f76efa18635a79eb9 2025/04/30 08:48:04 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5787384c78d9817f76efa18635a79eb9 2025/04/30 08:48:04 server Long Header{Type: Initial, DestConnectionID: ecfe9b4ee0219419728027d2e6c11fa8c820e104, SrcConnectionID: c9d62183, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 310, Version: v1} 2025/04/30 08:48:04 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:04 server Long Header{Type: Handshake, DestConnectionID: ecfe9b4ee0219419728027d2e6c11fa8c820e104, SrcConnectionID: c9d62183, PacketNumber: 0, PacketNumberLen: 2, Length: 744, Version: v1} 2025/04/30 08:48:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 08:48:04 server Short Header{DestConnectionID: ecfe9b4ee0219419728027d2e6c11fa8c820e104, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d2b30e53, StatelessResetToken: 0x796036b621edc434e42082e1b281f35d} 2025/04/30 08:48:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b0e8332d, StatelessResetToken: 0xa40b24264b3ddd33d4625b128f88a9e6} 2025/04/30 08:48:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 7f421b4e, StatelessResetToken: 0x1281aee036609d4e4d4cd8a6fbab3e16} 2025/04/30 08:48:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bfd58cae, StatelessResetToken: 0x00bb25bdc0a0f61b7c6a71f617379001} 2025/04/30 08:48:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8bc3d607, StatelessResetToken: 0x53a344ee3ee68b7a0d8e7c60039175ff} 2025/04/30 08:48:04 server <- Reading packet 4 (96 bytes) for connection c9d62183, Handshake 2025/04/30 08:48:04 server Long Header{Type: Handshake, DestConnectionID: c9d62183, SrcConnectionID: ecfe9b4ee0219419728027d2e6c11fa8c820e104, PacketNumber: 4, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:04 server Dropping Initial keys. 2025/04/30 08:48:04 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 103.84ms} 2025/04/30 08:48:04 server newly acked packets (1): [0] 2025/04/30 08:48:04 server updated RTT: 136.200445ms (σ: 68.100222ms) 2025/04/30 08:48:04 server Canceling loss detection timer. 2025/04/30 08:48:04 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:04 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:04 Retiring connection ID 5787384c78d9817f76efa18635a79eb9 in 5s. 2025/04/30 08:48:04 server Dropping Handshake keys. 2025/04/30 08:48:04 server -> Sending packet 1 (271 bytes) for connection 5787384c78d9817f76efa18635a79eb9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:04 server Short Header{DestConnectionID: ecfe9b4ee0219419728027d2e6c11fa8c820e104, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:04 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:04 server -> &wire.NewTokenFrame{Token: 0x6dcfc969f9c0c17a7fb915f78d8220c7ea745658e8a9ce260be86587e32945f4e205561c62fbda460a5250525586c09872f4314ebedbe75af234d96d506be8883c72a460895a29d8454d5599596c75b94b5e8b1cf447} 2025/04/30 08:48:04 server <- Reading packet 5 (172 bytes) for connection c9d62183, 1-RTT 2025/04/30 08:48:04 server Short Header{DestConnectionID: c9d62183, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:04 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 258.056ms} 2025/04/30 08:48:04 server newly acked packets (1): [0] 2025/04/30 08:48:04 server updated RTT: 152.394ms (σ: 83.463ms) 2025/04/30 08:48:04 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f81e6520746215382f6def22f8a2332fed80e8c, StatelessResetToken: 0xcd3aabf8c40f9a1b578f9bb5acdfb8ea} 2025/04/30 08:48:04 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3a185f1fd13ade2123bc6d485faa1ca8b616c6a9, StatelessResetToken: 0xfbb121af819c98107aecc7d6c4c4cda6} 2025/04/30 08:48:04 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 931994267f0bdcdc827045b26e4176ee83b663d1, StatelessResetToken: 0x4a1c6e897f8b37f1dca58003c3b3966c} 2025/04/30 08:48:04 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:04 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:04 server <- Reading packet 6 (31 bytes) for connection c9d62183, 1-RTT 2025/04/30 08:48:04 server Short Header{DestConnectionID: c9d62183, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:04 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 258.256ms} 2025/04/30 08:48:04 server <- &wire.PingFrame{} 2025/04/30 08:48:04 server -> Sending packet 2 (46 bytes) for connection 5787384c78d9817f76efa18635a79eb9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:04 server Short Header{DestConnectionID: 5f81e6520746215382f6def22f8a2332fed80e8c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:04 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 241.701µs} 2025/04/30 08:48:04 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:04 Received request: GET /xhphsmwojl 2025/04/30 08:48:04 server -> Sending packet 3 (1065 bytes) for connection 5787384c78d9817f76efa18635a79eb9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:04 server Short Header{DestConnectionID: 5f81e6520746215382f6def22f8a2332fed80e8c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:04 server Dropping %!s(logging.PacketType=1) packet (98 bytes) because we already dropped the keys. 2025/04/30 08:48:04 server Dropping %!s(logging.PacketType=1) packet (59 bytes) because we already dropped the keys. 2025/04/30 08:48:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:04 server -> Sending packet 5 (271 bytes) for connection 5787384c78d9817f76efa18635a79eb9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:04 server Short Header{DestConnectionID: 5f81e6520746215382f6def22f8a2332fed80e8c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:04 server -> &wire.NewTokenFrame{Token: 0x6dcfc969f9c0c17a7fb915f78d8220c7ea745658e8a9ce260be86587e32945f4e205561c62fbda460a5250525586c09872f4314ebedbe75af234d96d506be8883c72a460895a29d8454d5599596c75b94b5e8b1cf447} 2025/04/30 08:48:04 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:04 server Skipping packet number 4 2025/04/30 08:48:04 server -> Sending packet 6 (41 bytes) for connection 5787384c78d9817f76efa18635a79eb9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:04 server Short Header{DestConnectionID: 5f81e6520746215382f6def22f8a2332fed80e8c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:04 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:04 server <- Reading packet 9 (69 bytes) for connection c9d62183, 1-RTT 2025/04/30 08:48:04 server Short Header{DestConnectionID: c9d62183, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:04 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 72µs} 2025/04/30 08:48:04 server newly acked packets (2): [5 6] 2025/04/30 08:48:04 server updated RTT: 137.302ms (σ: 92.78ms) 2025/04/30 08:48:04 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:04 server lost packet 3 (time threshold) 2025/04/30 08:48:04 server Canceling loss detection timer. 2025/04/30 08:48:04 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 2bc1d2d386e09ec2a1140a7d1636b32a13251e7e, StatelessResetToken: 0x9b4082a91c55872e6f4d0f136a596ba9} 2025/04/30 08:48:04 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:48:04 server -> Sending packet 7 (1315 bytes) for connection 5787384c78d9817f76efa18635a79eb9, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:04 server Short Header{DestConnectionID: 5f81e6520746215382f6def22f8a2332fed80e8c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:04 server -> &wire.PingFrame{} 2025/04/30 08:48:04 server -> Sending packet 8 (1072 bytes) for connection 5787384c78d9817f76efa18635a79eb9, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:04 server Short Header{DestConnectionID: 5f81e6520746215382f6def22f8a2332fed80e8c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:04 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 5}}, DelayTime: 198.111µs} 2025/04/30 08:48:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:05 server <- Reading packet 10 (32 bytes) for connection c9d62183, 1-RTT 2025/04/30 08:48:05 server Short Header{DestConnectionID: c9d62183, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:05 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:05 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:05 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:05 Replacing connection for connection IDs [c9d62183 b0e8332d d2b30e53 8bc3d607 bfd58cae 7f421b4e] with a closed connection. 2025/04/30 08:48:05 server Connection 5787384c78d9817f76efa18635a79eb9 closed. 2025/04/30 08:48:05 server <- Received Initial packet. 2025/04/30 08:48:05 Created qlog file: /logs/qlog/ee76bf3598dd514b178663581778a2e3.sqlog 2025/04/30 08:48:05 server Changing connection ID to 14670ec4. 2025/04/30 08:48:05 Adding connection IDs ee76bf3598dd514b178663581778a2e3 and 14670ec4 for a new connection. 2025/04/30 08:48:05 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:05 server <- Reading packet 0 (333 bytes) for connection ee76bf3598dd514b178663581778a2e3, Initial 2025/04/30 08:48:05 server Long Header{Type: Initial, DestConnectionID: ee76bf3598dd514b178663581778a2e3, SrcConnectionID: 3dfb3fdd6b7c52b547174cc3735e54c64f4e12ba, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:05 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:05 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:05 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:05 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 3dfb3fdd6b7c52b547174cc3735e54c64f4e12ba, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:05 Adding connection ID d36bec35. 2025/04/30 08:48:05 Adding connection ID 786f53e5. 2025/04/30 08:48:05 Adding connection ID aa8eccd2. 2025/04/30 08:48:05 Adding connection ID d1cf2a99. 2025/04/30 08:48:05 Adding connection ID f5bb7249. 2025/04/30 08:48:05 server coalesced packet has different destination connection ID: 00000000, expected ee76bf3598dd514b178663581778a2e3 2025/04/30 08:48:05 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ee76bf3598dd514b178663581778a2e3 2025/04/30 08:48:05 server Long Header{Type: Initial, DestConnectionID: 3dfb3fdd6b7c52b547174cc3735e54c64f4e12ba, SrcConnectionID: 14670ec4, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 318, Version: v1} 2025/04/30 08:48:05 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:05 server Long Header{Type: Handshake, DestConnectionID: 3dfb3fdd6b7c52b547174cc3735e54c64f4e12ba, SrcConnectionID: 14670ec4, PacketNumber: 0, PacketNumberLen: 2, Length: 736, Version: v1} 2025/04/30 08:48:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 08:48:05 server Short Header{DestConnectionID: 3dfb3fdd6b7c52b547174cc3735e54c64f4e12ba, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f5bb7249, StatelessResetToken: 0xdedd00b0fd8b7c3b20c5d044c1649b91} 2025/04/30 08:48:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d1cf2a99, StatelessResetToken: 0x47fbc3f612f3b5f389edaa58b089ce99} 2025/04/30 08:48:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 786f53e5, StatelessResetToken: 0xf1dfea746af5092c16ee077284b318af} 2025/04/30 08:48:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d36bec35, StatelessResetToken: 0x5c8787ed715e5133b2491af04cc1ae84} 2025/04/30 08:48:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: aa8eccd2, StatelessResetToken: 0x13f126c8356e0dee80ba55b5f85fdc54} 2025/04/30 08:48:05 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:05 server <- Reading packet 1 (57 bytes) for connection 14670ec4, Initial 2025/04/30 08:48:05 server Long Header{Type: Initial, DestConnectionID: 14670ec4, SrcConnectionID: 3dfb3fdd6b7c52b547174cc3735e54c64f4e12ba, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:05 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 664µs} 2025/04/30 08:48:05 server newly acked packets (1): [0] 2025/04/30 08:48:05 server updated RTT: 33.735484ms (σ: 16.867742ms) 2025/04/30 08:48:05 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:05 server <- Reading packet 2 (95 bytes) for connection 14670ec4, Handshake 2025/04/30 08:48:05 server Long Header{Type: Handshake, DestConnectionID: 14670ec4, SrcConnectionID: 3dfb3fdd6b7c52b547174cc3735e54c64f4e12ba, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:05 server Dropping Initial keys. 2025/04/30 08:48:05 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 464µs} 2025/04/30 08:48:05 server newly acked packets (1): [0] 2025/04/30 08:48:05 server updated RTT: 33.735ms (σ: 12.65ms) 2025/04/30 08:48:05 server Canceling loss detection timer. 2025/04/30 08:48:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:05 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:05 Retiring connection ID ee76bf3598dd514b178663581778a2e3 in 5s. 2025/04/30 08:48:05 server Dropping Handshake keys. 2025/04/30 08:48:05 server <- Reading packet 3 (1198 bytes) for connection 14670ec4, 1-RTT 2025/04/30 08:48:05 server Short Header{DestConnectionID: 14670ec4, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:05 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200µs} 2025/04/30 08:48:05 server newly acked packets (1): [0] 2025/04/30 08:48:05 server updated RTT: 33.735ms (σ: 9.487ms) 2025/04/30 08:48:05 server Canceling loss detection timer. 2025/04/30 08:48:05 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, StatelessResetToken: 0xfa002d317bfaea24bb944847194c4f75} 2025/04/30 08:48:05 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6477d36d9c22606eca5be3b84dbbee384cef4e80, StatelessResetToken: 0xe86ec1ff99f0911e4102de6e733f5b33} 2025/04/30 08:48:05 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0f51c8d4d13200ace4f3243be93ea9d0264718df, StatelessResetToken: 0x91f84a2d0de0e7c72dc40c542c4131ff} 2025/04/30 08:48:05 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:05 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:05 server -> Sending packet 1 (278 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:05 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:05 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 440.222µs} 2025/04/30 08:48:05 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:05 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:05 server -> &wire.NewTokenFrame{Token: 0x1445b6afe3f7e5e39f12c8b173d97919768d58f0d27a95afc8b838438d625179bc4e7ea9016ee47d61d58d80298dbb12e5d500ea145e25c844fbe577c6456e295b7a57df93aa9120d9a652c4c50346ed0a7a2f470b94} 2025/04/30 08:48:05 Received request: GET /upfraqztfb 2025/04/30 08:48:05 server -> Sending packet 2 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:05 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:05 server <- Reading packet 4 (67 bytes) for connection 14670ec4, 1-RTT 2025/04/30 08:48:05 server Short Header{DestConnectionID: 14670ec4, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:05 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 160µs} 2025/04/30 08:48:05 server newly acked packets (1): [1] 2025/04/30 08:48:05 server updated RTT: 33.423ms (σ: 7.737ms) 2025/04/30 08:48:05 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:05 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 9027081f56b0cf0701d1a42c2deb5274bf80162b, StatelessResetToken: 0x9b7c2bcf3622b5b47d1b729d2398593c} 2025/04/30 08:48:05 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:05 server Ignoring all packets below 4. 2025/04/30 08:48:05 server Sending ACK because the ACK timer expired. 2025/04/30 08:48:05 server -> Sending packet 3 (45 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:05 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:05 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 25.393617ms} 2025/04/30 08:48:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:05 server -> Sending packet 5 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:05 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:05 server -> Sending packet 6 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:05 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:48:05 server -> Sending packet 8 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:05 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:05 server -> Sending packet 9 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:05 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:05 server -> Sending packet 10 (1315 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:05 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:05 server -> &wire.PingFrame{} 2025/04/30 08:48:05 Tracking 21 connection IDs and 1 reset tokens. 2025/04/30 08:48:05 server <- Received Initial packet. 2025/04/30 08:48:05 Created qlog file: /logs/qlog/bbcc3330b0f0b8bcdb9819a998b85c10.sqlog 2025/04/30 08:48:05 server Changing connection ID to 08bf35d4. 2025/04/30 08:48:05 Adding connection IDs bbcc3330b0f0b8bcdb9819a998b85c10 and 08bf35d4 for a new connection. 2025/04/30 08:48:05 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:05 server <- Reading packet 0 (333 bytes) for connection bbcc3330b0f0b8bcdb9819a998b85c10, Initial 2025/04/30 08:48:05 server Long Header{Type: Initial, DestConnectionID: bbcc3330b0f0b8bcdb9819a998b85c10, SrcConnectionID: 1da694f5881cff885c7a4f3653a8138434bd5612, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:05 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:05 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:05 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:05 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:05 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 1da694f5881cff885c7a4f3653a8138434bd5612, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:05 Adding connection ID 4fb866f3. 2025/04/30 08:48:05 Adding connection ID 95c947b2. 2025/04/30 08:48:05 Adding connection ID 4ad36b39. 2025/04/30 08:48:05 Adding connection ID 5ffd94b4. 2025/04/30 08:48:05 Adding connection ID 88440555. 2025/04/30 08:48:05 server coalesced packet has different destination connection ID: 00000000, expected bbcc3330b0f0b8bcdb9819a998b85c10 2025/04/30 08:48:05 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection bbcc3330b0f0b8bcdb9819a998b85c10 2025/04/30 08:48:05 server Long Header{Type: Initial, DestConnectionID: 1da694f5881cff885c7a4f3653a8138434bd5612, SrcConnectionID: 08bf35d4, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 324, Version: v1} 2025/04/30 08:48:05 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:05 server Long Header{Type: Handshake, DestConnectionID: 1da694f5881cff885c7a4f3653a8138434bd5612, SrcConnectionID: 08bf35d4, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 08:48:05 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 08:48:05 server Short Header{DestConnectionID: 1da694f5881cff885c7a4f3653a8138434bd5612, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4ad36b39, StatelessResetToken: 0xca6cdc8cff67faafa8af468be8dbf3d7} 2025/04/30 08:48:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 95c947b2, StatelessResetToken: 0x048d42a0add959d7cd50832dc5bc8bb3} 2025/04/30 08:48:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5ffd94b4, StatelessResetToken: 0x6c0e680c620e3d29bcecb705966b0d26} 2025/04/30 08:48:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 88440555, StatelessResetToken: 0x21374827b1fb653a58f86b0fd734045a} 2025/04/30 08:48:05 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4fb866f3, StatelessResetToken: 0x8918b9458ed976d7a05b410819ac659d} 2025/04/30 08:48:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 08:48:05 server -> Sending packet 12 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:05 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:05 server -> Sending packet 13 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:05 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:06 Removing connection ID 6af7da8f64db25aa3e6691377d7d3a59 after it has been retired. 2025/04/30 08:48:06 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:48:06 server -> Sending packet 1 (1280 bytes) for connection bbcc3330b0f0b8bcdb9819a998b85c10, Initial 2025/04/30 08:48:06 server Long Header{Type: Initial, DestConnectionID: 1da694f5881cff885c7a4f3653a8138434bd5612, SrcConnectionID: 08bf35d4, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:06 server -> Sending packet 2 (1280 bytes) for connection bbcc3330b0f0b8bcdb9819a998b85c10, Initial 2025/04/30 08:48:06 server Long Header{Type: Initial, DestConnectionID: 1da694f5881cff885c7a4f3653a8138434bd5612, SrcConnectionID: 08bf35d4, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:06 server Canceling loss detection timer. 2025/04/30 08:48:06 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:48:06 Removing connection IDs [9f2205e3 98d1baf9 0efd68a5 a7239102 8197a5ba 655df05e] for a closed connection after it has been retired. 2025/04/30 08:48:06 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:48:06 server <- Reading packet 1 (56 bytes) for connection 08bf35d4, Initial 2025/04/30 08:48:06 server Long Header{Type: Initial, DestConnectionID: 08bf35d4, SrcConnectionID: 1da694f5881cff885c7a4f3653a8138434bd5612, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:06 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 248µs} 2025/04/30 08:48:06 server coalesced packet has different destination connection ID: 00000000, expected 08bf35d4 2025/04/30 08:48:06 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:48:06 server -> Sending packet 1 (763 bytes) for connection bbcc3330b0f0b8bcdb9819a998b85c10, Handshake 2025/04/30 08:48:06 server Long Header{Type: Handshake, DestConnectionID: 1da694f5881cff885c7a4f3653a8138434bd5612, SrcConnectionID: 08bf35d4, PacketNumber: 1, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 08:48:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 08:48:06 server -> Sending packet 2 (763 bytes) for connection bbcc3330b0f0b8bcdb9819a998b85c10, Handshake 2025/04/30 08:48:06 server Long Header{Type: Handshake, DestConnectionID: 1da694f5881cff885c7a4f3653a8138434bd5612, SrcConnectionID: 08bf35d4, PacketNumber: 2, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 08:48:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 08:48:06 server Parsed a coalesced packet. Part 1: 96 bytes. Remaining: 164 bytes. 2025/04/30 08:48:06 server <- Reading packet 3 (96 bytes) for connection 08bf35d4, Handshake 2025/04/30 08:48:06 server Long Header{Type: Handshake, DestConnectionID: 08bf35d4, SrcConnectionID: 1da694f5881cff885c7a4f3653a8138434bd5612, PacketNumber: 3, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:06 server Dropping Initial keys. 2025/04/30 08:48:06 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 624µs} 2025/04/30 08:48:06 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:06 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:06 Retiring connection ID bbcc3330b0f0b8bcdb9819a998b85c10 in 5s. 2025/04/30 08:48:06 server Dropping Handshake keys. 2025/04/30 08:48:06 server <- Reading packet 4 (164 bytes) for connection 08bf35d4, 1-RTT 2025/04/30 08:48:06 server Short Header{DestConnectionID: 08bf35d4, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:06 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9229028bee8b0d85a692b46a97724f238e9d6130, StatelessResetToken: 0x81d0842d2e82a4e67a892c7a2d015c8a} 2025/04/30 08:48:06 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 794a0c2549d981e365ad8a5d37b2c21f604b6b51, StatelessResetToken: 0xc5c5618560808ea315272ff9469a5372} 2025/04/30 08:48:06 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2a914970031341a50b9d99c29ee0c72eb732ae65, StatelessResetToken: 0x65b8e87a1953ddf13a25f12a492fee6a} 2025/04/30 08:48:06 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:06 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:06 Received request: GET /kygjlnqrpx 2025/04/30 08:48:06 server -> Sending packet 2 (395 bytes) for connection bbcc3330b0f0b8bcdb9819a998b85c10, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:06 server Short Header{DestConnectionID: 9229028bee8b0d85a692b46a97724f238e9d6130, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:06 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 398.295µs} 2025/04/30 08:48:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 95c947b2, StatelessResetToken: 0x048d42a0add959d7cd50832dc5bc8bb3} 2025/04/30 08:48:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4fb866f3, StatelessResetToken: 0x8918b9458ed976d7a05b410819ac659d} 2025/04/30 08:48:06 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:06 server -> &wire.NewTokenFrame{Token: 0x39b7d7ba4b2d5f142d99a6f452cf5ac315aa35ec11055e9f62c7d28a035e7cf79130d8bc090a83c62047baaaffda60839b036b544d3271f48c693c6ae5e04a21745d9f6b8f7a8a15f3b6eb704cc3023c6e0bdb079010} 2025/04/30 08:48:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5ffd94b4, StatelessResetToken: 0x6c0e680c620e3d29bcecb705966b0d26} 2025/04/30 08:48:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:48:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 88440555, StatelessResetToken: 0x21374827b1fb653a58f86b0fd734045a} 2025/04/30 08:48:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4ad36b39, StatelessResetToken: 0xca6cdc8cff67faafa8af468be8dbf3d7} 2025/04/30 08:48:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:06 server -> Sending packet 3 (1280 bytes) for connection bbcc3330b0f0b8bcdb9819a998b85c10, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:06 server Short Header{DestConnectionID: 9229028bee8b0d85a692b46a97724f238e9d6130, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:06 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5ffd94b4, StatelessResetToken: 0x6c0e680c620e3d29bcecb705966b0d26} 2025/04/30 08:48:06 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 95c947b2, StatelessResetToken: 0x048d42a0add959d7cd50832dc5bc8bb3} 2025/04/30 08:48:06 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:48:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4ad36b39, StatelessResetToken: 0xca6cdc8cff67faafa8af468be8dbf3d7} 2025/04/30 08:48:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 88440555, StatelessResetToken: 0x21374827b1fb653a58f86b0fd734045a} 2025/04/30 08:48:06 server -> &wire.NewTokenFrame{Token: 0x39b7d7ba4b2d5f142d99a6f452cf5ac315aa35ec11055e9f62c7d28a035e7cf79130d8bc090a83c62047baaaffda60839b036b544d3271f48c693c6ae5e04a21745d9f6b8f7a8a15f3b6eb704cc3023c6e0bdb079010} 2025/04/30 08:48:06 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4fb866f3, StatelessResetToken: 0x8918b9458ed976d7a05b410819ac659d} 2025/04/30 08:48:06 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 888, Offset + Data length: 888} 2025/04/30 08:48:06 server -> Sending packet 4 (1315 bytes) for connection bbcc3330b0f0b8bcdb9819a998b85c10, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:06 server Short Header{DestConnectionID: 9229028bee8b0d85a692b46a97724f238e9d6130, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:06 server -> &wire.PingFrame{} 2025/04/30 08:48:06 server -> Sending packet 5 (179 bytes) for connection bbcc3330b0f0b8bcdb9819a998b85c10, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:06 server Short Header{DestConnectionID: 9229028bee8b0d85a692b46a97724f238e9d6130, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 888, Data length: 136, Offset + Data length: 1024} 2025/04/30 08:48:06 server <- Reading packet 5 (67 bytes) for connection 08bf35d4, 1-RTT 2025/04/30 08:48:06 server Short Header{DestConnectionID: 08bf35d4, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:06 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 184µs} 2025/04/30 08:48:06 server newly acked packets (1): [3] 2025/04/30 08:48:06 server updated RTT: 32.474014ms (σ: 16.237007ms) 2025/04/30 08:48:06 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:06 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: b10f20dc33312076e05d7b1df2d1c122310e7786, StatelessResetToken: 0x43b2ade8c961c6399fa92ab3dc35fffa} 2025/04/30 08:48:06 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:06 server <- Reading packet 6 (32 bytes) for connection 08bf35d4, 1-RTT 2025/04/30 08:48:06 server Short Header{DestConnectionID: 08bf35d4, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:06 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:06 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:06 Replacing connection for connection IDs [5ffd94b4 88440555 08bf35d4 4fb866f3 95c947b2 4ad36b39] with a closed connection. 2025/04/30 08:48:06 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:06 server Connection bbcc3330b0f0b8bcdb9819a998b85c10 closed. 2025/04/30 08:48:06 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 08:48:06 server -> Sending packet 15 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:06 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:06 server -> Sending packet 16 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:06 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:06 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:07 Tracking 21 connection IDs and 1 reset tokens. 2025/04/30 08:48:08 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 08:48:08 server -> Sending packet 18 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:08 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:08 server -> Sending packet 19 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:08 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:08 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:09 Removing connection ID 5787384c78d9817f76efa18635a79eb9 after it has been retired. 2025/04/30 08:48:09 Tracking 20 connection IDs and 1 reset tokens. 2025/04/30 08:48:10 Removing connection IDs [c9d62183 b0e8332d d2b30e53 8bc3d607 bfd58cae 7f421b4e] for a closed connection after it has been retired. 2025/04/30 08:48:10 Removing connection ID ee76bf3598dd514b178663581778a2e3 after it has been retired. 2025/04/30 08:48:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 08:48:10 server -> Sending packet 21 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:10 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:10 server -> Sending packet 22 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:10 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:11 Removing connection ID bbcc3330b0f0b8bcdb9819a998b85c10 after it has been retired. 2025/04/30 08:48:11 Removing connection IDs [5ffd94b4 88440555 08bf35d4 4fb866f3 95c947b2 4ad36b39] for a closed connection after it has been retired. 2025/04/30 08:48:11 Tracking 6 connection IDs and 1 reset tokens. 2025/04/30 08:48:12 server <- Received Initial packet. 2025/04/30 08:48:12 Created qlog file: /logs/qlog/5b0f5e3ce8bb7a1226dfab7448c0ce04.sqlog 2025/04/30 08:48:12 server Changing connection ID to 79ecade5. 2025/04/30 08:48:12 Adding connection IDs 5b0f5e3ce8bb7a1226dfab7448c0ce04 and 79ecade5 for a new connection. 2025/04/30 08:48:12 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:12 server <- Reading packet 2 (333 bytes) for connection 5b0f5e3ce8bb7a1226dfab7448c0ce04, Initial 2025/04/30 08:48:12 server Long Header{Type: Initial, DestConnectionID: 5b0f5e3ce8bb7a1226dfab7448c0ce04, SrcConnectionID: 9fe65c22b81176f31a86b301c28d5d926d75885d, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:12 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:12 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:12 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:12 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 9fe65c22b81176f31a86b301c28d5d926d75885d, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:12 Adding connection ID 7602779c. 2025/04/30 08:48:12 Adding connection ID b799713b. 2025/04/30 08:48:12 Adding connection ID 5495eee6. 2025/04/30 08:48:12 Adding connection ID 0fadf707. 2025/04/30 08:48:12 Adding connection ID 8e75844a. 2025/04/30 08:48:12 server coalesced packet has different destination connection ID: 00000000, expected 5b0f5e3ce8bb7a1226dfab7448c0ce04 2025/04/30 08:48:12 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5b0f5e3ce8bb7a1226dfab7448c0ce04 2025/04/30 08:48:12 server Long Header{Type: Initial, DestConnectionID: 9fe65c22b81176f31a86b301c28d5d926d75885d, SrcConnectionID: 79ecade5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 315, Version: v1} 2025/04/30 08:48:12 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 08:48:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:12 server Long Header{Type: Handshake, DestConnectionID: 9fe65c22b81176f31a86b301c28d5d926d75885d, SrcConnectionID: 79ecade5, PacketNumber: 0, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 08:48:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 08:48:12 server Short Header{DestConnectionID: 9fe65c22b81176f31a86b301c28d5d926d75885d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b799713b, StatelessResetToken: 0x8e76e17df4d2735ccf3bfccd5c0abadd} 2025/04/30 08:48:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5495eee6, StatelessResetToken: 0x3a766892adeefa5b32b408e92c809f25} 2025/04/30 08:48:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 8e75844a, StatelessResetToken: 0xa96a18bc6a3d890d6b02311ebfc58d3e} 2025/04/30 08:48:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7602779c, StatelessResetToken: 0x43567a17ca31a5b65d850fd6a6af359b} 2025/04/30 08:48:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0fadf707, StatelessResetToken: 0x3f3c2a1aa9285f004e0265587cd62fc0} 2025/04/30 08:48:12 server Parsed a coalesced packet. Part 1: 67 bytes. Remaining: 1133 bytes. 2025/04/30 08:48:12 server <- Reading packet 3 (67 bytes) for connection 5b0f5e3ce8bb7a1226dfab7448c0ce04, Initial 2025/04/30 08:48:12 server Long Header{Type: Initial, DestConnectionID: 5b0f5e3ce8bb7a1226dfab7448c0ce04, SrcConnectionID: 9fe65c22b81176f31a86b301c28d5d926d75885d, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 08:48:12 server <- &wire.PingFrame{} 2025/04/30 08:48:12 server coalesced packet has different destination connection ID: 00000000, expected 5b0f5e3ce8bb7a1226dfab7448c0ce04 2025/04/30 08:48:12 server -> Sending packet 1 (57 bytes) for connection 5b0f5e3ce8bb7a1226dfab7448c0ce04, Initial 2025/04/30 08:48:12 server Long Header{Type: Initial, DestConnectionID: 9fe65c22b81176f31a86b301c28d5d926d75885d, SrcConnectionID: 79ecade5, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 08:48:12 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 08:48:12 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:12 server <- Reading packet 4 (57 bytes) for connection 79ecade5, Initial 2025/04/30 08:48:12 server Long Header{Type: Initial, DestConnectionID: 79ecade5, SrcConnectionID: 9fe65c22b81176f31a86b301c28d5d926d75885d, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:12 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 728µs} 2025/04/30 08:48:12 server newly acked packets (1): [0] 2025/04/30 08:48:12 server updated RTT: 33.85605ms (σ: 16.928025ms) 2025/04/30 08:48:12 server Parsed a coalesced packet. Part 2: 96 bytes. Remaining: 1197 bytes. 2025/04/30 08:48:12 server <- Reading packet 5 (96 bytes) for connection 79ecade5, Handshake 2025/04/30 08:48:12 server Long Header{Type: Handshake, DestConnectionID: 79ecade5, SrcConnectionID: 9fe65c22b81176f31a86b301c28d5d926d75885d, PacketNumber: 5, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:12 server Dropping Initial keys. 2025/04/30 08:48:12 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 512µs} 2025/04/30 08:48:12 server newly acked packets (1): [0] 2025/04/30 08:48:12 server updated RTT: 33.856ms (σ: 12.696ms) 2025/04/30 08:48:12 server Canceling loss detection timer. 2025/04/30 08:48:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:12 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:12 Retiring connection ID 5b0f5e3ce8bb7a1226dfab7448c0ce04 in 5s. 2025/04/30 08:48:12 server Dropping Handshake keys. 2025/04/30 08:48:12 server <- Reading packet 6 (1197 bytes) for connection 79ecade5, 1-RTT 2025/04/30 08:48:12 server Short Header{DestConnectionID: 79ecade5, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:12 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 248µs} 2025/04/30 08:48:12 server newly acked packets (1): [0] 2025/04/30 08:48:12 server updated RTT: 33.856ms (σ: 9.522ms) 2025/04/30 08:48:12 server Canceling loss detection timer. 2025/04/30 08:48:12 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b10e509572ee8af1ceee00e37a47913c83e68933, StatelessResetToken: 0x173381a361d0d14d6e7a3ab3c85f0580} 2025/04/30 08:48:12 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 08e36079652d4174746576dbec6de56fc22c21c4, StatelessResetToken: 0x1a67b44cc2c8d5ea8f3321d2e84d38e3} 2025/04/30 08:48:12 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dd486e6eb60577a2a7a3233eacb8b744a23daa32, StatelessResetToken: 0x1d70c6dd93ab61dac7f6924a97fa4f1a} 2025/04/30 08:48:12 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:12 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:12 server -> Sending packet 1 (278 bytes) for connection 5b0f5e3ce8bb7a1226dfab7448c0ce04, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:12 Received request: GET /hqssfjgqgm 2025/04/30 08:48:12 server Short Header{DestConnectionID: b10e509572ee8af1ceee00e37a47913c83e68933, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:12 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 426.568µs} 2025/04/30 08:48:12 server -> &wire.NewTokenFrame{Token: 0x378affa99c15dadd405633b063f521a84caafd3558e872d5aeccc647756e1585a22297773d118192e388c55f9462fb8c789358486423d18f39fa4263813969a393aa623bc95d928b25e7c1909f0cee6510fd08b5ee0b} 2025/04/30 08:48:12 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:12 server -> Sending packet 2 (1065 bytes) for connection 5b0f5e3ce8bb7a1226dfab7448c0ce04, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:12 server Short Header{DestConnectionID: b10e509572ee8af1ceee00e37a47913c83e68933, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:12 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:12 server -> Sending packet 4 (273 bytes) for connection 5b0f5e3ce8bb7a1226dfab7448c0ce04, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:12 server Short Header{DestConnectionID: b10e509572ee8af1ceee00e37a47913c83e68933, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:12 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:12 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:12 server -> &wire.NewTokenFrame{Token: 0x378affa99c15dadd405633b063f521a84caafd3558e872d5aeccc647756e1585a22297773d118192e388c55f9462fb8c789358486423d18f39fa4263813969a393aa623bc95d928b25e7c1909f0cee6510fd08b5ee0b} 2025/04/30 08:48:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:12 server Skipping packet number 3 2025/04/30 08:48:12 server -> Sending packet 5 (1065 bytes) for connection 5b0f5e3ce8bb7a1226dfab7448c0ce04, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:12 server Short Header{DestConnectionID: b10e509572ee8af1ceee00e37a47913c83e68933, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:12 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:12 server Dropping %!s(logging.PacketType=1) packet (96 bytes) because we already dropped the keys. 2025/04/30 08:48:12 server <- Reading packet 8 (69 bytes) for connection 79ecade5, 1-RTT 2025/04/30 08:48:12 server Short Header{DestConnectionID: 79ecade5, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:12 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 192µs} 2025/04/30 08:48:12 server newly acked packets (1): [4] 2025/04/30 08:48:12 server updated RTT: 33.543ms (σ: 7.767ms) 2025/04/30 08:48:12 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:12 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 98f80ab469fda9f6e66ff05507836ac49260e208, StatelessResetToken: 0x5cc45040135724e0cb5a308223c64fd0} 2025/04/30 08:48:12 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:48:12 server -> Sending packet 6 (46 bytes) for connection 5b0f5e3ce8bb7a1226dfab7448c0ce04, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:12 server Short Header{DestConnectionID: b10e509572ee8af1ceee00e37a47913c83e68933, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:12 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 200.976µs} 2025/04/30 08:48:12 server <- Reading packet 9 (32 bytes) for connection 79ecade5, 1-RTT 2025/04/30 08:48:12 server Short Header{DestConnectionID: 79ecade5, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:12 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:12 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:12 Replacing connection for connection IDs [79ecade5 7602779c b799713b 5495eee6 0fadf707 8e75844a] with a closed connection. 2025/04/30 08:48:12 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:12 server Connection 5b0f5e3ce8bb7a1226dfab7448c0ce04 closed. 2025/04/30 08:48:12 server <- Received Initial packet. 2025/04/30 08:48:12 Created qlog file: /logs/qlog/3aa6a50e10821c79ffa6f438bba69d89.sqlog 2025/04/30 08:48:12 server Changing connection ID to 6cfb6709. 2025/04/30 08:48:12 Adding connection IDs 3aa6a50e10821c79ffa6f438bba69d89 and 6cfb6709 for a new connection. 2025/04/30 08:48:12 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:12 server <- Reading packet 0 (333 bytes) for connection 3aa6a50e10821c79ffa6f438bba69d89, Initial 2025/04/30 08:48:12 server Long Header{Type: Initial, DestConnectionID: 3aa6a50e10821c79ffa6f438bba69d89, SrcConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:12 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:12 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:12 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:12 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:12 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:12 Adding connection ID 0732f1d7. 2025/04/30 08:48:12 Adding connection ID 388f2cd0. 2025/04/30 08:48:12 Adding connection ID 486b716b. 2025/04/30 08:48:12 Adding connection ID bedc76ba. 2025/04/30 08:48:12 Adding connection ID f4011979. 2025/04/30 08:48:12 server coalesced packet has different destination connection ID: 00000000, expected 3aa6a50e10821c79ffa6f438bba69d89 2025/04/30 08:48:12 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3aa6a50e10821c79ffa6f438bba69d89 2025/04/30 08:48:12 server Long Header{Type: Initial, DestConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, SrcConnectionID: 6cfb6709, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 322, Version: v1} 2025/04/30 08:48:12 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:12 server Long Header{Type: Handshake, DestConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, SrcConnectionID: 6cfb6709, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 08:48:12 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 08:48:12 server Short Header{DestConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 486b716b, StatelessResetToken: 0x76d7ec8ebe4c4bde2196df3a9d0387db} 2025/04/30 08:48:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 388f2cd0, StatelessResetToken: 0xd47b57c93f7a10ba1583489d673c313e} 2025/04/30 08:48:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0732f1d7, StatelessResetToken: 0x47f7bff1ce5edfd75fff84d9717d5804} 2025/04/30 08:48:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f4011979, StatelessResetToken: 0x7ee3dbdd9a40288184fc2d996c0cef44} 2025/04/30 08:48:12 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bedc76ba, StatelessResetToken: 0x359a3a0ba4fb97548a7230123cee691b} 2025/04/30 08:48:13 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:48:13 server -> Sending packet 1 (1280 bytes) for connection 3aa6a50e10821c79ffa6f438bba69d89, Initial 2025/04/30 08:48:13 server Long Header{Type: Initial, DestConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, SrcConnectionID: 6cfb6709, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:13 server -> Sending packet 2 (1280 bytes) for connection 3aa6a50e10821c79ffa6f438bba69d89, Initial 2025/04/30 08:48:13 server Long Header{Type: Initial, DestConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, SrcConnectionID: 6cfb6709, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:13 server Canceling loss detection timer. 2025/04/30 08:48:13 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:48:13 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:48:13 server <- Reading packet 1 (56 bytes) for connection 6cfb6709, Initial 2025/04/30 08:48:13 server Long Header{Type: Initial, DestConnectionID: 6cfb6709, SrcConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:13 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 232µs} 2025/04/30 08:48:13 server coalesced packet has different destination connection ID: 00000000, expected 6cfb6709 2025/04/30 08:48:13 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:48:13 server <- Reading packet 2 (56 bytes) for connection 6cfb6709, Initial 2025/04/30 08:48:13 server Long Header{Type: Initial, DestConnectionID: 6cfb6709, SrcConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:13 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 56µs} 2025/04/30 08:48:13 server newly acked packets (1): [2] 2025/04/30 08:48:13 server updated RTT: 34.095695ms (σ: 17.047847ms) 2025/04/30 08:48:13 server coalesced packet has different destination connection ID: 00000000, expected 6cfb6709 2025/04/30 08:48:13 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:48:13 server -> Sending packet 1 (765 bytes) for connection 3aa6a50e10821c79ffa6f438bba69d89, Handshake 2025/04/30 08:48:13 server Long Header{Type: Handshake, DestConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, SrcConnectionID: 6cfb6709, PacketNumber: 1, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 08:48:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 08:48:13 server -> Sending packet 2 (765 bytes) for connection 3aa6a50e10821c79ffa6f438bba69d89, Handshake 2025/04/30 08:48:13 server Long Header{Type: Handshake, DestConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, SrcConnectionID: 6cfb6709, PacketNumber: 2, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 08:48:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 08:48:13 server <- Reading packet 5 (55 bytes) for connection 6cfb6709, Handshake 2025/04/30 08:48:13 server Long Header{Type: Handshake, DestConnectionID: 6cfb6709, SrcConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:13 server Dropping Initial keys. 2025/04/30 08:48:13 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 40µs} 2025/04/30 08:48:13 server newly acked packets (1): [2] 2025/04/30 08:48:13 server updated RTT: 33.863ms (σ: 13.247ms) 2025/04/30 08:48:13 server Canceling loss detection timer. 2025/04/30 08:48:13 Tracking 20 connection IDs and 1 reset tokens. 2025/04/30 08:48:15 server Queueing packet (164 bytes) for later decryption 2025/04/30 08:48:15 server Queueing packet (26 bytes) for later decryption 2025/04/30 08:48:15 Tracking 20 connection IDs and 1 reset tokens. 2025/04/30 08:48:16 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 08:48:16 server -> Sending packet 24 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:16 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:16 server -> Sending packet 25 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:16 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:16 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:17 Removing connection ID 5b0f5e3ce8bb7a1226dfab7448c0ce04 after it has been retired. 2025/04/30 08:48:17 Removing connection IDs [79ecade5 7602779c b799713b 5495eee6 0fadf707 8e75844a] for a closed connection after it has been retired. 2025/04/30 08:48:17 Tracking 13 connection IDs and 1 reset tokens. 2025/04/30 08:48:18 server <- Reading packet 9 (98 bytes) for connection 6cfb6709, Handshake 2025/04/30 08:48:18 server Long Header{Type: Handshake, DestConnectionID: 6cfb6709, SrcConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, PacketNumber: 9, PacketNumberLen: 1, Length: 65, Version: v1} 2025/04/30 08:48:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 5.000008s} 2025/04/30 08:48:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:18 Retiring connection ID 3aa6a50e10821c79ffa6f438bba69d89 in 5s. 2025/04/30 08:48:18 server Dropping Handshake keys. 2025/04/30 08:48:18 server Dropping %!s(logging.PacketType=1) packet (59 bytes) because we already dropped the keys. 2025/04/30 08:48:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:18 server -> Sending packet 2 (391 bytes) for connection 3aa6a50e10821c79ffa6f438bba69d89, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:18 server Short Header{DestConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:18 server -> &wire.NewTokenFrame{Token: 0xd10083110c101d02225abdef31869c5bfbdd400c4a7bb3b380f284b8047d111c92e79b381775486a2397c0bff98eb729d4b98eecfb131595f67bda73e42d8079ee8657b6a3ce1b107ca471b0e6df09d0a507d15f8c7e} 2025/04/30 08:48:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0732f1d7, StatelessResetToken: 0x47f7bff1ce5edfd75fff84d9717d5804} 2025/04/30 08:48:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f4011979, StatelessResetToken: 0x7ee3dbdd9a40288184fc2d996c0cef44} 2025/04/30 08:48:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 486b716b, StatelessResetToken: 0x76d7ec8ebe4c4bde2196df3a9d0387db} 2025/04/30 08:48:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bedc76ba, StatelessResetToken: 0x359a3a0ba4fb97548a7230123cee691b} 2025/04/30 08:48:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 388f2cd0, StatelessResetToken: 0xd47b57c93f7a10ba1583489d673c313e} 2025/04/30 08:48:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:18 server -> Sending packet 3 (391 bytes) for connection 3aa6a50e10821c79ffa6f438bba69d89, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:18 server Short Header{DestConnectionID: b065f8b5c3564c0bd1a2dddea8e145259d6ef349, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bedc76ba, StatelessResetToken: 0x359a3a0ba4fb97548a7230123cee691b} 2025/04/30 08:48:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0732f1d7, StatelessResetToken: 0x47f7bff1ce5edfd75fff84d9717d5804} 2025/04/30 08:48:18 server -> &wire.NewTokenFrame{Token: 0xd10083110c101d02225abdef31869c5bfbdd400c4a7bb3b380f284b8047d111c92e79b381775486a2397c0bff98eb729d4b98eecfb131595f67bda73e42d8079ee8657b6a3ce1b107ca471b0e6df09d0a507d15f8c7e} 2025/04/30 08:48:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f4011979, StatelessResetToken: 0x7ee3dbdd9a40288184fc2d996c0cef44} 2025/04/30 08:48:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 486b716b, StatelessResetToken: 0x76d7ec8ebe4c4bde2196df3a9d0387db} 2025/04/30 08:48:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 388f2cd0, StatelessResetToken: 0xd47b57c93f7a10ba1583489d673c313e} 2025/04/30 08:48:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:18 server <- Reading packet 7 (164 bytes) for connection 6cfb6709, 1-RTT 2025/04/30 08:48:18 server Short Header{DestConnectionID: 6cfb6709, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 702bba105d29491605bf0f2c9fcd78dda145541c, StatelessResetToken: 0x3f03a364c00d768bd2ce82d25bb99ec5} 2025/04/30 08:48:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 11b32cd867389ad64910a98b11acd3141e7a42ff, StatelessResetToken: 0x492cadda486d40052edf19504ef32494} 2025/04/30 08:48:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bc0f1aae614a8f38369830c7a26faa6816b30807, StatelessResetToken: 0xfbd1bc77624cb01d57d3aa646f623dd8} 2025/04/30 08:48:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:18 server <- Reading packet 8 (26 bytes) for connection 6cfb6709, 1-RTT 2025/04/30 08:48:18 server Short Header{DestConnectionID: 6cfb6709, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:18 server <- &wire.PingFrame{} 2025/04/30 08:48:18 server -> Sending packet 4 (49 bytes) for connection 3aa6a50e10821c79ffa6f438bba69d89, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:18 server Short Header{DestConnectionID: 702bba105d29491605bf0f2c9fcd78dda145541c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:18 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 2.948965847s} 2025/04/30 08:48:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:18 Received request: GET /sxjbkjuhde 2025/04/30 08:48:18 server -> Sending packet 5 (1065 bytes) for connection 3aa6a50e10821c79ffa6f438bba69d89, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:18 server Short Header{DestConnectionID: 702bba105d29491605bf0f2c9fcd78dda145541c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:18 server <- Reading packet 12 (32 bytes) for connection 6cfb6709, 1-RTT 2025/04/30 08:48:18 server Short Header{DestConnectionID: 6cfb6709, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:18 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:18 Replacing connection for connection IDs [6cfb6709 0732f1d7 388f2cd0 486b716b bedc76ba f4011979] with a closed connection. 2025/04/30 08:48:18 server Connection 3aa6a50e10821c79ffa6f438bba69d89 closed. 2025/04/30 08:48:18 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:19 Tracking 13 connection IDs and 1 reset tokens. 2025/04/30 08:48:21 Tracking 13 connection IDs and 1 reset tokens. 2025/04/30 08:48:23 Removing connection ID 3aa6a50e10821c79ffa6f438bba69d89 after it has been retired. 2025/04/30 08:48:23 Removing connection IDs [6cfb6709 0732f1d7 388f2cd0 486b716b bedc76ba f4011979] for a closed connection after it has been retired. 2025/04/30 08:48:23 Tracking 6 connection IDs and 1 reset tokens. 2025/04/30 08:48:24 server <- Received Initial packet. 2025/04/30 08:48:24 Created qlog file: /logs/qlog/b6d488943f4a9d3786308d64172d8591.sqlog 2025/04/30 08:48:24 server Changing connection ID to 10dade8e. 2025/04/30 08:48:24 Adding connection IDs b6d488943f4a9d3786308d64172d8591 and 10dade8e for a new connection. 2025/04/30 08:48:24 server Parsed a coalesced packet. Part 1: 67 bytes. Remaining: 1133 bytes. 2025/04/30 08:48:24 server <- Reading packet 3 (67 bytes) for connection b6d488943f4a9d3786308d64172d8591, Initial 2025/04/30 08:48:24 server Long Header{Type: Initial, DestConnectionID: b6d488943f4a9d3786308d64172d8591, SrcConnectionID: 6891141e0a2d5969c43e6e34a6000ac2a0c485cb, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 08:48:24 server <- &wire.PingFrame{} 2025/04/30 08:48:24 server coalesced packet has different destination connection ID: 00000000, expected b6d488943f4a9d3786308d64172d8591 2025/04/30 08:48:24 server -> Sending packet 0 (57 bytes) for connection b6d488943f4a9d3786308d64172d8591, Initial 2025/04/30 08:48:24 server Long Header{Type: Initial, DestConnectionID: 6891141e0a2d5969c43e6e34a6000ac2a0c485cb, SrcConnectionID: 10dade8e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 08:48:24 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s} 2025/04/30 08:48:24 server Parsed a coalesced packet. Part 1: 321 bytes. Remaining: 879 bytes. 2025/04/30 08:48:24 server <- Reading packet 4 (321 bytes) for connection 10dade8e, Initial 2025/04/30 08:48:24 server Long Header{Type: Initial, DestConnectionID: 10dade8e, SrcConnectionID: 6891141e0a2d5969c43e6e34a6000ac2a0c485cb, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:24 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:24 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:24 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:24 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6891141e0a2d5969c43e6e34a6000ac2a0c485cb, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:24 Adding connection ID c1361734. 2025/04/30 08:48:24 Adding connection ID a9c1a1ea. 2025/04/30 08:48:24 Adding connection ID 36e2d794. 2025/04/30 08:48:24 Adding connection ID 7c738ae5. 2025/04/30 08:48:24 Adding connection ID 33335c34. 2025/04/30 08:48:24 server coalesced packet has different destination connection ID: 00000000, expected 10dade8e 2025/04/30 08:48:24 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b6d488943f4a9d3786308d64172d8591 2025/04/30 08:48:24 server Long Header{Type: Initial, DestConnectionID: 6891141e0a2d5969c43e6e34a6000ac2a0c485cb, SrcConnectionID: 10dade8e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 310, Version: v1} 2025/04/30 08:48:24 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s} 2025/04/30 08:48:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:24 server Long Header{Type: Handshake, DestConnectionID: 6891141e0a2d5969c43e6e34a6000ac2a0c485cb, SrcConnectionID: 10dade8e, PacketNumber: 0, PacketNumberLen: 2, Length: 744, Version: v1} 2025/04/30 08:48:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/04/30 08:48:24 server Short Header{DestConnectionID: 6891141e0a2d5969c43e6e34a6000ac2a0c485cb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7c738ae5, StatelessResetToken: 0x2e7cafea4ab4b5eaede50bac4cd48309} 2025/04/30 08:48:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 33335c34, StatelessResetToken: 0x1bd6ffb70dc7294fa9c4e808349d9d4b} 2025/04/30 08:48:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 36e2d794, StatelessResetToken: 0xfa68d5408618774ad0ad076366010445} 2025/04/30 08:48:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c1361734, StatelessResetToken: 0xa766f34eb6b8537f51fb5d572c7cccd7} 2025/04/30 08:48:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a9c1a1ea, StatelessResetToken: 0xa6b7c9e555b45399572afbf829c757d1} 2025/04/30 08:48:24 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:24 server <- Reading packet 5 (57 bytes) for connection 10dade8e, Initial 2025/04/30 08:48:24 server Long Header{Type: Initial, DestConnectionID: 10dade8e, SrcConnectionID: 6891141e0a2d5969c43e6e34a6000ac2a0c485cb, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:24 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 624µs} 2025/04/30 08:48:24 server newly acked packets (1): [1] 2025/04/30 08:48:24 server updated RTT: 33.728143ms (σ: 16.864071ms) 2025/04/30 08:48:24 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:24 server <- Reading packet 6 (95 bytes) for connection 10dade8e, Handshake 2025/04/30 08:48:24 server Long Header{Type: Handshake, DestConnectionID: 10dade8e, SrcConnectionID: 6891141e0a2d5969c43e6e34a6000ac2a0c485cb, PacketNumber: 6, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:24 server Dropping Initial keys. 2025/04/30 08:48:24 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416µs} 2025/04/30 08:48:24 server newly acked packets (1): [0] 2025/04/30 08:48:24 server updated RTT: 33.728ms (σ: 12.648ms) 2025/04/30 08:48:24 server Canceling loss detection timer. 2025/04/30 08:48:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:24 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:24 Retiring connection ID b6d488943f4a9d3786308d64172d8591 in 5s. 2025/04/30 08:48:24 server Dropping Handshake keys. 2025/04/30 08:48:24 server <- Reading packet 7 (1198 bytes) for connection 10dade8e, 1-RTT 2025/04/30 08:48:24 server Short Header{DestConnectionID: 10dade8e, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:24 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 192µs} 2025/04/30 08:48:24 server newly acked packets (1): [0] 2025/04/30 08:48:24 server updated RTT: 33.728ms (σ: 9.486ms) 2025/04/30 08:48:24 server Canceling loss detection timer. 2025/04/30 08:48:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, StatelessResetToken: 0x1c6cf31cc1229ca38cf1050d55d4bedf} 2025/04/30 08:48:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 34a77cc5ba5b0ad0b395361f12aa9d9a02fd666c, StatelessResetToken: 0x1872c263630da823f0a3bf116fcac053} 2025/04/30 08:48:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 549eb9db0b8780b10ee6fd1a2a386c182936cae2, StatelessResetToken: 0xda7eb979041dc9493f8f5f2c46f40e05} 2025/04/30 08:48:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:24 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:24 server -> Sending packet 1 (278 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:24 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:24 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 448.378µs} 2025/04/30 08:48:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:24 server -> &wire.NewTokenFrame{Token: 0xd80029404b3024ee6601f2c9af1704bcd92467e6044eb968a91c15e07f80d2047b7b4e072ac2dc4188eb6f699d2ba81a3f93fdb7eb6efc288da67ae69fad71392a6e384156677563a286513a4ff40d0c2957dc053074} 2025/04/30 08:48:24 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:24 Received request: GET /mtikxgaxzb 2025/04/30 08:48:24 server -> Sending packet 2 (1065 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:24 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:24 server -> Sending packet 4 (273 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:24 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:24 server -> &wire.NewTokenFrame{Token: 0xd80029404b3024ee6601f2c9af1704bcd92467e6044eb968a91c15e07f80d2047b7b4e072ac2dc4188eb6f699d2ba81a3f93fdb7eb6efc288da67ae69fad71392a6e384156677563a286513a4ff40d0c2957dc053074} 2025/04/30 08:48:24 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:24 server Skipping packet number 3 2025/04/30 08:48:24 server -> Sending packet 5 (1065 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:24 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:24 server Dropping %!s(logging.PacketType=1) packet (96 bytes) because we already dropped the keys. 2025/04/30 08:48:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:48:24 server -> Sending packet 7 (273 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:24 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:24 server -> &wire.NewTokenFrame{Token: 0xd80029404b3024ee6601f2c9af1704bcd92467e6044eb968a91c15e07f80d2047b7b4e072ac2dc4188eb6f699d2ba81a3f93fdb7eb6efc288da67ae69fad71392a6e384156677563a286513a4ff40d0c2957dc053074} 2025/04/30 08:48:24 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:24 server Skipping packet number 6 2025/04/30 08:48:24 server -> Sending packet 8 (1065 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:24 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:24 server -> Sending packet 9 (1315 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:24 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:24 server -> &wire.PingFrame{} 2025/04/30 08:48:24 server <- Received Initial packet. 2025/04/30 08:48:24 Created qlog file: /logs/qlog/d0b6ac430d966f59470d19e0fbc0d3b6.sqlog 2025/04/30 08:48:24 server Changing connection ID to 01d085c6. 2025/04/30 08:48:24 Adding connection IDs d0b6ac430d966f59470d19e0fbc0d3b6 and 01d085c6 for a new connection. 2025/04/30 08:48:24 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:24 server <- Reading packet 0 (333 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, Initial 2025/04/30 08:48:24 server Long Header{Type: Initial, DestConnectionID: d0b6ac430d966f59470d19e0fbc0d3b6, SrcConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:24 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:24 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:24 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:24 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:24 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:24 Adding connection ID ff9fdd99. 2025/04/30 08:48:24 Adding connection ID 8cdff25a. 2025/04/30 08:48:24 Adding connection ID 290c71e3. 2025/04/30 08:48:24 Adding connection ID f3f265a7. 2025/04/30 08:48:24 Adding connection ID 79620a55. 2025/04/30 08:48:24 server coalesced packet has different destination connection ID: 00000000, expected d0b6ac430d966f59470d19e0fbc0d3b6 2025/04/30 08:48:24 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6 2025/04/30 08:48:24 server Long Header{Type: Initial, DestConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, SrcConnectionID: 01d085c6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 321, Version: v1} 2025/04/30 08:48:24 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:24 server Long Header{Type: Handshake, DestConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, SrcConnectionID: 01d085c6, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 08:48:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 08:48:24 server Short Header{DestConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f3f265a7, StatelessResetToken: 0xf718b85d33ce733ea34116a37eb6dfe0} 2025/04/30 08:48:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8cdff25a, StatelessResetToken: 0xd35ac7ec0e4ac6e071056b7cc338fc22} 2025/04/30 08:48:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff9fdd99, StatelessResetToken: 0x56ef16d9bd412d5dfc7f3eb7015e2bd1} 2025/04/30 08:48:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 290c71e3, StatelessResetToken: 0xe817d3801667f398aee1fdef226c7fa3} 2025/04/30 08:48:24 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 79620a55, StatelessResetToken: 0xb81a6efc5188cc41437c87c2c8264756} 2025/04/30 08:48:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 08:48:24 server -> Sending packet 11 (273 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:24 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:24 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:24 server -> &wire.NewTokenFrame{Token: 0xd80029404b3024ee6601f2c9af1704bcd92467e6044eb968a91c15e07f80d2047b7b4e072ac2dc4188eb6f699d2ba81a3f93fdb7eb6efc288da67ae69fad71392a6e384156677563a286513a4ff40d0c2957dc053074} 2025/04/30 08:48:24 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:24 server Skipping packet number 10 2025/04/30 08:48:24 server -> Sending packet 12 (1065 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:24 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:24 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:48:24 server -> Sending packet 1 (1280 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, Initial 2025/04/30 08:48:24 server Long Header{Type: Initial, DestConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, SrcConnectionID: 01d085c6, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:24 server -> Sending packet 2 (1280 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, Initial 2025/04/30 08:48:24 server Long Header{Type: Initial, DestConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, SrcConnectionID: 01d085c6, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:24 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:24 server Canceling loss detection timer. 2025/04/30 08:48:24 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:48:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 08:48:25 server -> Sending packet 14 (273 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:25 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:25 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:25 server -> &wire.NewTokenFrame{Token: 0xd80029404b3024ee6601f2c9af1704bcd92467e6044eb968a91c15e07f80d2047b7b4e072ac2dc4188eb6f699d2ba81a3f93fdb7eb6efc288da67ae69fad71392a6e384156677563a286513a4ff40d0c2957dc053074} 2025/04/30 08:48:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:25 server Skipping packet number 13 2025/04/30 08:48:25 server -> Sending packet 15 (1065 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:25 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:25 Tracking 20 connection IDs and 2 reset tokens. 2025/04/30 08:48:25 server Parsed a coalesced packet. Part 1: 329 bytes. Remaining: 871 bytes. 2025/04/30 08:48:25 server <- Reading packet 2 (329 bytes) for connection 01d085c6, Initial 2025/04/30 08:48:25 server Long Header{Type: Initial, DestConnectionID: 01d085c6, SrcConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 295, Version: v1} 2025/04/30 08:48:25 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 765.24ms} 2025/04/30 08:48:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:25 server coalesced packet has different destination connection ID: 00000000, expected 01d085c6 2025/04/30 08:48:25 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:48:25 server -> Sending packet 1 (766 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, Handshake 2025/04/30 08:48:25 server Long Header{Type: Handshake, DestConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, SrcConnectionID: 01d085c6, PacketNumber: 1, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 08:48:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 08:48:25 server -> Sending packet 2 (766 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, Handshake 2025/04/30 08:48:25 server Long Header{Type: Handshake, DestConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, SrcConnectionID: 01d085c6, PacketNumber: 2, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 08:48:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 08:48:25 server -> Sending packet 3 (59 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, Initial 2025/04/30 08:48:25 server Long Header{Type: Initial, DestConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, SrcConnectionID: 01d085c6, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 08:48:25 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 08:48:25 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 08:48:25 server -> Sending packet 4 (1280 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, Initial 2025/04/30 08:48:25 server Long Header{Type: Initial, DestConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, SrcConnectionID: 01d085c6, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:25 server -> Sending packet 5 (1280 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, Initial 2025/04/30 08:48:25 server Long Header{Type: Initial, DestConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, SrcConnectionID: 01d085c6, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:25 server Canceling loss detection timer. 2025/04/30 08:48:25 server Amplification window limited. Received 2400 bytes, already sent out 7991 bytes 2025/04/30 08:48:25 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1294 bytes. 2025/04/30 08:48:25 server <- Reading packet 3 (56 bytes) for connection 01d085c6, Initial 2025/04/30 08:48:25 server Long Header{Type: Initial, DestConnectionID: 01d085c6, SrcConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:25 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 112µs} 2025/04/30 08:48:25 server Parsed a coalesced packet. Part 2: 96 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:25 server <- Reading packet 4 (96 bytes) for connection 01d085c6, Handshake 2025/04/30 08:48:25 server Long Header{Type: Handshake, DestConnectionID: 01d085c6, SrcConnectionID: c47f8428de89fa8d8ea93a199049f8aeb03838a3, PacketNumber: 4, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:25 server Dropping Initial keys. 2025/04/30 08:48:25 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 600µs} 2025/04/30 08:48:25 server newly acked packets (1): [2] 2025/04/30 08:48:25 server updated RTT: 33.823656ms (σ: 16.911828ms) 2025/04/30 08:48:25 server Canceling loss detection timer. 2025/04/30 08:48:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:25 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:25 Retiring connection ID d0b6ac430d966f59470d19e0fbc0d3b6 in 5s. 2025/04/30 08:48:25 server Dropping Handshake keys. 2025/04/30 08:48:25 server <- Reading packet 5 (1198 bytes) for connection 01d085c6, 1-RTT 2025/04/30 08:48:25 server Short Header{DestConnectionID: 01d085c6, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b0fe243cf737fe38baf69d057a59593f69adbe25, StatelessResetToken: 0x38db6535749ed6e80eb5f66321cfedb1} 2025/04/30 08:48:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c179e2b4d3159751472547d3a973746515851e47, StatelessResetToken: 0x41496af33280f3024a20ccd11161db13} 2025/04/30 08:48:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 08de58613ebf8c74f5abd71da02e1bdfe6cca2fd, StatelessResetToken: 0x9ba5a5c025d462459f639724b05612f7} 2025/04/30 08:48:25 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:25 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:25 server -> Sending packet 2 (398 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:25 server Short Header{DestConnectionID: b0fe243cf737fe38baf69d057a59593f69adbe25, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:25 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 381.283µs} 2025/04/30 08:48:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8cdff25a, StatelessResetToken: 0xd35ac7ec0e4ac6e071056b7cc338fc22} 2025/04/30 08:48:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 290c71e3, StatelessResetToken: 0xe817d3801667f398aee1fdef226c7fa3} 2025/04/30 08:48:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff9fdd99, StatelessResetToken: 0x56ef16d9bd412d5dfc7f3eb7015e2bd1} 2025/04/30 08:48:25 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:25 server -> &wire.NewTokenFrame{Token: 0x0701ac97ecc2f291b7c5eb30ea29706645df701fbdac07b8b3074d47da1343c90fa3c752cde6caf2caf858b0a9587f5e51d9177ff35bd4852612754f08d1fe9b62aff3aad1b4833b3f0f64ccdcf5a8ee52e159ee7c30} 2025/04/30 08:48:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 79620a55, StatelessResetToken: 0xb81a6efc5188cc41437c87c2c8264756} 2025/04/30 08:48:25 Received request: GET /rhrnbpsojr 2025/04/30 08:48:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f3f265a7, StatelessResetToken: 0xf718b85d33ce733ea34116a37eb6dfe0} 2025/04/30 08:48:25 server -> Sending packet 3 (1280 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:25 server Short Header{DestConnectionID: b0fe243cf737fe38baf69d057a59593f69adbe25, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8cdff25a, StatelessResetToken: 0xd35ac7ec0e4ac6e071056b7cc338fc22} 2025/04/30 08:48:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:25 server -> &wire.NewTokenFrame{Token: 0x0701ac97ecc2f291b7c5eb30ea29706645df701fbdac07b8b3074d47da1343c90fa3c752cde6caf2caf858b0a9587f5e51d9177ff35bd4852612754f08d1fe9b62aff3aad1b4833b3f0f64ccdcf5a8ee52e159ee7c30} 2025/04/30 08:48:25 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 290c71e3, StatelessResetToken: 0xe817d3801667f398aee1fdef226c7fa3} 2025/04/30 08:48:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ff9fdd99, StatelessResetToken: 0x56ef16d9bd412d5dfc7f3eb7015e2bd1} 2025/04/30 08:48:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 79620a55, StatelessResetToken: 0xb81a6efc5188cc41437c87c2c8264756} 2025/04/30 08:48:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f3f265a7, StatelessResetToken: 0xf718b85d33ce733ea34116a37eb6dfe0} 2025/04/30 08:48:25 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 885, Offset + Data length: 885} 2025/04/30 08:48:25 server -> Sending packet 4 (182 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:25 server Short Header{DestConnectionID: b0fe243cf737fe38baf69d057a59593f69adbe25, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 885, Data length: 139, Offset + Data length: 1024} 2025/04/30 08:48:25 server <- Reading packet 6 (67 bytes) for connection 01d085c6, 1-RTT 2025/04/30 08:48:25 server Short Header{DestConnectionID: 01d085c6, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:25 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 216µs} 2025/04/30 08:48:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 74aee459fb1cbba5b1efdbfa5b4641e3bf35afa3, StatelessResetToken: 0x2cefb69205aaf652d71e19764570db7b} 2025/04/30 08:48:25 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:25 server <- Reading packet 7 (27 bytes) for connection 01d085c6, 1-RTT 2025/04/30 08:48:25 server Short Header{DestConnectionID: 01d085c6, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:25 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 152µs} 2025/04/30 08:48:25 server newly acked packets (1): [3] 2025/04/30 08:48:25 server updated RTT: 33.625ms (σ: 13.078ms) 2025/04/30 08:48:25 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:25 server Sending ACK because the ACK timer expired. 2025/04/30 08:48:25 server -> Sending packet 5 (45 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:25 server Short Header{DestConnectionID: b0fe243cf737fe38baf69d057a59593f69adbe25, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:25 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 25.358697ms} 2025/04/30 08:48:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:25 server -> Sending packet 7 (182 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:25 server Short Header{DestConnectionID: b0fe243cf737fe38baf69d057a59593f69adbe25, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 885, Data length: 139, Offset + Data length: 1024} 2025/04/30 08:48:25 server -> Sending packet 8 (182 bytes) for connection d0b6ac430d966f59470d19e0fbc0d3b6, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:25 server Short Header{DestConnectionID: b0fe243cf737fe38baf69d057a59593f69adbe25, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 885, Data length: 139, Offset + Data length: 1024} 2025/04/30 08:48:25 server <- Reading packet 8 (32 bytes) for connection 01d085c6, 1-RTT 2025/04/30 08:48:25 server Short Header{DestConnectionID: 01d085c6, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:25 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:25 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:25 Replacing connection for connection IDs [79620a55 01d085c6 ff9fdd99 8cdff25a 290c71e3 f3f265a7] with a closed connection. 2025/04/30 08:48:25 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:25 server Connection d0b6ac430d966f59470d19e0fbc0d3b6 closed. 2025/04/30 08:48:27 server <- Received Initial packet. 2025/04/30 08:48:27 Created qlog file: /logs/qlog/c970fd27942ef661119c99d58ee245da.sqlog 2025/04/30 08:48:27 server Changing connection ID to c4aaaf8f. 2025/04/30 08:48:27 Adding connection IDs c970fd27942ef661119c99d58ee245da and c4aaaf8f for a new connection. 2025/04/30 08:48:27 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:27 server <- Reading packet 1 (333 bytes) for connection c970fd27942ef661119c99d58ee245da, Initial 2025/04/30 08:48:27 server Long Header{Type: Initial, DestConnectionID: c970fd27942ef661119c99d58ee245da, SrcConnectionID: c77b766d65ffd91a864d9d0cbe53a30ef306deeb, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c77b766d65ffd91a864d9d0cbe53a30ef306deeb, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:27 Adding connection ID c39d09f9. 2025/04/30 08:48:27 Adding connection ID 4d2e177d. 2025/04/30 08:48:27 Adding connection ID 764c588b. 2025/04/30 08:48:27 Adding connection ID e0260a6b. 2025/04/30 08:48:27 Adding connection ID c77afad9. 2025/04/30 08:48:27 server coalesced packet has different destination connection ID: 00000000, expected c970fd27942ef661119c99d58ee245da 2025/04/30 08:48:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c970fd27942ef661119c99d58ee245da 2025/04/30 08:48:27 server Long Header{Type: Initial, DestConnectionID: c77b766d65ffd91a864d9d0cbe53a30ef306deeb, SrcConnectionID: c4aaaf8f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 311, Version: v1} 2025/04/30 08:48:27 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 08:48:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:27 server Long Header{Type: Handshake, DestConnectionID: c77b766d65ffd91a864d9d0cbe53a30ef306deeb, SrcConnectionID: c4aaaf8f, PacketNumber: 0, PacketNumberLen: 2, Length: 743, Version: v1} 2025/04/30 08:48:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 08:48:27 server Short Header{DestConnectionID: c77b766d65ffd91a864d9d0cbe53a30ef306deeb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c39d09f9, StatelessResetToken: 0x36fbae04c73c38a1944924568b919e24} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e0260a6b, StatelessResetToken: 0xce0dff19e27183037ae12007a762694a} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4d2e177d, StatelessResetToken: 0xaa576b2b34ba426b85664527fc483d63} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: c77afad9, StatelessResetToken: 0xb72c81b8c639389d21a8552726840282} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 764c588b, StatelessResetToken: 0x148f3d88adbabb377bc863b000c36e78} 2025/04/30 08:48:27 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 08:48:27 server -> Sending packet 17 (273 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:27 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:27 server -> &wire.NewTokenFrame{Token: 0xd80029404b3024ee6601f2c9af1704bcd92467e6044eb968a91c15e07f80d2047b7b4e072ac2dc4188eb6f699d2ba81a3f93fdb7eb6efc288da67ae69fad71392a6e384156677563a286513a4ff40d0c2957dc053074} 2025/04/30 08:48:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:27 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:27 server Skipping packet number 16 2025/04/30 08:48:27 server -> Sending packet 18 (1065 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:27 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:27 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:27 server <- Reading packet 2 (57 bytes) for connection c4aaaf8f, Initial 2025/04/30 08:48:27 server Long Header{Type: Initial, DestConnectionID: c4aaaf8f, SrcConnectionID: c77b766d65ffd91a864d9d0cbe53a30ef306deeb, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 680µs} 2025/04/30 08:48:27 server newly acked packets (1): [0] 2025/04/30 08:48:27 server updated RTT: 33.633202ms (σ: 16.816601ms) 2025/04/30 08:48:27 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:27 server <- Reading packet 3 (95 bytes) for connection c4aaaf8f, Handshake 2025/04/30 08:48:27 server Long Header{Type: Handshake, DestConnectionID: c4aaaf8f, SrcConnectionID: c77b766d65ffd91a864d9d0cbe53a30ef306deeb, PacketNumber: 3, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:27 server Dropping Initial keys. 2025/04/30 08:48:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 440µs} 2025/04/30 08:48:27 server newly acked packets (1): [0] 2025/04/30 08:48:27 server updated RTT: 33.633ms (σ: 12.612ms) 2025/04/30 08:48:27 server Canceling loss detection timer. 2025/04/30 08:48:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:27 Retiring connection ID c970fd27942ef661119c99d58ee245da in 5s. 2025/04/30 08:48:27 server Dropping Handshake keys. 2025/04/30 08:48:27 server <- Reading packet 4 (1198 bytes) for connection c4aaaf8f, 1-RTT 2025/04/30 08:48:27 server Short Header{DestConnectionID: c4aaaf8f, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 192µs} 2025/04/30 08:48:27 server newly acked packets (1): [0] 2025/04/30 08:48:27 server updated RTT: 33.633ms (σ: 9.459ms) 2025/04/30 08:48:27 server Canceling loss detection timer. 2025/04/30 08:48:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec29dde12e30f23145cfcf7c54e355f69aac6cf9, StatelessResetToken: 0x1fc2a8bbbfc7a84bd7e286502b2f5527} 2025/04/30 08:48:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d498b021e41f7a90d9c9bed9108b476ce28b8077, StatelessResetToken: 0xae5e7387ae69d6da51abd0213f2c32f8} 2025/04/30 08:48:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4187609930143c9275ba0d0f973855e2338a6953, StatelessResetToken: 0xa9d2762f972054844103734dfe8a01fc} 2025/04/30 08:48:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:27 server -> Sending packet 1 (278 bytes) for connection c970fd27942ef661119c99d58ee245da, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:27 server Short Header{DestConnectionID: ec29dde12e30f23145cfcf7c54e355f69aac6cf9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:27 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 364.057µs} 2025/04/30 08:48:27 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:27 server -> &wire.NewTokenFrame{Token: 0x35a0d4b705dc23c803d3de922c0b80014a319c84355f9b026f408d6a5ae5f9cbeefb643fade43728b3767002e96c30b8c456c16ec241e09f891d5a7234278956e5f1d4daf6f31f7aaa82746d49302dc6c34858b3a287} 2025/04/30 08:48:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:27 Received request: GET /wzjwbezhxx 2025/04/30 08:48:27 server -> Sending packet 2 (1065 bytes) for connection c970fd27942ef661119c99d58ee245da, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:27 server Short Header{DestConnectionID: ec29dde12e30f23145cfcf7c54e355f69aac6cf9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:27 server <- Reading packet 5 (67 bytes) for connection c4aaaf8f, 1-RTT 2025/04/30 08:48:27 server Short Header{DestConnectionID: c4aaaf8f, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:27 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 176µs} 2025/04/30 08:48:27 server newly acked packets (1): [1] 2025/04/30 08:48:27 server updated RTT: 33.32ms (σ: 7.718ms) 2025/04/30 08:48:27 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: f72ec6ac1e3667beb5c8eba79a23f29cea5af05f, StatelessResetToken: 0x03366cda329a4d4c23d55df029b09e1b} 2025/04/30 08:48:27 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:27 server Ignoring all packets below 5. 2025/04/30 08:48:27 server <- Reading packet 6 (32 bytes) for connection c4aaaf8f, 1-RTT 2025/04/30 08:48:27 server Short Header{DestConnectionID: c4aaaf8f, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:27 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:27 Replacing connection for connection IDs [c4aaaf8f c39d09f9 4d2e177d 764c588b e0260a6b c77afad9] with a closed connection. 2025/04/30 08:48:27 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:27 server Connection c970fd27942ef661119c99d58ee245da closed. 2025/04/30 08:48:27 server <- Received Initial packet. 2025/04/30 08:48:27 Created qlog file: /logs/qlog/8fa6ce240133c3f2734d87d0e1a2874e.sqlog 2025/04/30 08:48:27 server Changing connection ID to 44e5571c. 2025/04/30 08:48:27 Adding connection IDs 8fa6ce240133c3f2734d87d0e1a2874e and 44e5571c for a new connection. 2025/04/30 08:48:27 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:27 server <- Reading packet 0 (333 bytes) for connection 8fa6ce240133c3f2734d87d0e1a2874e, Initial 2025/04/30 08:48:27 server Long Header{Type: Initial, DestConnectionID: 8fa6ce240133c3f2734d87d0e1a2874e, SrcConnectionID: 5997616a805c84ea7810ee831211451142c9d1b8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:27 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:27 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:27 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:27 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 5997616a805c84ea7810ee831211451142c9d1b8, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:27 Adding connection ID 481a2856. 2025/04/30 08:48:27 Adding connection ID 83a8fb3d. 2025/04/30 08:48:27 Adding connection ID 84fd6b19. 2025/04/30 08:48:27 Adding connection ID 99e5546c. 2025/04/30 08:48:27 Adding connection ID be00d178. 2025/04/30 08:48:27 server coalesced packet has different destination connection ID: 00000000, expected 8fa6ce240133c3f2734d87d0e1a2874e 2025/04/30 08:48:27 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8fa6ce240133c3f2734d87d0e1a2874e 2025/04/30 08:48:27 server Long Header{Type: Initial, DestConnectionID: 5997616a805c84ea7810ee831211451142c9d1b8, SrcConnectionID: 44e5571c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 325, Version: v1} 2025/04/30 08:48:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:27 server Long Header{Type: Handshake, DestConnectionID: 5997616a805c84ea7810ee831211451142c9d1b8, SrcConnectionID: 44e5571c, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 08:48:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 08:48:27 server Short Header{DestConnectionID: 5997616a805c84ea7810ee831211451142c9d1b8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 83a8fb3d, StatelessResetToken: 0x4db7540e14d053ef730eb928ad1ca752} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 481a2856, StatelessResetToken: 0xfdd8195c905d184276229085fc0b9038} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 99e5546c, StatelessResetToken: 0x3f5183a1ace3c9b506aba4f12c1b7db0} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 84fd6b19, StatelessResetToken: 0x19f4d967ba46dea1eb7cb8d45743e061} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: be00d178, StatelessResetToken: 0x27872045673ad4746f69c170e09cef3d} 2025/04/30 08:48:27 Tracking 34 connection IDs and 2 reset tokens. 2025/04/30 08:48:27 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:48:27 server -> Sending packet 1 (1280 bytes) for connection 8fa6ce240133c3f2734d87d0e1a2874e, Initial 2025/04/30 08:48:27 server Long Header{Type: Initial, DestConnectionID: 5997616a805c84ea7810ee831211451142c9d1b8, SrcConnectionID: 44e5571c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:27 server -> Sending packet 2 (1280 bytes) for connection 8fa6ce240133c3f2734d87d0e1a2874e, Initial 2025/04/30 08:48:27 server Long Header{Type: Initial, DestConnectionID: 5997616a805c84ea7810ee831211451142c9d1b8, SrcConnectionID: 44e5571c, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:27 server Canceling loss detection timer. 2025/04/30 08:48:27 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:48:27 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:48:27 server <- Reading packet 1 (56 bytes) for connection 44e5571c, Initial 2025/04/30 08:48:27 server Long Header{Type: Initial, DestConnectionID: 44e5571c, SrcConnectionID: 5997616a805c84ea7810ee831211451142c9d1b8, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:27 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 200µs} 2025/04/30 08:48:27 server newly acked packets (1): [2] 2025/04/30 08:48:27 server updated RTT: 34.20536ms (σ: 17.10268ms) 2025/04/30 08:48:27 server coalesced packet has different destination connection ID: 00000000, expected 44e5571c 2025/04/30 08:48:27 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:48:27 server -> Sending packet 1 (762 bytes) for connection 8fa6ce240133c3f2734d87d0e1a2874e, Handshake 2025/04/30 08:48:27 server Long Header{Type: Handshake, DestConnectionID: 5997616a805c84ea7810ee831211451142c9d1b8, SrcConnectionID: 44e5571c, PacketNumber: 1, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 08:48:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 08:48:27 server -> Sending packet 2 (762 bytes) for connection 8fa6ce240133c3f2734d87d0e1a2874e, Handshake 2025/04/30 08:48:27 server Long Header{Type: Handshake, DestConnectionID: 5997616a805c84ea7810ee831211451142c9d1b8, SrcConnectionID: 44e5571c, PacketNumber: 2, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 08:48:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 08:48:27 server Parsed a coalesced packet. Part 1: 95 bytes. Remaining: 164 bytes. 2025/04/30 08:48:27 server <- Reading packet 2 (95 bytes) for connection 44e5571c, Handshake 2025/04/30 08:48:27 server Long Header{Type: Handshake, DestConnectionID: 44e5571c, SrcConnectionID: 5997616a805c84ea7810ee831211451142c9d1b8, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:27 server Dropping Initial keys. 2025/04/30 08:48:27 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 504µs} 2025/04/30 08:48:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:27 Retiring connection ID 8fa6ce240133c3f2734d87d0e1a2874e in 5s. 2025/04/30 08:48:27 server Dropping Handshake keys. 2025/04/30 08:48:27 server <- Reading packet 3 (164 bytes) for connection 44e5571c, 1-RTT 2025/04/30 08:48:27 server Short Header{DestConnectionID: 44e5571c, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b6313f3e0b81efae58b4bf8d0d0b9faea67eff01, StatelessResetToken: 0xe5cc119d8bb6f6277a8c27f280fa135b} 2025/04/30 08:48:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bb26d3a835be6d53202f862070ed9d07a5ea529e, StatelessResetToken: 0xb3a2ce92beded37d617c53be35d6ba46} 2025/04/30 08:48:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e44e1f7e9d0ad22fa9a562fdc8d3dc943a9becf2, StatelessResetToken: 0xe3dab5abc69513e1629234adccbaee20} 2025/04/30 08:48:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:27 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:27 Received request: GET /ytioetuihz 2025/04/30 08:48:27 server -> Sending packet 2 (398 bytes) for connection 8fa6ce240133c3f2734d87d0e1a2874e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:27 server Short Header{DestConnectionID: b6313f3e0b81efae58b4bf8d0d0b9faea67eff01, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:27 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 393.767µs} 2025/04/30 08:48:27 server -> &wire.NewTokenFrame{Token: 0x65369f4f06b85cea0fa0542c522159511de40dcd7d6e10af8b2420922fad07c76a1348964fb809ae67c36b2d86e99fda5a57a7eb773cd05ade50a5c65d6f3fae06956e6d987c6dd9bd6b30d7dce3ea658c5800a867ef} 2025/04/30 08:48:27 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 99e5546c, StatelessResetToken: 0x3f5183a1ace3c9b506aba4f12c1b7db0} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 481a2856, StatelessResetToken: 0xfdd8195c905d184276229085fc0b9038} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: be00d178, StatelessResetToken: 0x27872045673ad4746f69c170e09cef3d} 2025/04/30 08:48:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 84fd6b19, StatelessResetToken: 0x19f4d967ba46dea1eb7cb8d45743e061} 2025/04/30 08:48:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 83a8fb3d, StatelessResetToken: 0x4db7540e14d053ef730eb928ad1ca752} 2025/04/30 08:48:27 server -> Sending packet 3 (1280 bytes) for connection 8fa6ce240133c3f2734d87d0e1a2874e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:27 server Short Header{DestConnectionID: b6313f3e0b81efae58b4bf8d0d0b9faea67eff01, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:27 server -> &wire.NewTokenFrame{Token: 0x65369f4f06b85cea0fa0542c522159511de40dcd7d6e10af8b2420922fad07c76a1348964fb809ae67c36b2d86e99fda5a57a7eb773cd05ade50a5c65d6f3fae06956e6d987c6dd9bd6b30d7dce3ea658c5800a867ef} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: be00d178, StatelessResetToken: 0x27872045673ad4746f69c170e09cef3d} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 83a8fb3d, StatelessResetToken: 0x4db7540e14d053ef730eb928ad1ca752} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 84fd6b19, StatelessResetToken: 0x19f4d967ba46dea1eb7cb8d45743e061} 2025/04/30 08:48:27 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 481a2856, StatelessResetToken: 0xfdd8195c905d184276229085fc0b9038} 2025/04/30 08:48:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 99e5546c, StatelessResetToken: 0x3f5183a1ace3c9b506aba4f12c1b7db0} 2025/04/30 08:48:27 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 885, Offset + Data length: 885} 2025/04/30 08:48:27 server -> Sending packet 4 (182 bytes) for connection 8fa6ce240133c3f2734d87d0e1a2874e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:27 server Short Header{DestConnectionID: b6313f3e0b81efae58b4bf8d0d0b9faea67eff01, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 885, Data length: 139, Offset + Data length: 1024} 2025/04/30 08:48:27 server <- Reading packet 5 (67 bytes) for connection 44e5571c, 1-RTT 2025/04/30 08:48:27 server Short Header{DestConnectionID: 44e5571c, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:27 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 240µs} 2025/04/30 08:48:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: fbfbccb4fead4e2d5bf00df113b9e2421d73a095, StatelessResetToken: 0x9e8fc9f05faaff3a8636a6fac03c4a96} 2025/04/30 08:48:27 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:48:27 server -> Sending packet 5 (46 bytes) for connection 8fa6ce240133c3f2734d87d0e1a2874e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:27 server Short Header{DestConnectionID: b6313f3e0b81efae58b4bf8d0d0b9faea67eff01, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:27 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 111.959µs} 2025/04/30 08:48:27 server <- Reading packet 6 (27 bytes) for connection 44e5571c, 1-RTT 2025/04/30 08:48:27 server Short Header{DestConnectionID: 44e5571c, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:27 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 184µs} 2025/04/30 08:48:27 server newly acked packets (1): [3] 2025/04/30 08:48:27 server updated RTT: 33.965ms (σ: 13.306ms) 2025/04/30 08:48:27 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:27 server <- Reading packet 7 (32 bytes) for connection 44e5571c, 1-RTT 2025/04/30 08:48:27 server Short Header{DestConnectionID: 44e5571c, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:27 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:27 Replacing connection for connection IDs [44e5571c 481a2856 83a8fb3d 84fd6b19 99e5546c be00d178] with a closed connection. 2025/04/30 08:48:27 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:27 server Connection 8fa6ce240133c3f2734d87d0e1a2874e closed. 2025/04/30 08:48:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 08:48:28 server -> Sending packet 27 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:28 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:28 server -> Sending packet 28 (1065 bytes) for connection ee76bf3598dd514b178663581778a2e3, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:28 server Short Header{DestConnectionID: 2faa36b9a5c75c2561cf70d2c9cf40e8e6cff045, PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:28 server <- Received Initial packet. 2025/04/30 08:48:28 Created qlog file: /logs/qlog/beede84d3bddba44b4303cd9e3666562.sqlog 2025/04/30 08:48:28 server Changing connection ID to c4f18f5a. 2025/04/30 08:48:28 Adding connection IDs beede84d3bddba44b4303cd9e3666562 and c4f18f5a for a new connection. 2025/04/30 08:48:28 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:28 server <- Reading packet 0 (333 bytes) for connection beede84d3bddba44b4303cd9e3666562, Initial 2025/04/30 08:48:28 server Long Header{Type: Initial, DestConnectionID: beede84d3bddba44b4303cd9e3666562, SrcConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:28 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:28 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:28 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:28 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:28 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:28 Adding connection ID f34ee2d5. 2025/04/30 08:48:28 Adding connection ID b2452728. 2025/04/30 08:48:28 Adding connection ID d3982a83. 2025/04/30 08:48:28 Adding connection ID b995d6a7. 2025/04/30 08:48:28 Adding connection ID 0852869e. 2025/04/30 08:48:28 server coalesced packet has different destination connection ID: 00000000, expected beede84d3bddba44b4303cd9e3666562 2025/04/30 08:48:28 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection beede84d3bddba44b4303cd9e3666562 2025/04/30 08:48:28 server Long Header{Type: Initial, DestConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, SrcConnectionID: c4f18f5a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 321, Version: v1} 2025/04/30 08:48:28 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:28 server Long Header{Type: Handshake, DestConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, SrcConnectionID: c4f18f5a, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 08:48:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 08:48:28 server Short Header{DestConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 0852869e, StatelessResetToken: 0xbe26ca480bab194116a87c6c71055c8e} 2025/04/30 08:48:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f34ee2d5, StatelessResetToken: 0x5c37775da0fc77ca2c4ef5beb5cd741d} 2025/04/30 08:48:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b2452728, StatelessResetToken: 0xece782ea34b51719e8e4646e026a1f3a} 2025/04/30 08:48:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b995d6a7, StatelessResetToken: 0x22d884138b00f232aa8605a974cbe243} 2025/04/30 08:48:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d3982a83, StatelessResetToken: 0xbf7286d9596409f32da0d55f7af2c72f} 2025/04/30 08:48:28 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:48:28 server -> Sending packet 1 (1280 bytes) for connection beede84d3bddba44b4303cd9e3666562, Initial 2025/04/30 08:48:28 server Long Header{Type: Initial, DestConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, SrcConnectionID: c4f18f5a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:28 server -> Sending packet 2 (1280 bytes) for connection beede84d3bddba44b4303cd9e3666562, Initial 2025/04/30 08:48:28 server Long Header{Type: Initial, DestConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, SrcConnectionID: c4f18f5a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:28 server Canceling loss detection timer. 2025/04/30 08:48:28 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:48:29 server Parsed a coalesced packet. Part 1: 329 bytes. Remaining: 871 bytes. 2025/04/30 08:48:29 server <- Reading packet 2 (329 bytes) for connection c4f18f5a, Initial 2025/04/30 08:48:29 server Long Header{Type: Initial, DestConnectionID: c4f18f5a, SrcConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 295, Version: v1} 2025/04/30 08:48:29 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 764.224ms} 2025/04/30 08:48:29 server newly acked packets (1): [2] 2025/04/30 08:48:29 server updated RTT: 798.473906ms (σ: 399.236953ms) 2025/04/30 08:48:29 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:29 server coalesced packet has different destination connection ID: 00000000, expected c4f18f5a 2025/04/30 08:48:29 server -> Sending packet 3 (59 bytes) for connection beede84d3bddba44b4303cd9e3666562, Initial 2025/04/30 08:48:29 server Long Header{Type: Initial, DestConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, SrcConnectionID: c4f18f5a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 08:48:29 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s} 2025/04/30 08:48:29 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:48:29 server <- Reading packet 3 (56 bytes) for connection c4f18f5a, Initial 2025/04/30 08:48:29 server Long Header{Type: Initial, DestConnectionID: c4f18f5a, SrcConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:29 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 112µs} 2025/04/30 08:48:29 server coalesced packet has different destination connection ID: 00000000, expected c4f18f5a 2025/04/30 08:48:29 Removing connection ID b6d488943f4a9d3786308d64172d8591 after it has been retired. 2025/04/30 08:48:29 server <- Reading packet 4 (54 bytes) for connection c4f18f5a, Handshake 2025/04/30 08:48:29 server Long Header{Type: Handshake, DestConnectionID: c4f18f5a, SrcConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, PacketNumber: 4, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 08:48:29 server Dropping Initial keys. 2025/04/30 08:48:29 server <- &wire.PingFrame{} 2025/04/30 08:48:29 server -> Sending packet 1 (56 bytes) for connection beede84d3bddba44b4303cd9e3666562, Handshake 2025/04/30 08:48:29 server Long Header{Type: Handshake, DestConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, SrcConnectionID: c4f18f5a, PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 08:48:29 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s} 2025/04/30 08:48:29 server <- Reading packet 5 (54 bytes) for connection c4f18f5a, Handshake 2025/04/30 08:48:29 server Long Header{Type: Handshake, DestConnectionID: c4f18f5a, SrcConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, PacketNumber: 5, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 08:48:29 server <- &wire.PingFrame{} 2025/04/30 08:48:29 server -> Sending packet 2 (56 bytes) for connection beede84d3bddba44b4303cd9e3666562, Handshake 2025/04/30 08:48:29 server Long Header{Type: Handshake, DestConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, SrcConnectionID: c4f18f5a, PacketNumber: 2, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 08:48:29 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 0s} 2025/04/30 08:48:29 server <- Reading packet 6 (54 bytes) for connection c4f18f5a, Handshake 2025/04/30 08:48:29 server Long Header{Type: Handshake, DestConnectionID: c4f18f5a, SrcConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, PacketNumber: 6, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 08:48:29 server <- &wire.PingFrame{} 2025/04/30 08:48:29 server -> Sending packet 3 (56 bytes) for connection beede84d3bddba44b4303cd9e3666562, Handshake 2025/04/30 08:48:29 server Long Header{Type: Handshake, DestConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, SrcConnectionID: c4f18f5a, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 08:48:29 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 0s} 2025/04/30 08:48:29 Tracking 40 connection IDs and 2 reset tokens. 2025/04/30 08:48:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 08:48:30 server -> Sending packet 20 (273 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:30 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:30 server -> &wire.NewTokenFrame{Token: 0xd80029404b3024ee6601f2c9af1704bcd92467e6044eb968a91c15e07f80d2047b7b4e072ac2dc4188eb6f699d2ba81a3f93fdb7eb6efc288da67ae69fad71392a6e384156677563a286513a4ff40d0c2957dc053074} 2025/04/30 08:48:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:30 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:30 server Skipping packet number 19 2025/04/30 08:48:30 server -> Sending packet 21 (1065 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:30 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:30 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:48:30 server -> Sending packet 4 (766 bytes) for connection beede84d3bddba44b4303cd9e3666562, Handshake 2025/04/30 08:48:30 server Long Header{Type: Handshake, DestConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, SrcConnectionID: c4f18f5a, PacketNumber: 4, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 08:48:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 08:48:30 server -> Sending packet 5 (766 bytes) for connection beede84d3bddba44b4303cd9e3666562, Handshake 2025/04/30 08:48:30 server Long Header{Type: Handshake, DestConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, SrcConnectionID: c4f18f5a, PacketNumber: 5, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 08:48:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 08:48:30 server Parsed a coalesced packet. Part 1: 96 bytes. Remaining: 164 bytes. 2025/04/30 08:48:30 server <- Reading packet 7 (96 bytes) for connection c4f18f5a, Handshake 2025/04/30 08:48:30 server Long Header{Type: Handshake, DestConnectionID: c4f18f5a, SrcConnectionID: 01e5733bbf5a3f1f43d41198647e6a0d6b35fea8, PacketNumber: 7, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:30 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 512µs} 2025/04/30 08:48:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:30 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:30 Retiring connection ID beede84d3bddba44b4303cd9e3666562 in 5s. 2025/04/30 08:48:30 server Dropping Handshake keys. 2025/04/30 08:48:30 server <- Reading packet 8 (164 bytes) for connection c4f18f5a, 1-RTT 2025/04/30 08:48:30 server Short Header{DestConnectionID: c4f18f5a, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:30 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9e34937938d9f16ec66be92f82c0627aabaed634, StatelessResetToken: 0xea85eaa6a15d660d5d26ef839ea36cb2} 2025/04/30 08:48:30 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5499b622af30ee2e66d50a3233c5c3368794c551, StatelessResetToken: 0xbcaeab956a114c5016b3c1ecf664cba8} 2025/04/30 08:48:30 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9374dc762748b3c193fc0d245dbca70363d03c46, StatelessResetToken: 0x6cabf8e1ff1d1b5854f2ef0d7953cf24} 2025/04/30 08:48:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:30 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:30 server Dropping %!s(logging.PacketType=1) packet (55 bytes) because we already dropped the keys. 2025/04/30 08:48:30 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:30 Received request: GET /tnjcopklku 2025/04/30 08:48:30 server -> Sending packet 2 (398 bytes) for connection beede84d3bddba44b4303cd9e3666562, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:30 server Short Header{DestConnectionID: 9e34937938d9f16ec66be92f82c0627aabaed634, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:30 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 318.836µs} 2025/04/30 08:48:30 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b2452728, StatelessResetToken: 0xece782ea34b51719e8e4646e026a1f3a} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f34ee2d5, StatelessResetToken: 0x5c37775da0fc77ca2c4ef5beb5cd741d} 2025/04/30 08:48:30 server -> &wire.NewTokenFrame{Token: 0x6f0b4e01b8f509fcddfdfc4d4851ab3a7c5b36bf6f74e76602882a3976a13ef60a0cb75e7ceeab622950710b9c0163bac50750c82fc7befa4bb6ca728d39ec7e0802176f96c6d2952fbf8e83d6cb47f614461cb6a63a} 2025/04/30 08:48:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d3982a83, StatelessResetToken: 0xbf7286d9596409f32da0d55f7af2c72f} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 0852869e, StatelessResetToken: 0xbe26ca480bab194116a87c6c71055c8e} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b995d6a7, StatelessResetToken: 0x22d884138b00f232aa8605a974cbe243} 2025/04/30 08:48:30 server -> Sending packet 3 (1280 bytes) for connection beede84d3bddba44b4303cd9e3666562, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:30 server Short Header{DestConnectionID: 9e34937938d9f16ec66be92f82c0627aabaed634, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:30 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 0852869e, StatelessResetToken: 0xbe26ca480bab194116a87c6c71055c8e} 2025/04/30 08:48:30 server -> &wire.NewTokenFrame{Token: 0x6f0b4e01b8f509fcddfdfc4d4851ab3a7c5b36bf6f74e76602882a3976a13ef60a0cb75e7ceeab622950710b9c0163bac50750c82fc7befa4bb6ca728d39ec7e0802176f96c6d2952fbf8e83d6cb47f614461cb6a63a} 2025/04/30 08:48:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b2452728, StatelessResetToken: 0xece782ea34b51719e8e4646e026a1f3a} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d3982a83, StatelessResetToken: 0xbf7286d9596409f32da0d55f7af2c72f} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f34ee2d5, StatelessResetToken: 0x5c37775da0fc77ca2c4ef5beb5cd741d} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b995d6a7, StatelessResetToken: 0x22d884138b00f232aa8605a974cbe243} 2025/04/30 08:48:30 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 885, Offset + Data length: 885} 2025/04/30 08:48:30 server -> Sending packet 4 (182 bytes) for connection beede84d3bddba44b4303cd9e3666562, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:30 server Short Header{DestConnectionID: 9e34937938d9f16ec66be92f82c0627aabaed634, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 885, Data length: 139, Offset + Data length: 1024} 2025/04/30 08:48:30 server <- Reading packet 10 (67 bytes) for connection c4f18f5a, 1-RTT 2025/04/30 08:48:30 server Short Header{DestConnectionID: c4f18f5a, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:30 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 224µs} 2025/04/30 08:48:30 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 2f9f2fc4666c2f7ce221107c4342459e7dd002df, StatelessResetToken: 0x2b120ddec687d18c4b225a00bc512caf} 2025/04/30 08:48:30 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:48:30 server -> Sending packet 5 (46 bytes) for connection beede84d3bddba44b4303cd9e3666562, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:30 server Short Header{DestConnectionID: 9e34937938d9f16ec66be92f82c0627aabaed634, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:30 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 8, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}}, DelayTime: 114.424µs} 2025/04/30 08:48:30 Removing connection ID d0b6ac430d966f59470d19e0fbc0d3b6 after it has been retired. 2025/04/30 08:48:30 server <- Received Initial packet. 2025/04/30 08:48:30 Created qlog file: /logs/qlog/33788c12fbf82801c9079093c863de56.sqlog 2025/04/30 08:48:30 server Changing connection ID to e5285903. 2025/04/30 08:48:30 Adding connection IDs 33788c12fbf82801c9079093c863de56 and e5285903 for a new connection. 2025/04/30 08:48:30 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:30 server <- Reading packet 0 (333 bytes) for connection 33788c12fbf82801c9079093c863de56, Initial 2025/04/30 08:48:30 server Long Header{Type: Initial, DestConnectionID: 33788c12fbf82801c9079093c863de56, SrcConnectionID: d8150ee5add48677779bcb27135a24142d268dcb, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:30 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:30 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:30 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:30 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d8150ee5add48677779bcb27135a24142d268dcb, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:30 Adding connection ID bc117a46. 2025/04/30 08:48:30 Adding connection ID 05245f64. 2025/04/30 08:48:30 Adding connection ID 0b86648e. 2025/04/30 08:48:30 Adding connection ID 77d02e9c. 2025/04/30 08:48:30 Adding connection ID 7cc326a3. 2025/04/30 08:48:30 server coalesced packet has different destination connection ID: 00000000, expected 33788c12fbf82801c9079093c863de56 2025/04/30 08:48:30 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 33788c12fbf82801c9079093c863de56 2025/04/30 08:48:30 server Long Header{Type: Initial, DestConnectionID: d8150ee5add48677779bcb27135a24142d268dcb, SrcConnectionID: e5285903, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 322, Version: v1} 2025/04/30 08:48:30 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:30 server Long Header{Type: Handshake, DestConnectionID: d8150ee5add48677779bcb27135a24142d268dcb, SrcConnectionID: e5285903, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 08:48:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 08:48:30 server Short Header{DestConnectionID: d8150ee5add48677779bcb27135a24142d268dcb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 05245f64, StatelessResetToken: 0x2dcaa306f45bef5bbc927021559da865} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0b86648e, StatelessResetToken: 0x26d69d369a79355b221364cb8795ee08} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bc117a46, StatelessResetToken: 0x4954669827056b1a3b64e167d3175b26} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 77d02e9c, StatelessResetToken: 0xaf4485ce484f705a032062744cc746da} 2025/04/30 08:48:30 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 7cc326a3, StatelessResetToken: 0xd92bc67743212d30a228b15f2cae3416} 2025/04/30 08:48:30 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:30 server <- Reading packet 1 (57 bytes) for connection e5285903, Initial 2025/04/30 08:48:30 server Long Header{Type: Initial, DestConnectionID: e5285903, SrcConnectionID: d8150ee5add48677779bcb27135a24142d268dcb, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:30 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 744µs} 2025/04/30 08:48:30 server newly acked packets (1): [0] 2025/04/30 08:48:30 server updated RTT: 33.771424ms (σ: 16.885712ms) 2025/04/30 08:48:30 server Parsed a coalesced packet. Part 2: 96 bytes. Remaining: 1197 bytes. 2025/04/30 08:48:30 server <- Reading packet 2 (96 bytes) for connection e5285903, Handshake 2025/04/30 08:48:30 server Long Header{Type: Handshake, DestConnectionID: e5285903, SrcConnectionID: d8150ee5add48677779bcb27135a24142d268dcb, PacketNumber: 2, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:30 server Dropping Initial keys. 2025/04/30 08:48:30 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 576µs} 2025/04/30 08:48:30 server newly acked packets (1): [0] 2025/04/30 08:48:30 server updated RTT: 33.771ms (σ: 12.663ms) 2025/04/30 08:48:30 server Canceling loss detection timer. 2025/04/30 08:48:30 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:30 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:30 Retiring connection ID 33788c12fbf82801c9079093c863de56 in 5s. 2025/04/30 08:48:30 server Dropping Handshake keys. 2025/04/30 08:48:30 server <- Reading packet 3 (1197 bytes) for connection e5285903, 1-RTT 2025/04/30 08:48:30 server Short Header{DestConnectionID: e5285903, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:30 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256µs} 2025/04/30 08:48:30 server newly acked packets (1): [0] 2025/04/30 08:48:30 server updated RTT: 33.771ms (σ: 9.497ms) 2025/04/30 08:48:30 server Canceling loss detection timer. 2025/04/30 08:48:30 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e5edecd0709aeaaeea44b5484d9e8097ba535383, StatelessResetToken: 0xffa4692047285081258a16ec78552a12} 2025/04/30 08:48:30 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5f5103b1a464ff13c6529004c0de3ce68d6817b0, StatelessResetToken: 0x3cc5dc1f16e2d2ea23f10949f9f64af6} 2025/04/30 08:48:30 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 93b57eaefd996d936fb54cbb37166592f075f51b, StatelessResetToken: 0xd343784d5c28a96c88a3bdb2bc370f6c} 2025/04/30 08:48:30 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:30 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:30 server -> Sending packet 1 (278 bytes) for connection 33788c12fbf82801c9079093c863de56, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:30 server Short Header{DestConnectionID: e5edecd0709aeaaeea44b5484d9e8097ba535383, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:30 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 462.054µs} 2025/04/30 08:48:30 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:30 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:30 server -> &wire.NewTokenFrame{Token: 0xfbd3c7d754e351b697523906cb49c0d5c571a9221081a7a072652f98aa48e8fe82d816b5ce74b9823e42820b2816119d1310479a0df1cc42775845128c477b6944ac95742f1169a661e1c6dc3c389ed59b574f4191f4} 2025/04/30 08:48:30 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:30 Received request: GET /enoawdylbk 2025/04/30 08:48:30 server -> Sending packet 2 (1065 bytes) for connection 33788c12fbf82801c9079093c863de56, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:30 server Short Header{DestConnectionID: e5edecd0709aeaaeea44b5484d9e8097ba535383, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:30 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:30 server <- Reading packet 4 (67 bytes) for connection e5285903, 1-RTT 2025/04/30 08:48:30 server Short Header{DestConnectionID: e5285903, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:30 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 160µs} 2025/04/30 08:48:30 server newly acked packets (1): [1] 2025/04/30 08:48:30 server updated RTT: 33.465ms (σ: 7.733ms) 2025/04/30 08:48:30 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:30 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: f549f2f857dbe3840c867aff325aa221f38be1f3, StatelessResetToken: 0xcd2fdb8661453f222153057c98e949e8} 2025/04/30 08:48:30 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:30 server Ignoring all packets below 4. 2025/04/30 08:48:30 server <- Reading packet 5 (32 bytes) for connection e5285903, 1-RTT 2025/04/30 08:48:30 server Short Header{DestConnectionID: e5285903, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:30 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:30 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:30 Replacing connection for connection IDs [e5285903 bc117a46 05245f64 0b86648e 77d02e9c 7cc326a3] with a closed connection. 2025/04/30 08:48:30 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:30 server Connection 33788c12fbf82801c9079093c863de56 closed. 2025/04/30 08:48:30 Removing connection IDs [79620a55 01d085c6 ff9fdd99 8cdff25a 290c71e3 f3f265a7] for a closed connection after it has been retired. 2025/04/30 08:48:31 server <- Received Initial packet. 2025/04/30 08:48:31 Created qlog file: /logs/qlog/0afb7ca53f6c2978accdfdd42d52846a.sqlog 2025/04/30 08:48:31 server Changing connection ID to 75686ad8. 2025/04/30 08:48:31 Adding connection IDs 0afb7ca53f6c2978accdfdd42d52846a and 75686ad8 for a new connection. 2025/04/30 08:48:31 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:31 server <- Reading packet 0 (333 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a, Initial 2025/04/30 08:48:31 server Long Header{Type: Initial, DestConnectionID: 0afb7ca53f6c2978accdfdd42d52846a, SrcConnectionID: 42518ff5178c71adbb0bcf5e1f9ba30c647d5174, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:31 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:31 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:31 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:31 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 42518ff5178c71adbb0bcf5e1f9ba30c647d5174, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:31 Adding connection ID 2a6895d4. 2025/04/30 08:48:31 Adding connection ID b833bf32. 2025/04/30 08:48:31 Adding connection ID 684a6de4. 2025/04/30 08:48:31 Adding connection ID 9d783d88. 2025/04/30 08:48:31 Adding connection ID 1292e2f0. 2025/04/30 08:48:31 server coalesced packet has different destination connection ID: 00000000, expected 0afb7ca53f6c2978accdfdd42d52846a 2025/04/30 08:48:31 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a 2025/04/30 08:48:31 server Long Header{Type: Initial, DestConnectionID: 42518ff5178c71adbb0bcf5e1f9ba30c647d5174, SrcConnectionID: 75686ad8, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 324, Version: v1} 2025/04/30 08:48:31 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:31 server Long Header{Type: Handshake, DestConnectionID: 42518ff5178c71adbb0bcf5e1f9ba30c647d5174, SrcConnectionID: 75686ad8, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 08:48:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 08:48:31 server Short Header{DestConnectionID: 42518ff5178c71adbb0bcf5e1f9ba30c647d5174, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b833bf32, StatelessResetToken: 0x85647c4b29e34515cd14d0e2a3ace91e} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2a6895d4, StatelessResetToken: 0x0a070e9157fce68974643095ddac5efe} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9d783d88, StatelessResetToken: 0xf64463b9dc1f0a7b81ff97b50aebd36a} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1292e2f0, StatelessResetToken: 0xe34adcfb442253457e9500a7ca8d1211} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 684a6de4, StatelessResetToken: 0x6a5b685a6cafdd5e38a3573c81029566} 2025/04/30 08:48:31 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:48:31 server -> Sending packet 1 (1280 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a, Initial 2025/04/30 08:48:31 server Long Header{Type: Initial, DestConnectionID: 42518ff5178c71adbb0bcf5e1f9ba30c647d5174, SrcConnectionID: 75686ad8, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:31 server -> Sending packet 2 (1280 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a, Initial 2025/04/30 08:48:31 server Long Header{Type: Initial, DestConnectionID: 42518ff5178c71adbb0bcf5e1f9ba30c647d5174, SrcConnectionID: 75686ad8, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:31 server Canceling loss detection timer. 2025/04/30 08:48:31 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:48:31 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:48:31 server <- Reading packet 1 (56 bytes) for connection 75686ad8, Initial 2025/04/30 08:48:31 server Long Header{Type: Initial, DestConnectionID: 75686ad8, SrcConnectionID: 42518ff5178c71adbb0bcf5e1f9ba30c647d5174, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:31 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 264µs} 2025/04/30 08:48:31 server coalesced packet has different destination connection ID: 00000000, expected 75686ad8 2025/04/30 08:48:31 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:48:31 server -> Sending packet 1 (763 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a, Handshake 2025/04/30 08:48:31 server Long Header{Type: Handshake, DestConnectionID: 42518ff5178c71adbb0bcf5e1f9ba30c647d5174, SrcConnectionID: 75686ad8, PacketNumber: 1, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 08:48:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 08:48:31 server -> Sending packet 2 (763 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a, Handshake 2025/04/30 08:48:31 server Long Header{Type: Handshake, DestConnectionID: 42518ff5178c71adbb0bcf5e1f9ba30c647d5174, SrcConnectionID: 75686ad8, PacketNumber: 2, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 08:48:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 08:48:31 server Parsed a coalesced packet. Part 1: 95 bytes. Remaining: 164 bytes. 2025/04/30 08:48:31 server <- Reading packet 3 (95 bytes) for connection 75686ad8, Handshake 2025/04/30 08:48:31 server Long Header{Type: Handshake, DestConnectionID: 75686ad8, SrcConnectionID: 42518ff5178c71adbb0bcf5e1f9ba30c647d5174, PacketNumber: 3, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:31 server Dropping Initial keys. 2025/04/30 08:48:31 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 504µs} 2025/04/30 08:48:31 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:31 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:31 Retiring connection ID 0afb7ca53f6c2978accdfdd42d52846a in 5s. 2025/04/30 08:48:31 server Dropping Handshake keys. 2025/04/30 08:48:31 server <- Reading packet 4 (164 bytes) for connection 75686ad8, 1-RTT 2025/04/30 08:48:31 server Short Header{DestConnectionID: 75686ad8, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:31 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ed4fb06d5ff8fa7e79cf1ff5b5d581814ef01df1, StatelessResetToken: 0x4cf9d0fddfabaf0881c32fd72591f384} 2025/04/30 08:48:31 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 47dafb60c57bbff7133f91cf421c274c3adac03b, StatelessResetToken: 0xd09bee57749f1cbbd88873b2d469ada3} 2025/04/30 08:48:31 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 213be923338c1f1f3b730c466b881a970f113d55, StatelessResetToken: 0xe3bfb7156dd459976e2f95f47aa3039c} 2025/04/30 08:48:31 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:31 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:31 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:31 server -> Sending packet 2 (395 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:31 server Short Header{DestConnectionID: ed4fb06d5ff8fa7e79cf1ff5b5d581814ef01df1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:31 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 312.203µs} 2025/04/30 08:48:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:48:31 server -> &wire.NewTokenFrame{Token: 0x92738e75e527037945d71dfb3d6398abb3a0bebc59ca1f015e98616defdab4b0aea8245529ef23cfa75646e81b106d2b45de281119673d933c04403c9db7cb0319132341a944b170e8dd2cea9ac465e0b0c7932cf2c5} 2025/04/30 08:48:31 Received request: GET /ihxaydzldx 2025/04/30 08:48:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 684a6de4, StatelessResetToken: 0x6a5b685a6cafdd5e38a3573c81029566} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1292e2f0, StatelessResetToken: 0xe34adcfb442253457e9500a7ca8d1211} 2025/04/30 08:48:31 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2a6895d4, StatelessResetToken: 0x0a070e9157fce68974643095ddac5efe} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9d783d88, StatelessResetToken: 0xf64463b9dc1f0a7b81ff97b50aebd36a} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b833bf32, StatelessResetToken: 0x85647c4b29e34515cd14d0e2a3ace91e} 2025/04/30 08:48:31 server -> Sending packet 3 (1280 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:31 server Short Header{DestConnectionID: ed4fb06d5ff8fa7e79cf1ff5b5d581814ef01df1, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2a6895d4, StatelessResetToken: 0x0a070e9157fce68974643095ddac5efe} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b833bf32, StatelessResetToken: 0x85647c4b29e34515cd14d0e2a3ace91e} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9d783d88, StatelessResetToken: 0xf64463b9dc1f0a7b81ff97b50aebd36a} 2025/04/30 08:48:31 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 684a6de4, StatelessResetToken: 0x6a5b685a6cafdd5e38a3573c81029566} 2025/04/30 08:48:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1292e2f0, StatelessResetToken: 0xe34adcfb442253457e9500a7ca8d1211} 2025/04/30 08:48:31 server -> &wire.NewTokenFrame{Token: 0x92738e75e527037945d71dfb3d6398abb3a0bebc59ca1f015e98616defdab4b0aea8245529ef23cfa75646e81b106d2b45de281119673d933c04403c9db7cb0319132341a944b170e8dd2cea9ac465e0b0c7932cf2c5} 2025/04/30 08:48:31 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 888, Offset + Data length: 888} 2025/04/30 08:48:31 server -> Sending packet 4 (1315 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:31 server Short Header{DestConnectionID: ed4fb06d5ff8fa7e79cf1ff5b5d581814ef01df1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:31 server -> &wire.PingFrame{} 2025/04/30 08:48:31 server -> Sending packet 5 (179 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:31 server Short Header{DestConnectionID: ed4fb06d5ff8fa7e79cf1ff5b5d581814ef01df1, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:31 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 888, Data length: 136, Offset + Data length: 1024} 2025/04/30 08:48:31 server <- Reading packet 6 (29 bytes) for connection 75686ad8, 1-RTT 2025/04/30 08:48:31 server Short Header{DestConnectionID: 75686ad8, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:31 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 48µs} 2025/04/30 08:48:31 server newly acked packets (1): [4] 2025/04/30 08:48:31 server updated RTT: 33.430749ms (σ: 16.715374ms) 2025/04/30 08:48:31 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:31 server setting loss timer for packet 3 (1-RTT) to 37.609592ms (in 2025-04-30 08:48:31.620372422 +0000 UTC m=+35.877425622) 2025/04/30 08:48:31 server <- Reading packet 7 (29 bytes) for connection 75686ad8, 1-RTT 2025/04/30 08:48:31 server Short Header{DestConnectionID: 75686ad8, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:31 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 32µs} 2025/04/30 08:48:31 server newly acked packets (1): [5] 2025/04/30 08:48:31 server updated RTT: 33.391ms (σ: 12.613ms) 2025/04/30 08:48:31 server setting loss timer for packet 3 (1-RTT) to 37.564875ms (in 2025-04-30 08:48:31.620327705 +0000 UTC m=+35.877380905) 2025/04/30 08:48:31 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 08:48:31.620327705 +0000 UTC m=+35.877380905 2025/04/30 08:48:31 server lost packet 3 (time threshold) 2025/04/30 08:48:31 server Canceling loss detection timer. 2025/04/30 08:48:31 server -> Sending packet 6 (1280 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:31 server Short Header{DestConnectionID: ed4fb06d5ff8fa7e79cf1ff5b5d581814ef01df1, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1292e2f0, StatelessResetToken: 0xe34adcfb442253457e9500a7ca8d1211} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 684a6de4, StatelessResetToken: 0x6a5b685a6cafdd5e38a3573c81029566} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b833bf32, StatelessResetToken: 0x85647c4b29e34515cd14d0e2a3ace91e} 2025/04/30 08:48:31 server -> &wire.NewTokenFrame{Token: 0x92738e75e527037945d71dfb3d6398abb3a0bebc59ca1f015e98616defdab4b0aea8245529ef23cfa75646e81b106d2b45de281119673d933c04403c9db7cb0319132341a944b170e8dd2cea9ac465e0b0c7932cf2c5} 2025/04/30 08:48:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9d783d88, StatelessResetToken: 0xf64463b9dc1f0a7b81ff97b50aebd36a} 2025/04/30 08:48:31 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2a6895d4, StatelessResetToken: 0x0a070e9157fce68974643095ddac5efe} 2025/04/30 08:48:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:31 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 888, Offset + Data length: 888} 2025/04/30 08:48:31 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:31 server -> Sending packet 8 (1280 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:31 server Short Header{DestConnectionID: ed4fb06d5ff8fa7e79cf1ff5b5d581814ef01df1, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 684a6de4, StatelessResetToken: 0x6a5b685a6cafdd5e38a3573c81029566} 2025/04/30 08:48:31 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1292e2f0, StatelessResetToken: 0xe34adcfb442253457e9500a7ca8d1211} 2025/04/30 08:48:31 server -> &wire.NewTokenFrame{Token: 0x92738e75e527037945d71dfb3d6398abb3a0bebc59ca1f015e98616defdab4b0aea8245529ef23cfa75646e81b106d2b45de281119673d933c04403c9db7cb0319132341a944b170e8dd2cea9ac465e0b0c7932cf2c5} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9d783d88, StatelessResetToken: 0xf64463b9dc1f0a7b81ff97b50aebd36a} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b833bf32, StatelessResetToken: 0x85647c4b29e34515cd14d0e2a3ace91e} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2a6895d4, StatelessResetToken: 0x0a070e9157fce68974643095ddac5efe} 2025/04/30 08:48:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:31 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 888, Offset + Data length: 888} 2025/04/30 08:48:31 server -> Sending packet 9 (1280 bytes) for connection 0afb7ca53f6c2978accdfdd42d52846a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:31 server Short Header{DestConnectionID: ed4fb06d5ff8fa7e79cf1ff5b5d581814ef01df1, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:31 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:48:31 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 684a6de4, StatelessResetToken: 0x6a5b685a6cafdd5e38a3573c81029566} 2025/04/30 08:48:31 server -> &wire.NewTokenFrame{Token: 0x92738e75e527037945d71dfb3d6398abb3a0bebc59ca1f015e98616defdab4b0aea8245529ef23cfa75646e81b106d2b45de281119673d933c04403c9db7cb0319132341a944b170e8dd2cea9ac465e0b0c7932cf2c5} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 1292e2f0, StatelessResetToken: 0xe34adcfb442253457e9500a7ca8d1211} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9d783d88, StatelessResetToken: 0xf64463b9dc1f0a7b81ff97b50aebd36a} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2a6895d4, StatelessResetToken: 0x0a070e9157fce68974643095ddac5efe} 2025/04/30 08:48:31 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:31 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b833bf32, StatelessResetToken: 0x85647c4b29e34515cd14d0e2a3ace91e} 2025/04/30 08:48:31 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 888, Offset + Data length: 888} 2025/04/30 08:48:31 server <- Reading packet 8 (31 bytes) for connection 75686ad8, 1-RTT 2025/04/30 08:48:31 server Short Header{DestConnectionID: 75686ad8, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:31 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 120.4ms} 2025/04/30 08:48:31 server <- &wire.PingFrame{} 2025/04/30 08:48:31 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:31 Tracking 47 connection IDs and 4 reset tokens. 2025/04/30 08:48:31 server <- Reading packet 9 (32 bytes) for connection 75686ad8, 1-RTT 2025/04/30 08:48:31 server Short Header{DestConnectionID: 75686ad8, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:31 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:31 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:31 Replacing connection for connection IDs [75686ad8 2a6895d4 b833bf32 684a6de4 9d783d88 1292e2f0] with a closed connection. 2025/04/30 08:48:31 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:31 server Connection 0afb7ca53f6c2978accdfdd42d52846a closed. 2025/04/30 08:48:32 server <- Received Initial packet. 2025/04/30 08:48:32 Created qlog file: /logs/qlog/0e26fa4bdcad762037ebd60c34829c0e.sqlog 2025/04/30 08:48:32 server Changing connection ID to 4cc75188. 2025/04/30 08:48:32 Adding connection IDs 0e26fa4bdcad762037ebd60c34829c0e and 4cc75188 for a new connection. 2025/04/30 08:48:32 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:32 server <- Reading packet 0 (333 bytes) for connection 0e26fa4bdcad762037ebd60c34829c0e, Initial 2025/04/30 08:48:32 server Long Header{Type: Initial, DestConnectionID: 0e26fa4bdcad762037ebd60c34829c0e, SrcConnectionID: 6f49813a26a832654467f4c15dfbf9d5a878b968, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:32 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:32 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:32 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:32 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6f49813a26a832654467f4c15dfbf9d5a878b968, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:32 Adding connection ID a967b3a4. 2025/04/30 08:48:32 Adding connection ID ed9ba5c9. 2025/04/30 08:48:32 Adding connection ID bdbbb296. 2025/04/30 08:48:32 Adding connection ID bc6dbb09. 2025/04/30 08:48:32 Adding connection ID a032101f. 2025/04/30 08:48:32 server coalesced packet has different destination connection ID: 00000000, expected 0e26fa4bdcad762037ebd60c34829c0e 2025/04/30 08:48:32 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0e26fa4bdcad762037ebd60c34829c0e 2025/04/30 08:48:32 server Long Header{Type: Initial, DestConnectionID: 6f49813a26a832654467f4c15dfbf9d5a878b968, SrcConnectionID: 4cc75188, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 326, Version: v1} 2025/04/30 08:48:32 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:32 server Long Header{Type: Handshake, DestConnectionID: 6f49813a26a832654467f4c15dfbf9d5a878b968, SrcConnectionID: 4cc75188, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 08:48:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 08:48:32 server Short Header{DestConnectionID: 6f49813a26a832654467f4c15dfbf9d5a878b968, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a967b3a4, StatelessResetToken: 0xa823241ba8a0a8a9341b5f015fcb54eb} 2025/04/30 08:48:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a032101f, StatelessResetToken: 0x256561090b8e734be0e25969c9ce6ae0} 2025/04/30 08:48:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bdbbb296, StatelessResetToken: 0x83caa902c841846c9b072cbe93aebeb1} 2025/04/30 08:48:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bc6dbb09, StatelessResetToken: 0xbf94a832b33f8c247c7138d625c57da6} 2025/04/30 08:48:32 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ed9ba5c9, StatelessResetToken: 0x8cdc3d5d0ee406f8793501f442a6f32b} 2025/04/30 08:48:32 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:32 server <- Reading packet 1 (57 bytes) for connection 4cc75188, Initial 2025/04/30 08:48:32 server Long Header{Type: Initial, DestConnectionID: 4cc75188, SrcConnectionID: 6f49813a26a832654467f4c15dfbf9d5a878b968, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 616µs} 2025/04/30 08:48:32 server newly acked packets (1): [0] 2025/04/30 08:48:32 server updated RTT: 33.818326ms (σ: 16.909163ms) 2025/04/30 08:48:32 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:32 server <- Reading packet 2 (95 bytes) for connection 4cc75188, Handshake 2025/04/30 08:48:32 server Long Header{Type: Handshake, DestConnectionID: 4cc75188, SrcConnectionID: 6f49813a26a832654467f4c15dfbf9d5a878b968, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:32 server Dropping Initial keys. 2025/04/30 08:48:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 432µs} 2025/04/30 08:48:32 server newly acked packets (1): [0] 2025/04/30 08:48:32 server updated RTT: 33.818ms (σ: 12.681ms) 2025/04/30 08:48:32 server Canceling loss detection timer. 2025/04/30 08:48:32 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:32 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:32 Retiring connection ID 0e26fa4bdcad762037ebd60c34829c0e in 5s. 2025/04/30 08:48:32 server Dropping Handshake keys. 2025/04/30 08:48:32 server <- Reading packet 3 (1198 bytes) for connection 4cc75188, 1-RTT 2025/04/30 08:48:32 server Short Header{DestConnectionID: 4cc75188, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:32 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208µs} 2025/04/30 08:48:32 server newly acked packets (1): [0] 2025/04/30 08:48:32 server updated RTT: 33.818ms (σ: 9.51ms) 2025/04/30 08:48:32 server Canceling loss detection timer. 2025/04/30 08:48:32 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c5c2993b221d6de93424e86e8e7ccfdf068c929c, StatelessResetToken: 0x9370de8816700769f0496c9d9069bcf0} 2025/04/30 08:48:32 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75c01f883c1d9ec84d3137e8dd0debc75fb5c07a, StatelessResetToken: 0x9931954860f82c71ce25876825d0a686} 2025/04/30 08:48:32 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f27667d1f9d5e8266624055d388a322eebbf1bbf, StatelessResetToken: 0xb802ba7bcd6c4a11843037f390d2bc50} 2025/04/30 08:48:32 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:32 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:32 server -> Sending packet 1 (278 bytes) for connection 0e26fa4bdcad762037ebd60c34829c0e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:32 server Short Header{DestConnectionID: c5c2993b221d6de93424e86e8e7ccfdf068c929c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:32 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 471.792µs} 2025/04/30 08:48:32 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:32 server -> &wire.NewTokenFrame{Token: 0x3e64738bfe316606d1838a3219f51286f670e4b4a353c9aee8bf92af3221dcca9500cab3f7bcc0cf7a1db982aff581fe7563fa21480e823de8672617c35125f0ac1a9105af8552367efd1ebfd44592000a250d2bafd4} 2025/04/30 08:48:32 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:32 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:32 Received request: GET /jycpdibcpv 2025/04/30 08:48:32 server -> Sending packet 2 (1065 bytes) for connection 0e26fa4bdcad762037ebd60c34829c0e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:32 server Short Header{DestConnectionID: c5c2993b221d6de93424e86e8e7ccfdf068c929c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:32 server <- Reading packet 4 (67 bytes) for connection 4cc75188, 1-RTT 2025/04/30 08:48:32 server Short Header{DestConnectionID: 4cc75188, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:32 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 176µs} 2025/04/30 08:48:32 server newly acked packets (1): [1] 2025/04/30 08:48:32 server updated RTT: 33.505ms (σ: 7.757ms) 2025/04/30 08:48:32 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:32 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: c1f037f78f00ff0891c9bd663cc25d62023a257f, StatelessResetToken: 0x639baec8af27e393d876344cae19e702} 2025/04/30 08:48:32 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:32 server Ignoring all packets below 4. 2025/04/30 08:48:32 server <- Reading packet 5 (32 bytes) for connection 4cc75188, 1-RTT 2025/04/30 08:48:32 server Short Header{DestConnectionID: 4cc75188, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:32 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:32 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:32 Replacing connection for connection IDs [bc6dbb09 a032101f 4cc75188 a967b3a4 ed9ba5c9 bdbbb296] with a closed connection. 2025/04/30 08:48:32 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:32 server Connection 0e26fa4bdcad762037ebd60c34829c0e closed. 2025/04/30 08:48:32 Removing connection ID c970fd27942ef661119c99d58ee245da after it has been retired. 2025/04/30 08:48:32 Removing connection IDs [c4aaaf8f c39d09f9 4d2e177d 764c588b e0260a6b c77afad9] for a closed connection after it has been retired. 2025/04/30 08:48:32 Removing connection ID 8fa6ce240133c3f2734d87d0e1a2874e after it has been retired. 2025/04/30 08:48:32 Removing connection IDs [44e5571c 481a2856 83a8fb3d 84fd6b19 99e5546c be00d178] for a closed connection after it has been retired. 2025/04/30 08:48:33 Tracking 40 connection IDs and 3 reset tokens. 2025/04/30 08:48:35 server <- Received Initial packet. 2025/04/30 08:48:35 Created qlog file: /logs/qlog/02fe9871c712e312b69c67aa741cc30e.sqlog 2025/04/30 08:48:35 server Changing connection ID to 4bec6e65. 2025/04/30 08:48:35 Adding connection IDs 02fe9871c712e312b69c67aa741cc30e and 4bec6e65 for a new connection. 2025/04/30 08:48:35 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:35 server <- Reading packet 2 (333 bytes) for connection 02fe9871c712e312b69c67aa741cc30e, Initial 2025/04/30 08:48:35 server Long Header{Type: Initial, DestConnectionID: 02fe9871c712e312b69c67aa741cc30e, SrcConnectionID: a43c84546c1497ea2a72f1637de4d5c1c808dfd4, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a43c84546c1497ea2a72f1637de4d5c1c808dfd4, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:35 Adding connection ID 79eee025. 2025/04/30 08:48:35 Adding connection ID ff3ee477. 2025/04/30 08:48:35 Adding connection ID d95815ba. 2025/04/30 08:48:35 Adding connection ID 80c4baf4. 2025/04/30 08:48:35 Adding connection ID 36d62490. 2025/04/30 08:48:35 server coalesced packet has different destination connection ID: 00000000, expected 02fe9871c712e312b69c67aa741cc30e 2025/04/30 08:48:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 02fe9871c712e312b69c67aa741cc30e 2025/04/30 08:48:35 server Long Header{Type: Initial, DestConnectionID: a43c84546c1497ea2a72f1637de4d5c1c808dfd4, SrcConnectionID: 4bec6e65, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 313, Version: v1} 2025/04/30 08:48:35 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 08:48:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:35 server Long Header{Type: Handshake, DestConnectionID: a43c84546c1497ea2a72f1637de4d5c1c808dfd4, SrcConnectionID: 4bec6e65, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 08:48:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 08:48:35 server Short Header{DestConnectionID: a43c84546c1497ea2a72f1637de4d5c1c808dfd4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 79eee025, StatelessResetToken: 0x84319443f8b6076c8fd21f68a6203277} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 80c4baf4, StatelessResetToken: 0xa477f5f171bf130fe22b86aab97593e2} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 36d62490, StatelessResetToken: 0xb9efe8f779dff29c266fb1c067ffc850} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ff3ee477, StatelessResetToken: 0x10701ecae528cf2a1f1a0b8a5f6a53ea} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d95815ba, StatelessResetToken: 0x717e4a6863b420250c9f3f59fff1d98f} 2025/04/30 08:48:35 server Parsed a coalesced packet. Part 1: 67 bytes. Remaining: 1133 bytes. 2025/04/30 08:48:35 server <- Reading packet 3 (67 bytes) for connection 02fe9871c712e312b69c67aa741cc30e, Initial 2025/04/30 08:48:35 server Long Header{Type: Initial, DestConnectionID: 02fe9871c712e312b69c67aa741cc30e, SrcConnectionID: a43c84546c1497ea2a72f1637de4d5c1c808dfd4, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 08:48:35 server <- &wire.PingFrame{} 2025/04/30 08:48:35 server coalesced packet has different destination connection ID: 00000000, expected 02fe9871c712e312b69c67aa741cc30e 2025/04/30 08:48:35 server -> Sending packet 1 (57 bytes) for connection 02fe9871c712e312b69c67aa741cc30e, Initial 2025/04/30 08:48:35 server Long Header{Type: Initial, DestConnectionID: a43c84546c1497ea2a72f1637de4d5c1c808dfd4, SrcConnectionID: 4bec6e65, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 08:48:35 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 08:48:35 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1294 bytes. 2025/04/30 08:48:35 server <- Reading packet 4 (56 bytes) for connection 4bec6e65, Initial 2025/04/30 08:48:35 server Long Header{Type: Initial, DestConnectionID: 4bec6e65, SrcConnectionID: a43c84546c1497ea2a72f1637de4d5c1c808dfd4, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:35 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 120µs} 2025/04/30 08:48:35 server newly acked packets (1): [0] 2025/04/30 08:48:35 server Parsed a coalesced packet. Part 2: 96 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:35 server <- Reading packet 5 (96 bytes) for connection 4bec6e65, Handshake 2025/04/30 08:48:35 server Long Header{Type: Handshake, DestConnectionID: 4bec6e65, SrcConnectionID: a43c84546c1497ea2a72f1637de4d5c1c808dfd4, PacketNumber: 5, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:35 server Dropping Initial keys. 2025/04/30 08:48:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 536µs} 2025/04/30 08:48:35 server newly acked packets (1): [0] 2025/04/30 08:48:35 server updated RTT: 33.925423ms (σ: 16.962711ms) 2025/04/30 08:48:35 server Canceling loss detection timer. 2025/04/30 08:48:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:35 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:35 Retiring connection ID 02fe9871c712e312b69c67aa741cc30e in 5s. 2025/04/30 08:48:35 server Dropping Handshake keys. 2025/04/30 08:48:35 server <- Reading packet 6 (1198 bytes) for connection 4bec6e65, 1-RTT 2025/04/30 08:48:35 server Short Header{DestConnectionID: 4bec6e65, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256µs} 2025/04/30 08:48:35 server newly acked packets (1): [0] 2025/04/30 08:48:35 server updated RTT: 33.925ms (σ: 12.721ms) 2025/04/30 08:48:35 server Canceling loss detection timer. 2025/04/30 08:48:35 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5dd36a9e3d49c8a0c8ae68e44a78da8e3aa33789, StatelessResetToken: 0xe3867f04d88114dea1b6c9208617b0a8} 2025/04/30 08:48:35 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 34473675eb42432947ce6d2988bc1f01d9632fd5, StatelessResetToken: 0x63e10127fdaa6352ae3d07b86d5b62c8} 2025/04/30 08:48:35 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 88d39702cb795a100c889d16d84f4ca697d1b87c, StatelessResetToken: 0x6e2755d58111214857bcb8ab92a4ea62} 2025/04/30 08:48:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:35 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:35 server -> Sending packet 1 (278 bytes) for connection 02fe9871c712e312b69c67aa741cc30e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:35 server Short Header{DestConnectionID: 5dd36a9e3d49c8a0c8ae68e44a78da8e3aa33789, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:35 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 463.827µs} 2025/04/30 08:48:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:35 server -> &wire.NewTokenFrame{Token: 0x037d7790300be7ba9da4f46dc8683efdd887da89a0cabef6d0da2b649c6eb5c43b8a4498d35b5953e82942dfca94020241a8728e89e0d5cee86a6afbe0782a1a9fd9db29e88ca340d9c8e9ce6ddb840838b433e19cac} 2025/04/30 08:48:35 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:35 Received request: GET /jkqjlyogsy 2025/04/30 08:48:35 server -> Sending packet 2 (1065 bytes) for connection 02fe9871c712e312b69c67aa741cc30e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:35 server Short Header{DestConnectionID: 5dd36a9e3d49c8a0c8ae68e44a78da8e3aa33789, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:48:35 server -> Sending packet 7 (1280 bytes) for connection beede84d3bddba44b4303cd9e3666562, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:35 server Short Header{DestConnectionID: 9e34937938d9f16ec66be92f82c0627aabaed634, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b2452728, StatelessResetToken: 0xece782ea34b51719e8e4646e026a1f3a} 2025/04/30 08:48:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d3982a83, StatelessResetToken: 0xbf7286d9596409f32da0d55f7af2c72f} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b995d6a7, StatelessResetToken: 0x22d884138b00f232aa8605a974cbe243} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 0852869e, StatelessResetToken: 0xbe26ca480bab194116a87c6c71055c8e} 2025/04/30 08:48:35 server -> &wire.NewTokenFrame{Token: 0x6f0b4e01b8f509fcddfdfc4d4851ab3a7c5b36bf6f74e76602882a3976a13ef60a0cb75e7ceeab622950710b9c0163bac50750c82fc7befa4bb6ca728d39ec7e0802176f96c6d2952fbf8e83d6cb47f614461cb6a63a} 2025/04/30 08:48:35 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f34ee2d5, StatelessResetToken: 0x5c37775da0fc77ca2c4ef5beb5cd741d} 2025/04/30 08:48:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:35 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 885, Offset + Data length: 885} 2025/04/30 08:48:35 server Skipping packet number 6 2025/04/30 08:48:35 server -> Sending packet 8 (182 bytes) for connection beede84d3bddba44b4303cd9e3666562, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:35 server Short Header{DestConnectionID: 9e34937938d9f16ec66be92f82c0627aabaed634, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 885, Data length: 139, Offset + Data length: 1024} 2025/04/30 08:48:35 server -> Sending packet 9 (1315 bytes) for connection beede84d3bddba44b4303cd9e3666562, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:35 server Short Header{DestConnectionID: 9e34937938d9f16ec66be92f82c0627aabaed634, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:35 server -> &wire.PingFrame{} 2025/04/30 08:48:35 server <- Reading packet 8 (32 bytes) for connection 4bec6e65, 1-RTT 2025/04/30 08:48:35 server Short Header{DestConnectionID: 4bec6e65, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:35 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:35 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:35 Replacing connection for connection IDs [4bec6e65 79eee025 ff3ee477 d95815ba 80c4baf4 36d62490] with a closed connection. 2025/04/30 08:48:35 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:35 server Connection 02fe9871c712e312b69c67aa741cc30e closed. 2025/04/30 08:48:35 server Destroying connection: timeout: no recent network activity 2025/04/30 08:48:35 Removing connection ID d36bec35. 2025/04/30 08:48:35 Removing connection ID 786f53e5. 2025/04/30 08:48:35 Removing connection ID aa8eccd2. 2025/04/30 08:48:35 Removing connection ID d1cf2a99. 2025/04/30 08:48:35 Removing connection ID f5bb7249. 2025/04/30 08:48:35 Removing connection ID 14670ec4. 2025/04/30 08:48:35 Error accepting stream: timeout: no recent network activity 2025/04/30 08:48:35 server Connection ee76bf3598dd514b178663581778a2e3 closed. 2025/04/30 08:48:35 Removing connection ID beede84d3bddba44b4303cd9e3666562 after it has been retired. 2025/04/30 08:48:35 server <- Received Initial packet. 2025/04/30 08:48:35 Created qlog file: /logs/qlog/950c060c2f7b9e10969971f53b2d304e.sqlog 2025/04/30 08:48:35 server Changing connection ID to 672a9fd6. 2025/04/30 08:48:35 Adding connection IDs 950c060c2f7b9e10969971f53b2d304e and 672a9fd6 for a new connection. 2025/04/30 08:48:35 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:35 server <- Reading packet 0 (333 bytes) for connection 950c060c2f7b9e10969971f53b2d304e, Initial 2025/04/30 08:48:35 server Long Header{Type: Initial, DestConnectionID: 950c060c2f7b9e10969971f53b2d304e, SrcConnectionID: 69d0ef19671011ce479ffc473b230eda2feb77cd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:35 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:35 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:35 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:35 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 69d0ef19671011ce479ffc473b230eda2feb77cd, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:35 Adding connection ID 81049384. 2025/04/30 08:48:35 Adding connection ID aff78ad9. 2025/04/30 08:48:35 Adding connection ID ee55ff36. 2025/04/30 08:48:35 Adding connection ID c93a511b. 2025/04/30 08:48:35 Adding connection ID 96536aaf. 2025/04/30 08:48:35 server coalesced packet has different destination connection ID: 00000000, expected 950c060c2f7b9e10969971f53b2d304e 2025/04/30 08:48:35 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 950c060c2f7b9e10969971f53b2d304e 2025/04/30 08:48:35 server Long Header{Type: Initial, DestConnectionID: 69d0ef19671011ce479ffc473b230eda2feb77cd, SrcConnectionID: 672a9fd6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 323, Version: v1} 2025/04/30 08:48:35 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:35 server Long Header{Type: Handshake, DestConnectionID: 69d0ef19671011ce479ffc473b230eda2feb77cd, SrcConnectionID: 672a9fd6, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 08:48:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 08:48:35 server Short Header{DestConnectionID: 69d0ef19671011ce479ffc473b230eda2feb77cd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: aff78ad9, StatelessResetToken: 0x09f32e6741d7ab416dc1943bfb72b73c} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c93a511b, StatelessResetToken: 0x84a10ebc813f880e113f3c966adf5050} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 81049384, StatelessResetToken: 0xad2bb0412efbb8010acfcf98d595e1b5} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee55ff36, StatelessResetToken: 0x218eaf42e5df75557c50c45dfd426634} 2025/04/30 08:48:35 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 96536aaf, StatelessResetToken: 0x12ad83f09dd236ed468159f5b3038ffd} 2025/04/30 08:48:35 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:35 server <- Reading packet 1 (57 bytes) for connection 672a9fd6, Initial 2025/04/30 08:48:35 server Long Header{Type: Initial, DestConnectionID: 672a9fd6, SrcConnectionID: 69d0ef19671011ce479ffc473b230eda2feb77cd, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 648µs} 2025/04/30 08:48:35 server newly acked packets (1): [0] 2025/04/30 08:48:35 server updated RTT: 33.728207ms (σ: 16.864103ms) 2025/04/30 08:48:35 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:35 server <- Reading packet 2 (95 bytes) for connection 672a9fd6, Handshake 2025/04/30 08:48:35 server Long Header{Type: Handshake, DestConnectionID: 672a9fd6, SrcConnectionID: 69d0ef19671011ce479ffc473b230eda2feb77cd, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:35 server Dropping Initial keys. 2025/04/30 08:48:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408µs} 2025/04/30 08:48:35 server newly acked packets (1): [0] 2025/04/30 08:48:35 server updated RTT: 33.728ms (σ: 12.648ms) 2025/04/30 08:48:35 server Canceling loss detection timer. 2025/04/30 08:48:35 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:35 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:35 Retiring connection ID 950c060c2f7b9e10969971f53b2d304e in 5s. 2025/04/30 08:48:35 server Dropping Handshake keys. 2025/04/30 08:48:35 server <- Reading packet 3 (1198 bytes) for connection 672a9fd6, 1-RTT 2025/04/30 08:48:35 server Short Header{DestConnectionID: 672a9fd6, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:35 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 192µs} 2025/04/30 08:48:35 server newly acked packets (1): [0] 2025/04/30 08:48:35 server updated RTT: 33.728ms (σ: 9.486ms) 2025/04/30 08:48:35 server Canceling loss detection timer. 2025/04/30 08:48:35 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 96bb9c27c986ebb06629619fe785b6d849c0d95d, StatelessResetToken: 0x5af7d45e5cdde31e5fa8b2fb6a20236e} 2025/04/30 08:48:35 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 976808f129dc638e5fd2782e07693e5b42df2012, StatelessResetToken: 0x2200cc4bf44b7ead9039bd6abea78fa3} 2025/04/30 08:48:35 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fe980cf82891e12a4cd02e77d958efb395fe7f44, StatelessResetToken: 0xce6ce9dfd9e4e609275be8fbe347c8f4} 2025/04/30 08:48:35 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:35 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:35 server -> Sending packet 1 (278 bytes) for connection 950c060c2f7b9e10969971f53b2d304e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:35 server Short Header{DestConnectionID: 96bb9c27c986ebb06629619fe785b6d849c0d95d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:35 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 483.684µs} 2025/04/30 08:48:35 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:35 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:35 server -> &wire.NewTokenFrame{Token: 0x83f58ad70db6f9bfd627afa55e118c9ae3a8602488452fe3fc9a2af53e8e13971d433209c4ed90c6a8064ef618ee3485e84fb29ace6c2b3566931f9a8255d6948cfe58f37915a1a1470e91b00597046dbf5052727815} 2025/04/30 08:48:35 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:35 Received request: GET /delrnmxoam 2025/04/30 08:48:35 server -> Sending packet 2 (1065 bytes) for connection 950c060c2f7b9e10969971f53b2d304e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:35 server Short Header{DestConnectionID: 96bb9c27c986ebb06629619fe785b6d849c0d95d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:35 Tracking 47 connection IDs and 3 reset tokens. 2025/04/30 08:48:35 server <- Reading packet 4 (32 bytes) for connection 672a9fd6, 1-RTT 2025/04/30 08:48:35 server Short Header{DestConnectionID: 672a9fd6, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:35 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:35 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:35 Replacing connection for connection IDs [c93a511b 96536aaf 672a9fd6 81049384 aff78ad9 ee55ff36] with a closed connection. 2025/04/30 08:48:35 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:35 server Connection 950c060c2f7b9e10969971f53b2d304e closed. 2025/04/30 08:48:35 Removing connection ID 33788c12fbf82801c9079093c863de56 after it has been retired. 2025/04/30 08:48:35 Removing connection IDs [e5285903 bc117a46 05245f64 0b86648e 77d02e9c 7cc326a3] for a closed connection after it has been retired. 2025/04/30 08:48:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 08:48:36 server -> Sending packet 23 (273 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:36 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:36 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:36 server -> &wire.NewTokenFrame{Token: 0xd80029404b3024ee6601f2c9af1704bcd92467e6044eb968a91c15e07f80d2047b7b4e072ac2dc4188eb6f699d2ba81a3f93fdb7eb6efc288da67ae69fad71392a6e384156677563a286513a4ff40d0c2957dc053074} 2025/04/30 08:48:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:36 server Skipping packet number 22 2025/04/30 08:48:36 server -> Sending packet 24 (1065 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:36 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:36 Removing connection ID 0afb7ca53f6c2978accdfdd42d52846a after it has been retired. 2025/04/30 08:48:36 Removing connection IDs [75686ad8 2a6895d4 b833bf32 684a6de4 9d783d88 1292e2f0] for a closed connection after it has been retired. 2025/04/30 08:48:37 server <- Received Initial packet. 2025/04/30 08:48:37 Created qlog file: /logs/qlog/a23b78c59126f3196d410db1289e0720.sqlog 2025/04/30 08:48:37 server Changing connection ID to 80f333e2. 2025/04/30 08:48:37 Adding connection IDs a23b78c59126f3196d410db1289e0720 and 80f333e2 for a new connection. 2025/04/30 08:48:37 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:37 server <- Reading packet 1 (333 bytes) for connection a23b78c59126f3196d410db1289e0720, Initial 2025/04/30 08:48:37 server Long Header{Type: Initial, DestConnectionID: a23b78c59126f3196d410db1289e0720, SrcConnectionID: 440cea4ae190f7b9f0d7bb9b97081a1a35561e45, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 440cea4ae190f7b9f0d7bb9b97081a1a35561e45, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:37 Adding connection ID 41f8ac54. 2025/04/30 08:48:37 Adding connection ID bd511404. 2025/04/30 08:48:37 Adding connection ID b6e5ddaf. 2025/04/30 08:48:37 Adding connection ID 916e07f9. 2025/04/30 08:48:37 Adding connection ID a6c3e518. 2025/04/30 08:48:37 server coalesced packet has different destination connection ID: 00000000, expected a23b78c59126f3196d410db1289e0720 2025/04/30 08:48:37 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a23b78c59126f3196d410db1289e0720 2025/04/30 08:48:37 server Long Header{Type: Initial, DestConnectionID: 440cea4ae190f7b9f0d7bb9b97081a1a35561e45, SrcConnectionID: 80f333e2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 314, Version: v1} 2025/04/30 08:48:37 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 08:48:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:37 server Long Header{Type: Handshake, DestConnectionID: 440cea4ae190f7b9f0d7bb9b97081a1a35561e45, SrcConnectionID: 80f333e2, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:48:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:48:37 server Short Header{DestConnectionID: 440cea4ae190f7b9f0d7bb9b97081a1a35561e45, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bd511404, StatelessResetToken: 0x90f97aba37aae7459d8685e358ead8e5} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b6e5ddaf, StatelessResetToken: 0x4596f620eb096d478bda40476730cdd4} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a6c3e518, StatelessResetToken: 0x7976aaac5deb02ed46c4f400dbc3df77} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 916e07f9, StatelessResetToken: 0x7614ce29d576038c03e8625bc4c24b56} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 41f8ac54, StatelessResetToken: 0x5c231f0694045fb7627883c7345dd99e} 2025/04/30 08:48:37 Removing connection ID 0e26fa4bdcad762037ebd60c34829c0e after it has been retired. 2025/04/30 08:48:37 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:37 server <- Reading packet 2 (57 bytes) for connection 80f333e2, Initial 2025/04/30 08:48:37 server Long Header{Type: Initial, DestConnectionID: 80f333e2, SrcConnectionID: 440cea4ae190f7b9f0d7bb9b97081a1a35561e45, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 816µs} 2025/04/30 08:48:37 server newly acked packets (1): [0] 2025/04/30 08:48:37 server updated RTT: 33.948219ms (σ: 16.974109ms) 2025/04/30 08:48:37 server Parsed a coalesced packet. Part 2: 96 bytes. Remaining: 1197 bytes. 2025/04/30 08:48:37 server <- Reading packet 3 (96 bytes) for connection 80f333e2, Handshake 2025/04/30 08:48:37 server Long Header{Type: Handshake, DestConnectionID: 80f333e2, SrcConnectionID: 440cea4ae190f7b9f0d7bb9b97081a1a35561e45, PacketNumber: 3, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:37 server Dropping Initial keys. 2025/04/30 08:48:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 584µs} 2025/04/30 08:48:37 server newly acked packets (1): [0] 2025/04/30 08:48:37 server updated RTT: 33.948ms (σ: 12.73ms) 2025/04/30 08:48:37 server Canceling loss detection timer. 2025/04/30 08:48:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:37 Retiring connection ID a23b78c59126f3196d410db1289e0720 in 5s. 2025/04/30 08:48:37 server Dropping Handshake keys. 2025/04/30 08:48:37 server <- Reading packet 4 (1197 bytes) for connection 80f333e2, 1-RTT 2025/04/30 08:48:37 server Short Header{DestConnectionID: 80f333e2, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 312µs} 2025/04/30 08:48:37 server newly acked packets (1): [0] 2025/04/30 08:48:37 server updated RTT: 33.948ms (σ: 9.547ms) 2025/04/30 08:48:37 server Canceling loss detection timer. 2025/04/30 08:48:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6079dc27d69e7cf60f8d17c908122e074249adc6, StatelessResetToken: 0xf1c90e769ca7345119be7d52ff0c9ed2} 2025/04/30 08:48:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d201262581b1c687e5a20af98719201697998b60, StatelessResetToken: 0x1e011a9b61b38f044efce943941cef82} 2025/04/30 08:48:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dd984126b9df81648b23e6c2a5cc5729d428c0fb, StatelessResetToken: 0x0cd179413602e9aea2576e5bf3e91678} 2025/04/30 08:48:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:37 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:37 server -> Sending packet 1 (278 bytes) for connection a23b78c59126f3196d410db1289e0720, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:37 server Short Header{DestConnectionID: 6079dc27d69e7cf60f8d17c908122e074249adc6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 436.076µs} 2025/04/30 08:48:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:37 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:37 server -> &wire.NewTokenFrame{Token: 0x5797afa10c9c6566dace079f5029261e18e7c2b33fd1a4dc1726900207ed182e7a7909e733ab981fc29ced79355d45c8dfdc94bdeb9dde359ab4147f1422d4f673edbb37cda84ce52d0577a756570519a6b70d343b66} 2025/04/30 08:48:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:37 Received request: GET /gqdftihtwc 2025/04/30 08:48:37 server -> Sending packet 2 (1065 bytes) for connection a23b78c59126f3196d410db1289e0720, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:37 server Short Header{DestConnectionID: 6079dc27d69e7cf60f8d17c908122e074249adc6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:37 Removing connection IDs [bc6dbb09 a032101f 4cc75188 a967b3a4 ed9ba5c9 bdbbb296] for a closed connection after it has been retired. 2025/04/30 08:48:37 server <- Reading packet 5 (67 bytes) for connection 80f333e2, 1-RTT 2025/04/30 08:48:37 server Short Header{DestConnectionID: 80f333e2, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:37 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 208µs} 2025/04/30 08:48:37 server newly acked packets (1): [1] 2025/04/30 08:48:37 server updated RTT: 33.621ms (σ: 7.813ms) 2025/04/30 08:48:37 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 6271eb9ee425549002d923b1711987411792ce37, StatelessResetToken: 0xdbc5239651a1df62efff1e878c8c09a0} 2025/04/30 08:48:37 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:37 server Ignoring all packets below 5. 2025/04/30 08:48:37 server <- Reading packet 6 (32 bytes) for connection 80f333e2, 1-RTT 2025/04/30 08:48:37 server Short Header{DestConnectionID: 80f333e2, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:37 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:37 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:37 Replacing connection for connection IDs [80f333e2 41f8ac54 bd511404 b6e5ddaf 916e07f9 a6c3e518] with a closed connection. 2025/04/30 08:48:37 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:37 server Connection a23b78c59126f3196d410db1289e0720 closed. 2025/04/30 08:48:37 server <- Received Initial packet. 2025/04/30 08:48:37 Created qlog file: /logs/qlog/c2cb60c1848fb7e53b8d407c00d7c39d.sqlog 2025/04/30 08:48:37 server Changing connection ID to b2f3e229. 2025/04/30 08:48:37 Adding connection IDs c2cb60c1848fb7e53b8d407c00d7c39d and b2f3e229 for a new connection. 2025/04/30 08:48:37 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:37 server <- Reading packet 0 (333 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, Initial 2025/04/30 08:48:37 server Long Header{Type: Initial, DestConnectionID: c2cb60c1848fb7e53b8d407c00d7c39d, SrcConnectionID: 865828b23a9e428768ba2bd7ebe33f20b1a243df, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 865828b23a9e428768ba2bd7ebe33f20b1a243df, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:37 Adding connection ID cefeb73b. 2025/04/30 08:48:37 Adding connection ID c5a9dbeb. 2025/04/30 08:48:37 Adding connection ID caa8161c. 2025/04/30 08:48:37 Adding connection ID a03b1df9. 2025/04/30 08:48:37 Adding connection ID 702014e8. 2025/04/30 08:48:37 server coalesced packet has different destination connection ID: 00000000, expected c2cb60c1848fb7e53b8d407c00d7c39d 2025/04/30 08:48:37 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d 2025/04/30 08:48:37 server Long Header{Type: Initial, DestConnectionID: 865828b23a9e428768ba2bd7ebe33f20b1a243df, SrcConnectionID: b2f3e229, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 322, Version: v1} 2025/04/30 08:48:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:37 server Long Header{Type: Handshake, DestConnectionID: 865828b23a9e428768ba2bd7ebe33f20b1a243df, SrcConnectionID: b2f3e229, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 08:48:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 08:48:37 server Short Header{DestConnectionID: 865828b23a9e428768ba2bd7ebe33f20b1a243df, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a03b1df9, StatelessResetToken: 0x3bc2ee0db632157ce74cb25c0aeb7cda} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: caa8161c, StatelessResetToken: 0x109fe5715f3182c558b668c5f5362611} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cefeb73b, StatelessResetToken: 0x9fdd850a2375c33d6a6445d188b54576} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c5a9dbeb, StatelessResetToken: 0xd3eda020ea54a414d1a852a86bb1ebe5} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 702014e8, StatelessResetToken: 0xeb4bf28bb14a546c50d0e975a2995e0d} 2025/04/30 08:48:37 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:37 server <- Reading packet 1 (57 bytes) for connection b2f3e229, Initial 2025/04/30 08:48:37 server Long Header{Type: Initial, DestConnectionID: b2f3e229, SrcConnectionID: 865828b23a9e428768ba2bd7ebe33f20b1a243df, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 584µs} 2025/04/30 08:48:37 server newly acked packets (1): [0] 2025/04/30 08:48:37 server updated RTT: 33.631923ms (σ: 16.815961ms) 2025/04/30 08:48:37 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:37 server <- Reading packet 2 (95 bytes) for connection b2f3e229, Handshake 2025/04/30 08:48:37 server Long Header{Type: Handshake, DestConnectionID: b2f3e229, SrcConnectionID: 865828b23a9e428768ba2bd7ebe33f20b1a243df, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:37 server Dropping Initial keys. 2025/04/30 08:48:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 400µs} 2025/04/30 08:48:37 server newly acked packets (1): [0] 2025/04/30 08:48:37 server updated RTT: 33.631ms (σ: 12.611ms) 2025/04/30 08:48:37 server Canceling loss detection timer. 2025/04/30 08:48:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:37 Retiring connection ID c2cb60c1848fb7e53b8d407c00d7c39d in 5s. 2025/04/30 08:48:37 server Dropping Handshake keys. 2025/04/30 08:48:37 server <- Reading packet 3 (1198 bytes) for connection b2f3e229, 1-RTT 2025/04/30 08:48:37 server Short Header{DestConnectionID: b2f3e229, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 176µs} 2025/04/30 08:48:37 server newly acked packets (1): [0] 2025/04/30 08:48:37 server updated RTT: 33.631ms (σ: 9.458ms) 2025/04/30 08:48:37 server Canceling loss detection timer. 2025/04/30 08:48:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, StatelessResetToken: 0x6bd171019b10e04699b66e2d84e89e76} 2025/04/30 08:48:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ac43ce5e92d778134bc23a8eb18ca5b87accc90e, StatelessResetToken: 0x2651bae8ce3620dc7b44a436674d4a49} 2025/04/30 08:48:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: db94dde234b2bca9ba51ddcec0a555d4fef8f406, StatelessResetToken: 0xd9161cfca4c6670af79bab63f80dd578} 2025/04/30 08:48:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:37 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:37 server -> Sending packet 1 (278 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:37 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 501.518µs} 2025/04/30 08:48:37 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:37 server -> &wire.NewTokenFrame{Token: 0x3c89aad6067fbddfebdab860bf3cc9a0580269a253cde113e88a5c5aca19bcc1965adb9137f10ecaf393bd33caca0348b0502f1ec2efb95117a101ebaa0da13422adc736a8e5de4f7f1e42074a223447baa2c5497a42} 2025/04/30 08:48:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:37 Received request: GET /tieaqwrkfu 2025/04/30 08:48:37 server -> Sending packet 2 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:37 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:37 server <- Reading packet 4 (67 bytes) for connection b2f3e229, 1-RTT 2025/04/30 08:48:37 server Short Header{DestConnectionID: b2f3e229, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:37 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 168µs} 2025/04/30 08:48:37 server newly acked packets (1): [1] 2025/04/30 08:48:37 server updated RTT: 33.333ms (σ: 7.687ms) 2025/04/30 08:48:37 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: f426535195938d968525408e0a61e915da10c065, StatelessResetToken: 0x02542fe10db83066fcabcc8e7278f296} 2025/04/30 08:48:37 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:37 server Ignoring all packets below 4. 2025/04/30 08:48:37 server Sending ACK because the ACK timer expired. 2025/04/30 08:48:37 server -> Sending packet 3 (45 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:37 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 25.340149ms} 2025/04/30 08:48:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:37 server -> Sending packet 5 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:37 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:37 server -> Sending packet 6 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:37 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:37 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:48:37 server -> Sending packet 8 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:37 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:37 server -> Sending packet 9 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:37 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:37 server -> Sending packet 10 (1315 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:37 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.PingFrame{} 2025/04/30 08:48:37 server <- Received Initial packet. 2025/04/30 08:48:37 Created qlog file: /logs/qlog/b486cedf6be77ea36c694366ccc75309.sqlog 2025/04/30 08:48:37 server Changing connection ID to 78eceb77. 2025/04/30 08:48:37 Adding connection IDs b486cedf6be77ea36c694366ccc75309 and 78eceb77 for a new connection. 2025/04/30 08:48:37 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:37 server <- Reading packet 0 (333 bytes) for connection b486cedf6be77ea36c694366ccc75309, Initial 2025/04/30 08:48:37 server Long Header{Type: Initial, DestConnectionID: b486cedf6be77ea36c694366ccc75309, SrcConnectionID: 6110b5cdcde5f3e10da73f567046b74bbd76f77b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:37 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:37 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:37 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:37 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6110b5cdcde5f3e10da73f567046b74bbd76f77b, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:37 Adding connection ID 260b5ac7. 2025/04/30 08:48:37 Adding connection ID 87cf986d. 2025/04/30 08:48:37 Adding connection ID af01fd37. 2025/04/30 08:48:37 Adding connection ID 6073b9f0. 2025/04/30 08:48:37 Adding connection ID 75e305d7. 2025/04/30 08:48:37 server coalesced packet has different destination connection ID: 00000000, expected b486cedf6be77ea36c694366ccc75309 2025/04/30 08:48:37 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b486cedf6be77ea36c694366ccc75309 2025/04/30 08:48:37 server Long Header{Type: Initial, DestConnectionID: 6110b5cdcde5f3e10da73f567046b74bbd76f77b, SrcConnectionID: 78eceb77, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 315, Version: v1} 2025/04/30 08:48:37 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:37 server Long Header{Type: Handshake, DestConnectionID: 6110b5cdcde5f3e10da73f567046b74bbd76f77b, SrcConnectionID: 78eceb77, PacketNumber: 0, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 08:48:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 08:48:37 server Short Header{DestConnectionID: 6110b5cdcde5f3e10da73f567046b74bbd76f77b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: af01fd37, StatelessResetToken: 0x99610331a2ad49111574a8679484b841} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6073b9f0, StatelessResetToken: 0xa8dcce1f1a93c45d1249c6de3fb3c6e6} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 87cf986d, StatelessResetToken: 0x3639b8242b600c407c3943af126262c7} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 260b5ac7, StatelessResetToken: 0xd49da81e0b20695e06cc7c466821a593} 2025/04/30 08:48:37 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 75e305d7, StatelessResetToken: 0x5e186fb6e76ac44b31f3f6fc009ec459} 2025/04/30 08:48:37 Tracking 47 connection IDs and 3 reset tokens. 2025/04/30 08:48:37 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:37 server <- Reading packet 1 (57 bytes) for connection 78eceb77, Initial 2025/04/30 08:48:37 server Long Header{Type: Initial, DestConnectionID: 78eceb77, SrcConnectionID: 6110b5cdcde5f3e10da73f567046b74bbd76f77b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 608µs} 2025/04/30 08:48:37 server newly acked packets (1): [0] 2025/04/30 08:48:37 server updated RTT: 33.624543ms (σ: 16.812271ms) 2025/04/30 08:48:37 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:37 server <- Reading packet 2 (95 bytes) for connection 78eceb77, Handshake 2025/04/30 08:48:37 server Long Header{Type: Handshake, DestConnectionID: 78eceb77, SrcConnectionID: 6110b5cdcde5f3e10da73f567046b74bbd76f77b, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:37 server Dropping Initial keys. 2025/04/30 08:48:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 416µs} 2025/04/30 08:48:37 server newly acked packets (1): [0] 2025/04/30 08:48:37 server updated RTT: 33.624ms (σ: 12.609ms) 2025/04/30 08:48:37 server Canceling loss detection timer. 2025/04/30 08:48:37 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:37 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:37 Retiring connection ID b486cedf6be77ea36c694366ccc75309 in 5s. 2025/04/30 08:48:37 server Dropping Handshake keys. 2025/04/30 08:48:37 server <- Reading packet 3 (1198 bytes) for connection 78eceb77, 1-RTT 2025/04/30 08:48:37 server Short Header{DestConnectionID: 78eceb77, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:37 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 200µs} 2025/04/30 08:48:37 server newly acked packets (1): [0] 2025/04/30 08:48:37 server updated RTT: 33.624ms (σ: 9.456ms) 2025/04/30 08:48:37 server Canceling loss detection timer. 2025/04/30 08:48:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4b615c1a80ecef87e0e1a07f133e5ae8bcbf2cf8, StatelessResetToken: 0x32524ad3941a1c3d1a29b472796278d8} 2025/04/30 08:48:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 174ce02a08af5e9d1b9ac82bc52ccc4423df8b78, StatelessResetToken: 0xefcc708bcf5cf18d6ed660aaabb735b4} 2025/04/30 08:48:37 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dc8d8faa28ad5fea04e335620d437779a826df3d, StatelessResetToken: 0x78b5e1168c76cd3486d0a036547877f9} 2025/04/30 08:48:37 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:37 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:37 server -> Sending packet 1 (278 bytes) for connection b486cedf6be77ea36c694366ccc75309, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:37 server Short Header{DestConnectionID: 4b615c1a80ecef87e0e1a07f133e5ae8bcbf2cf8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 445.032µs} 2025/04/30 08:48:37 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:37 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:37 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:37 server -> &wire.NewTokenFrame{Token: 0xffedf45ab5a3c33a20a4b226e4482c0ceeeee1c10eb8e37ae919ec2b1821f2a04e9bbe978eb92b4264542171bf5c5a503d514a44b83446aa70e6e82aa6100069899bb74fc9a1ba80332b91d57b74cacb31428782126e} 2025/04/30 08:48:37 Received request: GET /gnjyirjbdy 2025/04/30 08:48:37 server -> Sending packet 2 (1065 bytes) for connection b486cedf6be77ea36c694366ccc75309, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:37 server Short Header{DestConnectionID: 4b615c1a80ecef87e0e1a07f133e5ae8bcbf2cf8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:37 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:37 server <- Reading packet 4 (32 bytes) for connection 78eceb77, 1-RTT 2025/04/30 08:48:37 server Short Header{DestConnectionID: 78eceb77, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:37 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:37 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:37 Replacing connection for connection IDs [af01fd37 6073b9f0 75e305d7 78eceb77 260b5ac7 87cf986d] with a closed connection. 2025/04/30 08:48:37 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:37 server Connection b486cedf6be77ea36c694366ccc75309 closed. 2025/04/30 08:48:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 08:48:38 server -> Sending packet 12 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:38 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:38 server -> Sending packet 13 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:38 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 08:48:38 server -> Sending packet 15 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:38 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:38 server -> Sending packet 16 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:38 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:39 Tracking 47 connection IDs and 3 reset tokens. 2025/04/30 08:48:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 08:48:40 server -> Sending packet 18 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:40 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:40 server -> Sending packet 19 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:40 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:40 Removing connection ID 02fe9871c712e312b69c67aa741cc30e after it has been retired. 2025/04/30 08:48:40 Removing connection IDs [4bec6e65 79eee025 ff3ee477 d95815ba 80c4baf4 36d62490] for a closed connection after it has been retired. 2025/04/30 08:48:40 Removing connection ID 950c060c2f7b9e10969971f53b2d304e after it has been retired. 2025/04/30 08:48:40 Removing connection IDs [c93a511b 96536aaf 672a9fd6 81049384 aff78ad9 ee55ff36] for a closed connection after it has been retired. 2025/04/30 08:48:41 server <- Received Initial packet. 2025/04/30 08:48:41 Created qlog file: /logs/qlog/88f488bf13f62d2d29bb18f2c112c71e.sqlog 2025/04/30 08:48:41 server Changing connection ID to 62ed0461. 2025/04/30 08:48:41 Adding connection IDs 88f488bf13f62d2d29bb18f2c112c71e and 62ed0461 for a new connection. 2025/04/30 08:48:41 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:41 server <- Reading packet 2 (333 bytes) for connection 88f488bf13f62d2d29bb18f2c112c71e, Initial 2025/04/30 08:48:41 server Long Header{Type: Initial, DestConnectionID: 88f488bf13f62d2d29bb18f2c112c71e, SrcConnectionID: dbe255b496444b600f3846fa08d60f1711d61b58, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:41 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:41 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:41 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:41 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: dbe255b496444b600f3846fa08d60f1711d61b58, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:41 Adding connection ID 443e6d1d. 2025/04/30 08:48:41 Adding connection ID f48ea0be. 2025/04/30 08:48:41 Adding connection ID c0944e9e. 2025/04/30 08:48:41 Adding connection ID 11bb7d7e. 2025/04/30 08:48:41 Adding connection ID 76b80243. 2025/04/30 08:48:41 server coalesced packet has different destination connection ID: 00000000, expected 88f488bf13f62d2d29bb18f2c112c71e 2025/04/30 08:48:41 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 88f488bf13f62d2d29bb18f2c112c71e 2025/04/30 08:48:41 server Long Header{Type: Initial, DestConnectionID: dbe255b496444b600f3846fa08d60f1711d61b58, SrcConnectionID: 62ed0461, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 319, Version: v1} 2025/04/30 08:48:41 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s} 2025/04/30 08:48:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:41 server Long Header{Type: Handshake, DestConnectionID: dbe255b496444b600f3846fa08d60f1711d61b58, SrcConnectionID: 62ed0461, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 08:48:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 08:48:41 server Short Header{DestConnectionID: dbe255b496444b600f3846fa08d60f1711d61b58, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 443e6d1d, StatelessResetToken: 0xa754c4bd72499ca921e8762babc9d2eb} 2025/04/30 08:48:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 11bb7d7e, StatelessResetToken: 0xada392543d52a7822c2d9207370d1e6c} 2025/04/30 08:48:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 76b80243, StatelessResetToken: 0x014305b677470ec7f79fded4b5eb80cc} 2025/04/30 08:48:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f48ea0be, StatelessResetToken: 0x7229163db2d301eef2d8e738d8b65587} 2025/04/30 08:48:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c0944e9e, StatelessResetToken: 0x7ebddba8a2aaf670c65e218c7d370a50} 2025/04/30 08:48:41 server Parsed a coalesced packet. Part 1: 67 bytes. Remaining: 1133 bytes. 2025/04/30 08:48:41 server <- Reading packet 3 (67 bytes) for connection 88f488bf13f62d2d29bb18f2c112c71e, Initial 2025/04/30 08:48:41 server Long Header{Type: Initial, DestConnectionID: 88f488bf13f62d2d29bb18f2c112c71e, SrcConnectionID: dbe255b496444b600f3846fa08d60f1711d61b58, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 08:48:41 server <- &wire.PingFrame{} 2025/04/30 08:48:41 server coalesced packet has different destination connection ID: 00000000, expected 88f488bf13f62d2d29bb18f2c112c71e 2025/04/30 08:48:41 server -> Sending packet 1 (57 bytes) for connection 88f488bf13f62d2d29bb18f2c112c71e, Initial 2025/04/30 08:48:41 server Long Header{Type: Initial, DestConnectionID: dbe255b496444b600f3846fa08d60f1711d61b58, SrcConnectionID: 62ed0461, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 08:48:41 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s} 2025/04/30 08:48:41 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1294 bytes. 2025/04/30 08:48:41 server <- Reading packet 4 (56 bytes) for connection 62ed0461, Initial 2025/04/30 08:48:41 server Long Header{Type: Initial, DestConnectionID: 62ed0461, SrcConnectionID: dbe255b496444b600f3846fa08d60f1711d61b58, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:41 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 104µs} 2025/04/30 08:48:41 server newly acked packets (1): [0] 2025/04/30 08:48:41 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1199 bytes. 2025/04/30 08:48:41 server <- Reading packet 5 (95 bytes) for connection 62ed0461, Handshake 2025/04/30 08:48:41 server Long Header{Type: Handshake, DestConnectionID: 62ed0461, SrcConnectionID: dbe255b496444b600f3846fa08d60f1711d61b58, PacketNumber: 5, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:41 server Dropping Initial keys. 2025/04/30 08:48:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 488µs} 2025/04/30 08:48:41 server newly acked packets (1): [0] 2025/04/30 08:48:41 server updated RTT: 33.926389ms (σ: 16.963194ms) 2025/04/30 08:48:41 server Canceling loss detection timer. 2025/04/30 08:48:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:41 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:41 Retiring connection ID 88f488bf13f62d2d29bb18f2c112c71e in 5s. 2025/04/30 08:48:41 server Dropping Handshake keys. 2025/04/30 08:48:41 server <- Reading packet 6 (1199 bytes) for connection 62ed0461, 1-RTT 2025/04/30 08:48:41 server Short Header{DestConnectionID: 62ed0461, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 248µs} 2025/04/30 08:48:41 server newly acked packets (1): [0] 2025/04/30 08:48:41 server updated RTT: 33.926ms (σ: 12.722ms) 2025/04/30 08:48:41 server Canceling loss detection timer. 2025/04/30 08:48:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7413101ecae233be7d7f3718d2009ba6b5563c71, StatelessResetToken: 0xc671a8143c60758e0543bf187cb26a34} 2025/04/30 08:48:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 51ce1cc1e9726902863d9390b955e4494389f6e7, StatelessResetToken: 0xdb6ae2c9ad9b6b1cee9d357f52d764a3} 2025/04/30 08:48:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f4e05be4dc4218ed4f328174f83bda8ebf1b307, StatelessResetToken: 0xb5cf41cc042bbe5071106e1b232090f2} 2025/04/30 08:48:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:41 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:41 server -> Sending packet 1 (278 bytes) for connection 88f488bf13f62d2d29bb18f2c112c71e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:41 Received request: GET /ragzizrcnr 2025/04/30 08:48:41 server Short Header{DestConnectionID: 7413101ecae233be7d7f3718d2009ba6b5563c71, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:41 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 453.318µs} 2025/04/30 08:48:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:41 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:41 server -> &wire.NewTokenFrame{Token: 0x161466347efb6b3a6d6f1db6796532fdee291233067df3b6e4f6ecbf3cf823c5a0325739d707adea3cac7b58d5e0a0178ea2ddcc9dda300ba2953a310dc93ff1046cc23d59cf2d822dfe55f13fee6f0f646b1fd933a2} 2025/04/30 08:48:41 server -> Sending packet 2 (1065 bytes) for connection 88f488bf13f62d2d29bb18f2c112c71e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:41 server Short Header{DestConnectionID: 7413101ecae233be7d7f3718d2009ba6b5563c71, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:41 server <- Reading packet 7 (32 bytes) for connection 62ed0461, 1-RTT 2025/04/30 08:48:41 server Short Header{DestConnectionID: 62ed0461, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:41 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:41 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:41 Replacing connection for connection IDs [62ed0461 443e6d1d f48ea0be c0944e9e 11bb7d7e 76b80243] with a closed connection. 2025/04/30 08:48:41 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:41 server Connection 88f488bf13f62d2d29bb18f2c112c71e closed. 2025/04/30 08:48:41 Tracking 40 connection IDs and 3 reset tokens. 2025/04/30 08:48:42 Removing connection ID a23b78c59126f3196d410db1289e0720 after it has been retired. 2025/04/30 08:48:42 Removing connection IDs [80f333e2 41f8ac54 bd511404 b6e5ddaf 916e07f9 a6c3e518] for a closed connection after it has been retired. 2025/04/30 08:48:42 Removing connection ID c2cb60c1848fb7e53b8d407c00d7c39d after it has been retired. 2025/04/30 08:48:42 server <- Received Initial packet. 2025/04/30 08:48:42 Created qlog file: /logs/qlog/b7efa041cae443aa95b06013d42aa51f.sqlog 2025/04/30 08:48:42 server Changing connection ID to d05233ba. 2025/04/30 08:48:42 Adding connection IDs b7efa041cae443aa95b06013d42aa51f and d05233ba for a new connection. 2025/04/30 08:48:42 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:42 server <- Reading packet 1 (333 bytes) for connection b7efa041cae443aa95b06013d42aa51f, Initial 2025/04/30 08:48:42 server Long Header{Type: Initial, DestConnectionID: b7efa041cae443aa95b06013d42aa51f, SrcConnectionID: 6034215a7963203c8c3ed367a88270d4ee1487af, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6034215a7963203c8c3ed367a88270d4ee1487af, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:42 Adding connection ID d14dec79. 2025/04/30 08:48:42 Adding connection ID 74b56131. 2025/04/30 08:48:42 Adding connection ID 3fb686c9. 2025/04/30 08:48:42 Adding connection ID 78c5064a. 2025/04/30 08:48:42 Adding connection ID 26868c2d. 2025/04/30 08:48:42 server coalesced packet has different destination connection ID: 00000000, expected b7efa041cae443aa95b06013d42aa51f 2025/04/30 08:48:42 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b7efa041cae443aa95b06013d42aa51f 2025/04/30 08:48:42 server Long Header{Type: Initial, DestConnectionID: 6034215a7963203c8c3ed367a88270d4ee1487af, SrcConnectionID: d05233ba, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 322, Version: v1} 2025/04/30 08:48:42 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 08:48:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:42 server Long Header{Type: Handshake, DestConnectionID: 6034215a7963203c8c3ed367a88270d4ee1487af, SrcConnectionID: d05233ba, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 08:48:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 08:48:42 server Short Header{DestConnectionID: 6034215a7963203c8c3ed367a88270d4ee1487af, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 26868c2d, StatelessResetToken: 0xdd3462e1f23a21b06a030c7f80f39e02} 2025/04/30 08:48:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 78c5064a, StatelessResetToken: 0xbc6cc1f6d608463ad48561d9a42afaec} 2025/04/30 08:48:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3fb686c9, StatelessResetToken: 0xba2f55bb92612df021ec1b1b2f619d51} 2025/04/30 08:48:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d14dec79, StatelessResetToken: 0x24f58123ce224c63eae111c48293ab3f} 2025/04/30 08:48:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 74b56131, StatelessResetToken: 0xb49553b8bcab5b27f9153bc38c4599f5} 2025/04/30 08:48:42 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:42 server <- Reading packet 2 (57 bytes) for connection d05233ba, Initial 2025/04/30 08:48:42 server Long Header{Type: Initial, DestConnectionID: d05233ba, SrcConnectionID: 6034215a7963203c8c3ed367a88270d4ee1487af, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 704µs} 2025/04/30 08:48:42 server newly acked packets (1): [0] 2025/04/30 08:48:42 server updated RTT: 33.722819ms (σ: 16.861409ms) 2025/04/30 08:48:42 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:42 server <- Reading packet 3 (95 bytes) for connection d05233ba, Handshake 2025/04/30 08:48:42 server Long Header{Type: Handshake, DestConnectionID: d05233ba, SrcConnectionID: 6034215a7963203c8c3ed367a88270d4ee1487af, PacketNumber: 3, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:42 server Dropping Initial keys. 2025/04/30 08:48:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 488µs} 2025/04/30 08:48:42 server newly acked packets (1): [0] 2025/04/30 08:48:42 server updated RTT: 33.722ms (σ: 12.645ms) 2025/04/30 08:48:42 server Canceling loss detection timer. 2025/04/30 08:48:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:42 Retiring connection ID b7efa041cae443aa95b06013d42aa51f in 5s. 2025/04/30 08:48:42 server Dropping Handshake keys. 2025/04/30 08:48:42 server <- Reading packet 4 (1198 bytes) for connection d05233ba, 1-RTT 2025/04/30 08:48:42 server Short Header{DestConnectionID: d05233ba, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 216µs} 2025/04/30 08:48:42 server newly acked packets (1): [0] 2025/04/30 08:48:42 server updated RTT: 33.722ms (σ: 9.483ms) 2025/04/30 08:48:42 server Canceling loss detection timer. 2025/04/30 08:48:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f92933d976299754105db36cdaf0a787c505f5b1, StatelessResetToken: 0x2fe58d6bf1422441f1bd10feefa1d8a4} 2025/04/30 08:48:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec655e5edea3ff268254f8ee585a6263c9138531, StatelessResetToken: 0xd968493a031960edd8484757732cca7c} 2025/04/30 08:48:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b453933d73339920bbdde5714e07a18f5cbb3a73, StatelessResetToken: 0x13440a64184156c9eeae4eb3e98d937b} 2025/04/30 08:48:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:42 server -> Sending packet 1 (278 bytes) for connection b7efa041cae443aa95b06013d42aa51f, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:42 server Short Header{DestConnectionID: f92933d976299754105db36cdaf0a787c505f5b1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:42 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 480.298µs} 2025/04/30 08:48:42 server -> &wire.NewTokenFrame{Token: 0x7d2853dc7894e08d38f97d2bca25d9acbea7d0705f965ac1b4cdcc20bfd8faa25cc3c72f5b0410a211ec0eefa66c0ceac42288e3e16b6ed39e3f2bb2399a9fd8e747b880b6ce95afe1e56cc382ef08c97749979e1b61} 2025/04/30 08:48:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:42 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:42 Received request: GET /dirqgahwtk 2025/04/30 08:48:42 server -> Sending packet 2 (1065 bytes) for connection b7efa041cae443aa95b06013d42aa51f, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:42 server Short Header{DestConnectionID: f92933d976299754105db36cdaf0a787c505f5b1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:42 server <- Reading packet 5 (67 bytes) for connection d05233ba, 1-RTT 2025/04/30 08:48:42 server Short Header{DestConnectionID: d05233ba, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:42 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 176µs} 2025/04/30 08:48:42 server newly acked packets (1): [1] 2025/04/30 08:48:42 server updated RTT: 33.415ms (σ: 7.725ms) 2025/04/30 08:48:42 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 5feee6a5e72075f65fc242eb9431a0bc617ff037, StatelessResetToken: 0x414eeb21ceb04a9095f1084f169ece13} 2025/04/30 08:48:42 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:42 server Ignoring all packets below 5. 2025/04/30 08:48:42 server <- Reading packet 6 (32 bytes) for connection d05233ba, 1-RTT 2025/04/30 08:48:42 server Short Header{DestConnectionID: d05233ba, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:42 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:42 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:42 Replacing connection for connection IDs [26868c2d d05233ba d14dec79 74b56131 3fb686c9 78c5064a] with a closed connection. 2025/04/30 08:48:42 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:42 server Connection b7efa041cae443aa95b06013d42aa51f closed. 2025/04/30 08:48:42 Removing connection ID b486cedf6be77ea36c694366ccc75309 after it has been retired. 2025/04/30 08:48:42 server <- Received Initial packet. 2025/04/30 08:48:42 Created qlog file: /logs/qlog/a101bef47c35f18a3bc38ebc00ad92e2.sqlog 2025/04/30 08:48:42 server Changing connection ID to 69c55228. 2025/04/30 08:48:42 Adding connection IDs a101bef47c35f18a3bc38ebc00ad92e2 and 69c55228 for a new connection. 2025/04/30 08:48:42 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:42 server <- Reading packet 0 (333 bytes) for connection a101bef47c35f18a3bc38ebc00ad92e2, Initial 2025/04/30 08:48:42 server Long Header{Type: Initial, DestConnectionID: a101bef47c35f18a3bc38ebc00ad92e2, SrcConnectionID: 6434c1b0375ec4631d35b15d713cd89425befc52, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:42 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:42 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:42 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:42 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6434c1b0375ec4631d35b15d713cd89425befc52, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:42 Adding connection ID 4c14b628. 2025/04/30 08:48:42 Adding connection ID 676cfae5. 2025/04/30 08:48:42 Adding connection ID 74dd9470. 2025/04/30 08:48:42 Adding connection ID 41547d01. 2025/04/30 08:48:42 Adding connection ID 3fe8a023. 2025/04/30 08:48:42 server coalesced packet has different destination connection ID: 00000000, expected a101bef47c35f18a3bc38ebc00ad92e2 2025/04/30 08:48:42 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a101bef47c35f18a3bc38ebc00ad92e2 2025/04/30 08:48:42 server Long Header{Type: Initial, DestConnectionID: 6434c1b0375ec4631d35b15d713cd89425befc52, SrcConnectionID: 69c55228, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 324, Version: v1} 2025/04/30 08:48:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:42 server Long Header{Type: Handshake, DestConnectionID: 6434c1b0375ec4631d35b15d713cd89425befc52, SrcConnectionID: 69c55228, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 08:48:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 08:48:42 server Short Header{DestConnectionID: 6434c1b0375ec4631d35b15d713cd89425befc52, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 74dd9470, StatelessResetToken: 0xa63ba893b122de6543ddbcce4d6eeacf} 2025/04/30 08:48:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 41547d01, StatelessResetToken: 0xaf0577b7a561c441ebca37478e19010b} 2025/04/30 08:48:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4c14b628, StatelessResetToken: 0xa438de2c1346551d0ddf0625c155c35f} 2025/04/30 08:48:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 676cfae5, StatelessResetToken: 0x223a2218cfc0e29dac335447779b34a3} 2025/04/30 08:48:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 3fe8a023, StatelessResetToken: 0x8e617c1102acfb95fc7a7437808e30a1} 2025/04/30 08:48:42 Removing connection IDs [af01fd37 6073b9f0 75e305d7 78eceb77 260b5ac7 87cf986d] for a closed connection after it has been retired. 2025/04/30 08:48:42 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:42 server <- Reading packet 1 (57 bytes) for connection 69c55228, Initial 2025/04/30 08:48:42 server Long Header{Type: Initial, DestConnectionID: 69c55228, SrcConnectionID: 6434c1b0375ec4631d35b15d713cd89425befc52, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 608µs} 2025/04/30 08:48:42 server newly acked packets (1): [0] 2025/04/30 08:48:42 server updated RTT: 33.629343ms (σ: 16.814671ms) 2025/04/30 08:48:42 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:42 server <- Reading packet 2 (95 bytes) for connection 69c55228, Handshake 2025/04/30 08:48:42 server Long Header{Type: Handshake, DestConnectionID: 69c55228, SrcConnectionID: 6434c1b0375ec4631d35b15d713cd89425befc52, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:42 server Dropping Initial keys. 2025/04/30 08:48:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 432µs} 2025/04/30 08:48:42 server newly acked packets (1): [0] 2025/04/30 08:48:42 server updated RTT: 33.629ms (σ: 12.61ms) 2025/04/30 08:48:42 server Canceling loss detection timer. 2025/04/30 08:48:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:42 Retiring connection ID a101bef47c35f18a3bc38ebc00ad92e2 in 5s. 2025/04/30 08:48:42 server Dropping Handshake keys. 2025/04/30 08:48:42 server <- Reading packet 3 (1198 bytes) for connection 69c55228, 1-RTT 2025/04/30 08:48:42 server Short Header{DestConnectionID: 69c55228, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:42 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 192µs} 2025/04/30 08:48:42 server newly acked packets (1): [0] 2025/04/30 08:48:42 server updated RTT: 33.629ms (σ: 9.457ms) 2025/04/30 08:48:42 server Canceling loss detection timer. 2025/04/30 08:48:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 659d0951e4cc17830aa9ca7910d04631ac18c58c, StatelessResetToken: 0xe4f0b459dec21327f4a911161d4f8748} 2025/04/30 08:48:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b9bceae8e629286e16b663b6419fa43cfe91acbb, StatelessResetToken: 0xd595bdc91f629fc886dd025d517141f2} 2025/04/30 08:48:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3eca4b76fba6886e6e8a7ab431f74b91ecadb632, StatelessResetToken: 0x9f3ea3978b72447d8d69148d85d9b9ba} 2025/04/30 08:48:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:42 server -> Sending packet 1 (278 bytes) for connection a101bef47c35f18a3bc38ebc00ad92e2, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:42 server Short Header{DestConnectionID: 659d0951e4cc17830aa9ca7910d04631ac18c58c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:42 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 471.543µs} 2025/04/30 08:48:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:42 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:42 server -> &wire.NewTokenFrame{Token: 0x375f4a3d9e9382b984e6756ac20816b7b220598f32bc9ade6eecd8ed440a5585e62b5e07d20efcd9db8c54dee31d2ebb117bbd060427eea9e1ee8db80e3ac77c72cafc3873ecfbcb23091c7834d33dded755467a8212} 2025/04/30 08:48:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:42 Received request: GET /ucwqslsarc 2025/04/30 08:48:42 server -> Sending packet 2 (1065 bytes) for connection a101bef47c35f18a3bc38ebc00ad92e2, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:42 server Short Header{DestConnectionID: 659d0951e4cc17830aa9ca7910d04631ac18c58c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:42 server <- Reading packet 4 (67 bytes) for connection 69c55228, 1-RTT 2025/04/30 08:48:42 server Short Header{DestConnectionID: 69c55228, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:42 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 168µs} 2025/04/30 08:48:42 server newly acked packets (1): [1] 2025/04/30 08:48:42 server updated RTT: 33.323ms (σ: 7.703ms) 2025/04/30 08:48:42 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 4f95910b9c6aa0c7b0e35be69402c4d83423ddc5, StatelessResetToken: 0x610706f55be6caaba42a82e933410141} 2025/04/30 08:48:42 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:42 server Ignoring all packets below 4. 2025/04/30 08:48:42 server Sending ACK because the ACK timer expired. 2025/04/30 08:48:42 server -> Sending packet 3 (45 bytes) for connection a101bef47c35f18a3bc38ebc00ad92e2, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:42 server Short Header{DestConnectionID: 659d0951e4cc17830aa9ca7910d04631ac18c58c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:42 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 25.427837ms} 2025/04/30 08:48:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:42 server -> Sending packet 5 (1065 bytes) for connection a101bef47c35f18a3bc38ebc00ad92e2, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:42 server Short Header{DestConnectionID: 659d0951e4cc17830aa9ca7910d04631ac18c58c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:42 server -> Sending packet 6 (1065 bytes) for connection a101bef47c35f18a3bc38ebc00ad92e2, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:42 server Short Header{DestConnectionID: 659d0951e4cc17830aa9ca7910d04631ac18c58c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:42 server <- Reading packet 5 (32 bytes) for connection 69c55228, 1-RTT 2025/04/30 08:48:42 server Short Header{DestConnectionID: 69c55228, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:42 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:42 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:42 Replacing connection for connection IDs [4c14b628 676cfae5 74dd9470 41547d01 3fe8a023 69c55228] with a closed connection. 2025/04/30 08:48:42 server Connection a101bef47c35f18a3bc38ebc00ad92e2 closed. 2025/04/30 08:48:42 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 08:48:43 server -> Sending packet 21 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:43 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:43 server -> Sending packet 22 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:43 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:43 Tracking 39 connection IDs and 3 reset tokens. 2025/04/30 08:48:44 server <- Received Initial packet. 2025/04/30 08:48:44 Created qlog file: /logs/qlog/b6b684e6e594fb71393c2125571fb866.sqlog 2025/04/30 08:48:44 server Changing connection ID to 019edced. 2025/04/30 08:48:44 Adding connection IDs b6b684e6e594fb71393c2125571fb866 and 019edced for a new connection. 2025/04/30 08:48:44 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:44 server <- Reading packet 1 (333 bytes) for connection b6b684e6e594fb71393c2125571fb866, Initial 2025/04/30 08:48:44 server Long Header{Type: Initial, DestConnectionID: b6b684e6e594fb71393c2125571fb866, SrcConnectionID: 481d3f854f49fe96e9310bc8ea71f7f74199e42d, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:44 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:44 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:44 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:44 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 481d3f854f49fe96e9310bc8ea71f7f74199e42d, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:44 Adding connection ID 81b0e20d. 2025/04/30 08:48:44 Adding connection ID 11ab7504. 2025/04/30 08:48:44 Adding connection ID 613f437e. 2025/04/30 08:48:44 Adding connection ID c7e3a517. 2025/04/30 08:48:44 Adding connection ID ec355123. 2025/04/30 08:48:44 server coalesced packet has different destination connection ID: 00000000, expected b6b684e6e594fb71393c2125571fb866 2025/04/30 08:48:44 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b6b684e6e594fb71393c2125571fb866 2025/04/30 08:48:44 server Long Header{Type: Initial, DestConnectionID: 481d3f854f49fe96e9310bc8ea71f7f74199e42d, SrcConnectionID: 019edced, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 313, Version: v1} 2025/04/30 08:48:44 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 08:48:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:44 server Long Header{Type: Handshake, DestConnectionID: 481d3f854f49fe96e9310bc8ea71f7f74199e42d, SrcConnectionID: 019edced, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 08:48:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 08:48:44 server Short Header{DestConnectionID: 481d3f854f49fe96e9310bc8ea71f7f74199e42d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 81b0e20d, StatelessResetToken: 0xe98c07bcb62bcd4da8e59318f2862561} 2025/04/30 08:48:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c7e3a517, StatelessResetToken: 0x1f3568c4018a8896c896618503744a3a} 2025/04/30 08:48:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: ec355123, StatelessResetToken: 0xdd3cb009d1639feeab4b0ecc412995b7} 2025/04/30 08:48:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 11ab7504, StatelessResetToken: 0xc1190a046190948fb07bdbe9c0cb5eff} 2025/04/30 08:48:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 613f437e, StatelessResetToken: 0xb16628f44817d99ab7909bb6406c51aa} 2025/04/30 08:48:44 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:44 server <- Reading packet 2 (57 bytes) for connection 019edced, Initial 2025/04/30 08:48:44 server Long Header{Type: Initial, DestConnectionID: 019edced, SrcConnectionID: 481d3f854f49fe96e9310bc8ea71f7f74199e42d, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 688µs} 2025/04/30 08:48:44 server newly acked packets (1): [0] 2025/04/30 08:48:44 server updated RTT: 33.890092ms (σ: 16.945046ms) 2025/04/30 08:48:44 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:44 server <- Reading packet 3 (95 bytes) for connection 019edced, Handshake 2025/04/30 08:48:44 server Long Header{Type: Handshake, DestConnectionID: 019edced, SrcConnectionID: 481d3f854f49fe96e9310bc8ea71f7f74199e42d, PacketNumber: 3, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:44 server Dropping Initial keys. 2025/04/30 08:48:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 464µs} 2025/04/30 08:48:44 server newly acked packets (1): [0] 2025/04/30 08:48:44 server updated RTT: 33.89ms (σ: 12.708ms) 2025/04/30 08:48:44 server Canceling loss detection timer. 2025/04/30 08:48:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:44 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:44 Retiring connection ID b6b684e6e594fb71393c2125571fb866 in 5s. 2025/04/30 08:48:44 server Dropping Handshake keys. 2025/04/30 08:48:44 server <- Reading packet 4 (1198 bytes) for connection 019edced, 1-RTT 2025/04/30 08:48:44 server Short Header{DestConnectionID: 019edced, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 216µs} 2025/04/30 08:48:44 server newly acked packets (1): [0] 2025/04/30 08:48:44 server updated RTT: 33.89ms (σ: 9.531ms) 2025/04/30 08:48:44 server Canceling loss detection timer. 2025/04/30 08:48:44 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, StatelessResetToken: 0x7a186e5faaba42e423e94c9c16fe8488} 2025/04/30 08:48:44 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a178b76cdaba80f4c13b03e0138e85c3a516552c, StatelessResetToken: 0xa6f89cf36fdfe17f1e824476072b14b9} 2025/04/30 08:48:44 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3672611b28d652be979b887c0892495b21b37d6a, StatelessResetToken: 0xf807780de3885dc88bfaf626aa863f2b} 2025/04/30 08:48:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:44 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:44 server -> Sending packet 1 (278 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:44 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 465.861µs} 2025/04/30 08:48:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:44 server -> &wire.NewTokenFrame{Token: 0x2f1ee15ba4ee93fdb77a5520d41b8f157cd0ed5f3e076f6257bec7ba92abdecd2cdd62c87da1ac759b26661ea5c356415c051e7da5c07b85fe99271a7ca49caff426ec4dd535c83d0410aa0b9abc76f13e42fda13084} 2025/04/30 08:48:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:44 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:44 Received request: GET /vkdysxbyqm 2025/04/30 08:48:44 server -> Sending packet 2 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:44 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:44 server <- Reading packet 5 (67 bytes) for connection 019edced, 1-RTT 2025/04/30 08:48:44 server Short Header{DestConnectionID: 019edced, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:44 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 160µs} 2025/04/30 08:48:44 server newly acked packets (1): [1] 2025/04/30 08:48:44 server updated RTT: 33.574ms (σ: 7.779ms) 2025/04/30 08:48:44 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:44 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 8710f70b295d213b1debe2b79b044fe914bee667, StatelessResetToken: 0xe91411bc66dea84ed1345e3659fa0d0f} 2025/04/30 08:48:44 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:44 server Ignoring all packets below 5. 2025/04/30 08:48:44 server Sending ACK because the ACK timer expired. 2025/04/30 08:48:44 server -> Sending packet 3 (45 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:44 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 25.359333ms} 2025/04/30 08:48:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:44 server -> Sending packet 5 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:44 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:44 server -> Sending packet 6 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:44 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:48:44 server -> Sending packet 8 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:44 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:44 server -> Sending packet 9 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:44 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:44 server -> Sending packet 10 (1315 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:44 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.PingFrame{} 2025/04/30 08:48:44 server <- Received Initial packet. 2025/04/30 08:48:44 Created qlog file: /logs/qlog/b0135da0ce0f1dddb457490579ec7607.sqlog 2025/04/30 08:48:44 server Changing connection ID to 40e923dc. 2025/04/30 08:48:44 Adding connection IDs b0135da0ce0f1dddb457490579ec7607 and 40e923dc for a new connection. 2025/04/30 08:48:44 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:44 server <- Reading packet 0 (333 bytes) for connection b0135da0ce0f1dddb457490579ec7607, Initial 2025/04/30 08:48:44 server Long Header{Type: Initial, DestConnectionID: b0135da0ce0f1dddb457490579ec7607, SrcConnectionID: cc6d93a010f40ebb8c8f7a82b9ba0f36a570cbd8, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:44 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:44 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:44 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:44 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: cc6d93a010f40ebb8c8f7a82b9ba0f36a570cbd8, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:44 Adding connection ID 347f0863. 2025/04/30 08:48:44 Adding connection ID 63e5c409. 2025/04/30 08:48:44 Adding connection ID fded781c. 2025/04/30 08:48:44 Adding connection ID ba7f4e0d. 2025/04/30 08:48:44 Adding connection ID f4944235. 2025/04/30 08:48:44 server coalesced packet has different destination connection ID: 00000000, expected b0135da0ce0f1dddb457490579ec7607 2025/04/30 08:48:44 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b0135da0ce0f1dddb457490579ec7607 2025/04/30 08:48:44 server Long Header{Type: Initial, DestConnectionID: cc6d93a010f40ebb8c8f7a82b9ba0f36a570cbd8, SrcConnectionID: 40e923dc, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 323, Version: v1} 2025/04/30 08:48:44 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:44 server Long Header{Type: Handshake, DestConnectionID: cc6d93a010f40ebb8c8f7a82b9ba0f36a570cbd8, SrcConnectionID: 40e923dc, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 08:48:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 08:48:44 server Short Header{DestConnectionID: cc6d93a010f40ebb8c8f7a82b9ba0f36a570cbd8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 347f0863, StatelessResetToken: 0x081f073e554bd65ce360ba8a02e77d70} 2025/04/30 08:48:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 63e5c409, StatelessResetToken: 0x1f3ec029306016616cee0738ccc722de} 2025/04/30 08:48:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fded781c, StatelessResetToken: 0x8d5b343db2387cd289a75fe6a7b1a7b0} 2025/04/30 08:48:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ba7f4e0d, StatelessResetToken: 0xd7803672507022c571ebfd76ee16528b} 2025/04/30 08:48:44 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: f4944235, StatelessResetToken: 0x3ee67ca42c4d407df93e5ad529a9218a} 2025/04/30 08:48:44 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:44 server <- Reading packet 1 (57 bytes) for connection 40e923dc, Initial 2025/04/30 08:48:44 server Long Header{Type: Initial, DestConnectionID: 40e923dc, SrcConnectionID: cc6d93a010f40ebb8c8f7a82b9ba0f36a570cbd8, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 736µs} 2025/04/30 08:48:44 server newly acked packets (1): [0] 2025/04/30 08:48:44 server updated RTT: 33.781929ms (σ: 16.890964ms) 2025/04/30 08:48:44 server Parsed a coalesced packet. Part 2: 96 bytes. Remaining: 1197 bytes. 2025/04/30 08:48:44 server <- Reading packet 2 (96 bytes) for connection 40e923dc, Handshake 2025/04/30 08:48:44 server Long Header{Type: Handshake, DestConnectionID: 40e923dc, SrcConnectionID: cc6d93a010f40ebb8c8f7a82b9ba0f36a570cbd8, PacketNumber: 2, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:44 server Dropping Initial keys. 2025/04/30 08:48:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 528µs} 2025/04/30 08:48:44 server newly acked packets (1): [0] 2025/04/30 08:48:44 server updated RTT: 33.781ms (σ: 12.667ms) 2025/04/30 08:48:44 server Canceling loss detection timer. 2025/04/30 08:48:44 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:44 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:44 Retiring connection ID b0135da0ce0f1dddb457490579ec7607 in 5s. 2025/04/30 08:48:44 server Dropping Handshake keys. 2025/04/30 08:48:44 server <- Reading packet 3 (1197 bytes) for connection 40e923dc, 1-RTT 2025/04/30 08:48:44 server Short Header{DestConnectionID: 40e923dc, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:44 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256µs} 2025/04/30 08:48:44 server newly acked packets (1): [0] 2025/04/30 08:48:44 server updated RTT: 33.781ms (σ: 9.5ms) 2025/04/30 08:48:44 server Canceling loss detection timer. 2025/04/30 08:48:44 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00bca312e55385a73249e952dcef5360f8b43de6, StatelessResetToken: 0x819b93a0a8b9278ee76b459f7fc11e64} 2025/04/30 08:48:44 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f421fd209f0fd41cbb648ae2bc6703b87dc97dcc, StatelessResetToken: 0xf88dcc8a0cd0b8d5b46a656c6970e7fa} 2025/04/30 08:48:44 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f5b47840556ed8987facbc47e77bef05d339e1e5, StatelessResetToken: 0x18abe75d6874ce7cb095cf0cf336b5c9} 2025/04/30 08:48:44 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:44 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:44 server -> Sending packet 1 (278 bytes) for connection b0135da0ce0f1dddb457490579ec7607, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:44 server Short Header{DestConnectionID: 00bca312e55385a73249e952dcef5360f8b43de6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 463.236µs} 2025/04/30 08:48:44 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:44 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:44 server -> &wire.NewTokenFrame{Token: 0xfda99ef10de5bef94617a83ff641620096a5cd637efef2b044854d5505e7382e523c3c4a5d0ab5570d6458f535879a78c98704155305c799a1a731f15fa18841e66ff294431b0ca881542701e51029480ed3b6a4ab44} 2025/04/30 08:48:44 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:44 Received request: GET /ixqjbujduo 2025/04/30 08:48:44 server -> Sending packet 2 (1065 bytes) for connection b0135da0ce0f1dddb457490579ec7607, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:44 server Short Header{DestConnectionID: 00bca312e55385a73249e952dcef5360f8b43de6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:44 server <- Reading packet 4 (67 bytes) for connection 40e923dc, 1-RTT 2025/04/30 08:48:44 server Short Header{DestConnectionID: 40e923dc, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:44 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 160µs} 2025/04/30 08:48:44 server newly acked packets (1): [1] 2025/04/30 08:48:44 server updated RTT: 33.463ms (σ: 7.759ms) 2025/04/30 08:48:44 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:44 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 0902a8217324deb337dfb53f9feeff9f2869b718, StatelessResetToken: 0x498c080cfa5a8ff29e31c31cb0ddbc43} 2025/04/30 08:48:44 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:44 server Ignoring all packets below 4. 2025/04/30 08:48:44 server Sending ACK because the ACK timer expired. 2025/04/30 08:48:44 server -> Sending packet 3 (45 bytes) for connection b0135da0ce0f1dddb457490579ec7607, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:44 server Short Header{DestConnectionID: 00bca312e55385a73249e952dcef5360f8b43de6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 25.381067ms} 2025/04/30 08:48:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:44 server -> Sending packet 5 (1065 bytes) for connection b0135da0ce0f1dddb457490579ec7607, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:44 server Short Header{DestConnectionID: 00bca312e55385a73249e952dcef5360f8b43de6, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:44 server -> Sending packet 6 (1065 bytes) for connection b0135da0ce0f1dddb457490579ec7607, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:44 server Short Header{DestConnectionID: 00bca312e55385a73249e952dcef5360f8b43de6, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:44 server <- Reading packet 5 (32 bytes) for connection 40e923dc, 1-RTT 2025/04/30 08:48:44 server Short Header{DestConnectionID: 40e923dc, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:44 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:44 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:44 Replacing connection for connection IDs [40e923dc 347f0863 63e5c409 fded781c ba7f4e0d f4944235] with a closed connection. 2025/04/30 08:48:44 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:44 server Connection b0135da0ce0f1dddb457490579ec7607 closed. 2025/04/30 08:48:44 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 08:48:44 server -> Sending packet 12 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:44 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:44 server -> Sending packet 13 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:44 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:44 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:45 server <- Received Initial packet. 2025/04/30 08:48:45 Created qlog file: /logs/qlog/c30a2e76f77755b56f5352843519515a.sqlog 2025/04/30 08:48:45 server Changing connection ID to 0ba7344b. 2025/04/30 08:48:45 Adding connection IDs c30a2e76f77755b56f5352843519515a and 0ba7344b for a new connection. 2025/04/30 08:48:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 08:48:45 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:45 server <- Reading packet 0 (333 bytes) for connection c30a2e76f77755b56f5352843519515a, Initial 2025/04/30 08:48:45 server Long Header{Type: Initial, DestConnectionID: c30a2e76f77755b56f5352843519515a, SrcConnectionID: da830e8ee5c36151d527c9e01b68c9146fad5b95, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:45 server -> Sending packet 11 (1280 bytes) for connection beede84d3bddba44b4303cd9e3666562, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:45 server Short Header{DestConnectionID: 9e34937938d9f16ec66be92f82c0627aabaed634, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b995d6a7, StatelessResetToken: 0x22d884138b00f232aa8605a974cbe243} 2025/04/30 08:48:45 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 0852869e, StatelessResetToken: 0xbe26ca480bab194116a87c6c71055c8e} 2025/04/30 08:48:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:45 server -> &wire.NewTokenFrame{Token: 0x6f0b4e01b8f509fcddfdfc4d4851ab3a7c5b36bf6f74e76602882a3976a13ef60a0cb75e7ceeab622950710b9c0163bac50750c82fc7befa4bb6ca728d39ec7e0802176f96c6d2952fbf8e83d6cb47f614461cb6a63a} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d3982a83, StatelessResetToken: 0xbf7286d9596409f32da0d55f7af2c72f} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b2452728, StatelessResetToken: 0xece782ea34b51719e8e4646e026a1f3a} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f34ee2d5, StatelessResetToken: 0x5c37775da0fc77ca2c4ef5beb5cd741d} 2025/04/30 08:48:45 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 885, Offset + Data length: 885} 2025/04/30 08:48:45 server Skipping packet number 10 2025/04/30 08:48:45 server -> Sending packet 12 (182 bytes) for connection beede84d3bddba44b4303cd9e3666562, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:45 server Short Header{DestConnectionID: 9e34937938d9f16ec66be92f82c0627aabaed634, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 885, Data length: 139, Offset + Data length: 1024} 2025/04/30 08:48:45 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:45 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:45 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:45 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: da830e8ee5c36151d527c9e01b68c9146fad5b95, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:45 Adding connection ID 2af36233. 2025/04/30 08:48:45 Adding connection ID 7301c46e. 2025/04/30 08:48:45 Adding connection ID 3c4346f7. 2025/04/30 08:48:45 Adding connection ID 152f9097. 2025/04/30 08:48:45 Adding connection ID 0836d857. 2025/04/30 08:48:45 server coalesced packet has different destination connection ID: 00000000, expected c30a2e76f77755b56f5352843519515a 2025/04/30 08:48:45 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c30a2e76f77755b56f5352843519515a 2025/04/30 08:48:45 server Long Header{Type: Initial, DestConnectionID: da830e8ee5c36151d527c9e01b68c9146fad5b95, SrcConnectionID: 0ba7344b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 319, Version: v1} 2025/04/30 08:48:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:45 server Long Header{Type: Handshake, DestConnectionID: da830e8ee5c36151d527c9e01b68c9146fad5b95, SrcConnectionID: 0ba7344b, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 08:48:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 08:48:45 server Short Header{DestConnectionID: da830e8ee5c36151d527c9e01b68c9146fad5b95, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 0836d857, StatelessResetToken: 0x2a3c5f3eb115ddef3d41c5f58628076d} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3c4346f7, StatelessResetToken: 0xfd8d6bfda9ebda478f59a8bc35882600} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2af36233, StatelessResetToken: 0x75df7e46dc652894bfb6447789c4d8b1} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7301c46e, StatelessResetToken: 0x7d8c15839c39af271fb95380404267e9} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 152f9097, StatelessResetToken: 0xd5c19ad3f90ccd28fed473629d3d5927} 2025/04/30 08:48:45 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:45 server <- Reading packet 1 (57 bytes) for connection 0ba7344b, Initial 2025/04/30 08:48:45 server Long Header{Type: Initial, DestConnectionID: 0ba7344b, SrcConnectionID: da830e8ee5c36151d527c9e01b68c9146fad5b95, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 560µs} 2025/04/30 08:48:45 server newly acked packets (1): [0] 2025/04/30 08:48:45 server updated RTT: 34.201257ms (σ: 17.100628ms) 2025/04/30 08:48:45 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:45 server <- Reading packet 2 (95 bytes) for connection 0ba7344b, Handshake 2025/04/30 08:48:45 server Long Header{Type: Handshake, DestConnectionID: 0ba7344b, SrcConnectionID: da830e8ee5c36151d527c9e01b68c9146fad5b95, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:45 server Dropping Initial keys. 2025/04/30 08:48:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 392µs} 2025/04/30 08:48:45 server newly acked packets (1): [0] 2025/04/30 08:48:45 server updated RTT: 34.201ms (σ: 12.825ms) 2025/04/30 08:48:45 server Canceling loss detection timer. 2025/04/30 08:48:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:45 Retiring connection ID c30a2e76f77755b56f5352843519515a in 5s. 2025/04/30 08:48:45 server Dropping Handshake keys. 2025/04/30 08:48:45 server <- Reading packet 3 (1198 bytes) for connection 0ba7344b, 1-RTT 2025/04/30 08:48:45 server Short Header{DestConnectionID: 0ba7344b, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 184µs} 2025/04/30 08:48:45 server newly acked packets (1): [0] 2025/04/30 08:48:45 server updated RTT: 34.201ms (σ: 9.618ms) 2025/04/30 08:48:45 server Canceling loss detection timer. 2025/04/30 08:48:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 35d75cadb6fa6cf8c4f798774f649c34ddcd405c, StatelessResetToken: 0xa5316f6a218516014aa5a255a587c3ae} 2025/04/30 08:48:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 03143617abb9cb5675cffc95d03432bf2b48ada6, StatelessResetToken: 0x17cc2afbdcb2f0b8d1246aa2f7e4489a} 2025/04/30 08:48:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1d9ff07c073d3527d8fc725f62f9baa2df21d202, StatelessResetToken: 0xf9e892098745c1ead4c6e144e8c6a167} 2025/04/30 08:48:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:45 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:45 server -> Sending packet 1 (278 bytes) for connection c30a2e76f77755b56f5352843519515a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:45 server Short Header{DestConnectionID: 35d75cadb6fa6cf8c4f798774f649c34ddcd405c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:45 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 478.865µs} 2025/04/30 08:48:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:45 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:45 server -> &wire.NewTokenFrame{Token: 0x17fe3c0e23bd9bc1ff4a8a257ff5b0f725a55ef34829ba4b6e5a53ec1b83a84466371c42687d72d1191ddbb8dec028d99a22b38379172252c8deaf73222b74d958c2f7c6f665a801c2d90a973796047662e67aeb4e29} 2025/04/30 08:48:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:45 Received request: GET /hageitfnit 2025/04/30 08:48:45 server -> Sending packet 2 (1065 bytes) for connection c30a2e76f77755b56f5352843519515a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:45 server Short Header{DestConnectionID: 35d75cadb6fa6cf8c4f798774f649c34ddcd405c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:45 server <- Reading packet 4 (67 bytes) for connection 0ba7344b, 1-RTT 2025/04/30 08:48:45 server Short Header{DestConnectionID: 0ba7344b, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:45 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 184µs} 2025/04/30 08:48:45 server newly acked packets (1): [1] 2025/04/30 08:48:45 server updated RTT: 33.828ms (σ: 7.957ms) 2025/04/30 08:48:45 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: b11fd7ec504431c9c0e96d75ada710e4b539bbdd, StatelessResetToken: 0xa623c28564211a55bfe9f827bc11be65} 2025/04/30 08:48:45 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:45 server Ignoring all packets below 4. 2025/04/30 08:48:45 server Sending ACK because the ACK timer expired. 2025/04/30 08:48:45 server -> Sending packet 3 (45 bytes) for connection c30a2e76f77755b56f5352843519515a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:45 server Short Header{DestConnectionID: 35d75cadb6fa6cf8c4f798774f649c34ddcd405c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:45 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 25.430596ms} 2025/04/30 08:48:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:45 server -> Sending packet 5 (1065 bytes) for connection c30a2e76f77755b56f5352843519515a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:45 server Short Header{DestConnectionID: 35d75cadb6fa6cf8c4f798774f649c34ddcd405c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:45 server -> Sending packet 6 (1065 bytes) for connection c30a2e76f77755b56f5352843519515a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:45 server Short Header{DestConnectionID: 35d75cadb6fa6cf8c4f798774f649c34ddcd405c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:45 server <- Reading packet 5 (32 bytes) for connection 0ba7344b, 1-RTT 2025/04/30 08:48:45 server Short Header{DestConnectionID: 0ba7344b, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:45 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:45 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:45 Replacing connection for connection IDs [0ba7344b 2af36233 7301c46e 3c4346f7 152f9097 0836d857] with a closed connection. 2025/04/30 08:48:45 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:45 server Connection c30a2e76f77755b56f5352843519515a closed. 2025/04/30 08:48:45 server <- Received Initial packet. 2025/04/30 08:48:45 Created qlog file: /logs/qlog/94f707849f7676383bb359e0c8ffa9cc.sqlog 2025/04/30 08:48:45 server Changing connection ID to e73fe1bb. 2025/04/30 08:48:45 Adding connection IDs 94f707849f7676383bb359e0c8ffa9cc and e73fe1bb for a new connection. 2025/04/30 08:48:45 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:45 server <- Reading packet 0 (333 bytes) for connection 94f707849f7676383bb359e0c8ffa9cc, Initial 2025/04/30 08:48:45 server Long Header{Type: Initial, DestConnectionID: 94f707849f7676383bb359e0c8ffa9cc, SrcConnectionID: 292e4c82853c39c8884749b21241882a0cf2f710, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:45 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:45 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:45 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:45 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 292e4c82853c39c8884749b21241882a0cf2f710, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:45 Adding connection ID 50eef13b. 2025/04/30 08:48:45 Adding connection ID becdaf2d. 2025/04/30 08:48:45 Adding connection ID ebf4aa09. 2025/04/30 08:48:45 Adding connection ID 878298a0. 2025/04/30 08:48:45 Adding connection ID 3fda83f3. 2025/04/30 08:48:45 server coalesced packet has different destination connection ID: 00000000, expected 94f707849f7676383bb359e0c8ffa9cc 2025/04/30 08:48:45 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 94f707849f7676383bb359e0c8ffa9cc 2025/04/30 08:48:45 server Long Header{Type: Initial, DestConnectionID: 292e4c82853c39c8884749b21241882a0cf2f710, SrcConnectionID: e73fe1bb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 314, Version: v1} 2025/04/30 08:48:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:45 server Long Header{Type: Handshake, DestConnectionID: 292e4c82853c39c8884749b21241882a0cf2f710, SrcConnectionID: e73fe1bb, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:48:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:48:45 server Short Header{DestConnectionID: 292e4c82853c39c8884749b21241882a0cf2f710, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: becdaf2d, StatelessResetToken: 0x3c8153230e81dce03fe5b836bd6b87eb} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 878298a0, StatelessResetToken: 0xd1c1fa03688ff4768105dd022f1cee60} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 50eef13b, StatelessResetToken: 0x93e86066e7938e2c780f5b7234ab4ff2} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ebf4aa09, StatelessResetToken: 0x88479a3ce1a273abcd0944dcb8c4c603} 2025/04/30 08:48:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 3fda83f3, StatelessResetToken: 0x2dfb4db765edc358c8c51ef9c2fea222} 2025/04/30 08:48:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 08:48:45 server -> Sending packet 15 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:45 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:45 server -> Sending packet 16 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:45 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:45 Tracking 67 connection IDs and 4 reset tokens. 2025/04/30 08:48:45 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:48:45 server -> Sending packet 1 (1280 bytes) for connection 94f707849f7676383bb359e0c8ffa9cc, Initial 2025/04/30 08:48:45 server Long Header{Type: Initial, DestConnectionID: 292e4c82853c39c8884749b21241882a0cf2f710, SrcConnectionID: e73fe1bb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:45 server -> Sending packet 2 (1280 bytes) for connection 94f707849f7676383bb359e0c8ffa9cc, Initial 2025/04/30 08:48:45 server Long Header{Type: Initial, DestConnectionID: 292e4c82853c39c8884749b21241882a0cf2f710, SrcConnectionID: e73fe1bb, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:45 server Canceling loss detection timer. 2025/04/30 08:48:45 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:48:45 server Queueing packet (31 bytes) for later decryption 2025/04/30 08:48:46 server <- Reading packet 7 (98 bytes) for connection e73fe1bb, Handshake 2025/04/30 08:48:46 server Long Header{Type: Handshake, DestConnectionID: e73fe1bb, SrcConnectionID: 292e4c82853c39c8884749b21241882a0cf2f710, PacketNumber: 7, PacketNumberLen: 1, Length: 65, Version: v1} 2025/04/30 08:48:46 server Dropping Initial keys. 2025/04/30 08:48:46 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 509.64ms} 2025/04/30 08:48:46 server newly acked packets (1): [0] 2025/04/30 08:48:46 server updated RTT: 542.063909ms (σ: 271.031954ms) 2025/04/30 08:48:46 server Canceling loss detection timer. 2025/04/30 08:48:46 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:46 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:46 Retiring connection ID 94f707849f7676383bb359e0c8ffa9cc in 5s. 2025/04/30 08:48:46 server Dropping Handshake keys. 2025/04/30 08:48:46 server -> Sending packet 1 (271 bytes) for connection 94f707849f7676383bb359e0c8ffa9cc, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:46 server Short Header{DestConnectionID: 292e4c82853c39c8884749b21241882a0cf2f710, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:46 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:46 server -> &wire.NewTokenFrame{Token: 0xa9404133828acc31af2a728a7ce47a2912dbc92105436887b05cee0332b2c6f261de8ebbdf8026c2c1ad2afefdafd41773f556b4fdecd53b52aeb443ab0377aa7066703197228604186e1a48eb1e7d97806afd9d4b03} 2025/04/30 08:48:46 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:46 server <- Reading packet 6 (31 bytes) for connection e73fe1bb, 1-RTT 2025/04/30 08:48:46 server Short Header{DestConnectionID: e73fe1bb, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:46 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 255.824ms} 2025/04/30 08:48:46 server newly acked packets (1): [0] 2025/04/30 08:48:46 server updated RTT: 510.365ms (σ: 266.667ms) 2025/04/30 08:48:46 server <- &wire.PingFrame{} 2025/04/30 08:48:46 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:46 server -> Sending packet 2 (47 bytes) for connection 94f707849f7676383bb359e0c8ffa9cc, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:46 server Short Header{DestConnectionID: 292e4c82853c39c8884749b21241882a0cf2f710, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:46 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 254.013119ms} 2025/04/30 08:48:46 server <- Reading packet 9 (169 bytes) for connection e73fe1bb, 1-RTT 2025/04/30 08:48:46 server Short Header{DestConnectionID: e73fe1bb, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:46 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 64µs} 2025/04/30 08:48:46 server newly acked packets (1): [1] 2025/04/30 08:48:46 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:46 server Canceling loss detection timer. 2025/04/30 08:48:46 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a9f2dc7f35c871cb326f635e2ba90a5b0d0bc479, StatelessResetToken: 0x7d2bb46f30eb2665bd098526b817b36b} 2025/04/30 08:48:46 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: abac42576ccb23d158d90977e277e2b52698651b, StatelessResetToken: 0x2f941a9f7c69efa8d389cc6c35bd9be0} 2025/04/30 08:48:46 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 459483c37edc0cd8089380d89c49a890b2675dd1, StatelessResetToken: 0xc373cb7a6e457d3c05bb6bdffe95388b} 2025/04/30 08:48:46 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:46 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:48:46 server -> Sending packet 3 (48 bytes) for connection 94f707849f7676383bb359e0c8ffa9cc, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:46 server Short Header{DestConnectionID: a9f2dc7f35c871cb326f635e2ba90a5b0d0bc479, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:46 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}}, DelayTime: 175.819µs} 2025/04/30 08:48:46 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:46 Received request: GET /fpspaypzrw 2025/04/30 08:48:46 server -> Sending packet 4 (1065 bytes) for connection 94f707849f7676383bb359e0c8ffa9cc, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:46 server Short Header{DestConnectionID: a9f2dc7f35c871cb326f635e2ba90a5b0d0bc479, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:46 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:46 Removing connection ID 88f488bf13f62d2d29bb18f2c112c71e after it has been retired. 2025/04/30 08:48:46 Removing connection IDs [62ed0461 443e6d1d f48ea0be c0944e9e 11bb7d7e 76b80243] for a closed connection after it has been retired. 2025/04/30 08:48:46 server <- Reading packet 11 (31 bytes) for connection e73fe1bb, 1-RTT 2025/04/30 08:48:46 server Short Header{DestConnectionID: e73fe1bb, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:46 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 323.792ms} 2025/04/30 08:48:46 server newly acked packets (1): [3] 2025/04/30 08:48:46 server updated RTT: 487.797ms (σ: 245.135ms) 2025/04/30 08:48:46 server <- &wire.PingFrame{} 2025/04/30 08:48:46 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:48:46 server Ignoring all packets below 10. 2025/04/30 08:48:46 server -> Sending packet 5 (44 bytes) for connection 94f707849f7676383bb359e0c8ffa9cc, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:46 server Short Header{DestConnectionID: a9f2dc7f35c871cb326f635e2ba90a5b0d0bc479, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:46 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 157.234µs} 2025/04/30 08:48:46 server <- Reading packet 12 (187 bytes) for connection e73fe1bb, 1-RTT 2025/04/30 08:48:46 server Short Header{DestConnectionID: e73fe1bb, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:46 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 120µs} 2025/04/30 08:48:46 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: bbb5e410846478d3c26fc68a95f625c6cb3c03c1, StatelessResetToken: 0x5bdf7157e33e735c770848d8b86abe89} 2025/04/30 08:48:46 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: a9f2dc7f35c871cb326f635e2ba90a5b0d0bc479, StatelessResetToken: 0x7d2bb46f30eb2665bd098526b817b36b} 2025/04/30 08:48:46 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: abac42576ccb23d158d90977e277e2b52698651b, StatelessResetToken: 0x2f941a9f7c69efa8d389cc6c35bd9be0} 2025/04/30 08:48:46 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 459483c37edc0cd8089380d89c49a890b2675dd1, StatelessResetToken: 0xc373cb7a6e457d3c05bb6bdffe95388b} 2025/04/30 08:48:46 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:46 server Sending ACK because the ACK timer expired. 2025/04/30 08:48:46 server -> Sending packet 6 (45 bytes) for connection 94f707849f7676383bb359e0c8ffa9cc, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:46 server Short Header{DestConnectionID: a9f2dc7f35c871cb326f635e2ba90a5b0d0bc479, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:46 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 11, DelayTime: 25.367698ms} 2025/04/30 08:48:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 08:48:47 server -> Sending packet 18 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:47 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:47 server -> Sending packet 19 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:47 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:47 Removing connection ID b7efa041cae443aa95b06013d42aa51f after it has been retired. 2025/04/30 08:48:47 Removing connection IDs [26868c2d d05233ba d14dec79 74b56131 3fb686c9 78c5064a] for a closed connection after it has been retired. 2025/04/30 08:48:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:47 server -> Sending packet 8 (1065 bytes) for connection 94f707849f7676383bb359e0c8ffa9cc, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:47 server Short Header{DestConnectionID: a9f2dc7f35c871cb326f635e2ba90a5b0d0bc479, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:47 server -> Sending packet 9 (1065 bytes) for connection 94f707849f7676383bb359e0c8ffa9cc, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:47 server Short Header{DestConnectionID: a9f2dc7f35c871cb326f635e2ba90a5b0d0bc479, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:47 server <- Reading packet 13 (32 bytes) for connection e73fe1bb, 1-RTT 2025/04/30 08:48:47 server Short Header{DestConnectionID: e73fe1bb, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:47 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:47 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:47 Replacing connection for connection IDs [becdaf2d ebf4aa09 878298a0 3fda83f3 e73fe1bb 50eef13b] with a closed connection. 2025/04/30 08:48:47 server Connection 94f707849f7676383bb359e0c8ffa9cc closed. 2025/04/30 08:48:47 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:47 Tracking 53 connection IDs and 4 reset tokens. 2025/04/30 08:48:47 Removing connection ID a101bef47c35f18a3bc38ebc00ad92e2 after it has been retired. 2025/04/30 08:48:47 Removing connection IDs [4c14b628 676cfae5 74dd9470 41547d01 3fe8a023 69c55228] for a closed connection after it has been retired. 2025/04/30 08:48:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 08:48:48 server Skipping packet number 23 2025/04/30 08:48:48 server -> Sending packet 25 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:48 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:48 server -> Sending packet 26 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:48 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:48 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 08:48:48 server -> Sending packet 26 (273 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:48 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:48 server -> &wire.NewTokenFrame{Token: 0xd80029404b3024ee6601f2c9af1704bcd92467e6044eb968a91c15e07f80d2047b7b4e072ac2dc4188eb6f699d2ba81a3f93fdb7eb6efc288da67ae69fad71392a6e384156677563a286513a4ff40d0c2957dc053074} 2025/04/30 08:48:48 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:48 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:48 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:48 server Skipping packet number 25 2025/04/30 08:48:48 server -> Sending packet 27 (1065 bytes) for connection b6d488943f4a9d3786308d64172d8591, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:48 server Short Header{DestConnectionID: 4a2b4b42cee9858a37ed96e17862ffd7bae4fcfe, PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:48 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:49 Removing connection ID b6b684e6e594fb71393c2125571fb866 after it has been retired. 2025/04/30 08:48:49 server <- Received Initial packet. 2025/04/30 08:48:49 Created qlog file: /logs/qlog/1722cb8428ce3aaa1e355900176ea9d4.sqlog 2025/04/30 08:48:49 server Changing connection ID to dcee217c. 2025/04/30 08:48:49 Adding connection IDs 1722cb8428ce3aaa1e355900176ea9d4 and dcee217c for a new connection. 2025/04/30 08:48:49 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:49 server <- Reading packet 1 (333 bytes) for connection 1722cb8428ce3aaa1e355900176ea9d4, Initial 2025/04/30 08:48:49 server Long Header{Type: Initial, DestConnectionID: 1722cb8428ce3aaa1e355900176ea9d4, SrcConnectionID: c7247464f030be6cef16a43340edb9c109558d45, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:49 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:49 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:49 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:49 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:49 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c7247464f030be6cef16a43340edb9c109558d45, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:49 Adding connection ID dd4805ef. 2025/04/30 08:48:49 Adding connection ID 73fa9918. 2025/04/30 08:48:49 Adding connection ID 3eee4b38. 2025/04/30 08:48:49 Adding connection ID 34ab7358. 2025/04/30 08:48:49 Adding connection ID 3355f8c3. 2025/04/30 08:48:49 server coalesced packet has different destination connection ID: 00000000, expected 1722cb8428ce3aaa1e355900176ea9d4 2025/04/30 08:48:49 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1722cb8428ce3aaa1e355900176ea9d4 2025/04/30 08:48:49 server Long Header{Type: Initial, DestConnectionID: c7247464f030be6cef16a43340edb9c109558d45, SrcConnectionID: dcee217c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 321, Version: v1} 2025/04/30 08:48:49 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 08:48:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:49 server Long Header{Type: Handshake, DestConnectionID: c7247464f030be6cef16a43340edb9c109558d45, SrcConnectionID: dcee217c, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 08:48:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 08:48:49 server Short Header{DestConnectionID: c7247464f030be6cef16a43340edb9c109558d45, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3eee4b38, StatelessResetToken: 0x3e7dd4375903d6d2c33f64f9a66b2366} 2025/04/30 08:48:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 34ab7358, StatelessResetToken: 0x5e76aae34fe9b3f5f5d1c25c125e419f} 2025/04/30 08:48:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 73fa9918, StatelessResetToken: 0x80bca54e97bc40cb97aae4e2a3f3923f} 2025/04/30 08:48:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: dd4805ef, StatelessResetToken: 0x214622a266d30321d85dfa3432d0740f} 2025/04/30 08:48:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 3355f8c3, StatelessResetToken: 0x8b1480853148252ac9c70099a186adc9} 2025/04/30 08:48:49 server <- Reading packet 5 (96 bytes) for connection dcee217c, Handshake 2025/04/30 08:48:49 server Long Header{Type: Handshake, DestConnectionID: dcee217c, SrcConnectionID: c7247464f030be6cef16a43340edb9c109558d45, PacketNumber: 5, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:49 server Dropping Initial keys. 2025/04/30 08:48:49 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 102.856ms} 2025/04/30 08:48:49 server newly acked packets (1): [0] 2025/04/30 08:48:49 server updated RTT: 135.205324ms (σ: 67.602662ms) 2025/04/30 08:48:49 server Canceling loss detection timer. 2025/04/30 08:48:49 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:49 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:49 Retiring connection ID 1722cb8428ce3aaa1e355900176ea9d4 in 5s. 2025/04/30 08:48:49 server Dropping Handshake keys. 2025/04/30 08:48:49 server -> Sending packet 1 (271 bytes) for connection 1722cb8428ce3aaa1e355900176ea9d4, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:49 server Short Header{DestConnectionID: c7247464f030be6cef16a43340edb9c109558d45, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:49 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:49 server -> &wire.NewTokenFrame{Token: 0xb1b8fa550cba31aead4dfef996d8d80526ddc323494654f21b4c622373b401f9c0d0687c892e71f23e80bb13416936f618a25cf9fb7d451e9c7844da35794536d794a90c6b4627e3728646ad3399e9cce793e4ed2255} 2025/04/30 08:48:49 server <- Reading packet 6 (27 bytes) for connection dcee217c, 1-RTT 2025/04/30 08:48:49 server Short Header{DestConnectionID: dcee217c, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:49 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 136µs} 2025/04/30 08:48:49 server newly acked packets (2): [0 1] 2025/04/30 08:48:49 server updated RTT: 122.205ms (σ: 76.7ms) 2025/04/30 08:48:49 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:49 server Canceling loss detection timer. 2025/04/30 08:48:49 Removing connection ID b0135da0ce0f1dddb457490579ec7607 after it has been retired. 2025/04/30 08:48:49 Tracking 51 connection IDs and 4 reset tokens. 2025/04/30 08:48:49 Removing connection IDs [40e923dc 347f0863 63e5c409 fded781c ba7f4e0d f4944235] for a closed connection after it has been retired. 2025/04/30 08:48:49 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 08:48:49 server -> Sending packet 21 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:49 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:49 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:49 server -> Sending packet 22 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:49 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:49 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:50 server <- Reading packet 9 (292 bytes) for connection dcee217c, 1-RTT 2025/04/30 08:48:50 server Short Header{DestConnectionID: dcee217c, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:50 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 635.456ms} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3ea9fa9954ac63d57ee87ac28cc2553deb6affe4, StatelessResetToken: 0xca98ebba0e1f29a4021f56f888e14346} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f8d5222176c78af9e47bd58d92b7225d0b5619b7, StatelessResetToken: 0x5ffce502f2b620e0769540a0300082d1} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 70f89d9ff8cb21b0b653a8cfc0f37dd64a7e5887, StatelessResetToken: 0x7b04b8453df5a69f79f5dc1c68d87af5} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3ea9fa9954ac63d57ee87ac28cc2553deb6affe4, StatelessResetToken: 0xca98ebba0e1f29a4021f56f888e14346} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f8d5222176c78af9e47bd58d92b7225d0b5619b7, StatelessResetToken: 0x5ffce502f2b620e0769540a0300082d1} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 70f89d9ff8cb21b0b653a8cfc0f37dd64a7e5887, StatelessResetToken: 0x7b04b8453df5a69f79f5dc1c68d87af5} 2025/04/30 08:48:50 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:50 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:50 server <- Reading packet 10 (31 bytes) for connection dcee217c, 1-RTT 2025/04/30 08:48:50 server Short Header{DestConnectionID: dcee217c, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:50 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 635.672ms} 2025/04/30 08:48:50 server <- &wire.PingFrame{} 2025/04/30 08:48:50 Received request: GET /qwetrrhniy 2025/04/30 08:48:50 server -> Sending packet 2 (1315 bytes) for connection 1722cb8428ce3aaa1e355900176ea9d4, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:50 server Short Header{DestConnectionID: 3ea9fa9954ac63d57ee87ac28cc2553deb6affe4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:50 server -> &wire.PingFrame{} 2025/04/30 08:48:50 server -> Sending packet 3 (48 bytes) for connection 1722cb8428ce3aaa1e355900176ea9d4, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:50 server Short Header{DestConnectionID: 3ea9fa9954ac63d57ee87ac28cc2553deb6affe4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:50 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 6, Smallest: 6}}, DelayTime: 259.315µs} 2025/04/30 08:48:50 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:50 server -> Sending packet 4 (1065 bytes) for connection 1722cb8428ce3aaa1e355900176ea9d4, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:50 server Short Header{DestConnectionID: 3ea9fa9954ac63d57ee87ac28cc2553deb6affe4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:50 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:50 Removing connection ID c30a2e76f77755b56f5352843519515a after it has been retired. 2025/04/30 08:48:50 Removing connection IDs [0ba7344b 2af36233 7301c46e 3c4346f7 152f9097 0836d857] for a closed connection after it has been retired. 2025/04/30 08:48:50 server <- Reading packet 13 (31 bytes) for connection dcee217c, 1-RTT 2025/04/30 08:48:50 server Short Header{DestConnectionID: dcee217c, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:50 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 337.096ms} 2025/04/30 08:48:50 server newly acked packets (2): [2 3] 2025/04/30 08:48:50 server updated RTT: 149.954ms (σ: 113.024ms) 2025/04/30 08:48:50 server <- &wire.PingFrame{} 2025/04/30 08:48:50 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:48:50 server Ignoring all packets below 11. 2025/04/30 08:48:50 server <- Reading packet 14 (31 bytes) for connection dcee217c, 1-RTT 2025/04/30 08:48:50 server Short Header{DestConnectionID: dcee217c, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:50 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 337.248ms} 2025/04/30 08:48:50 server <- &wire.PingFrame{} 2025/04/30 08:48:50 server -> Sending packet 5 (44 bytes) for connection 1722cb8428ce3aaa1e355900176ea9d4, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:50 server Short Header{DestConnectionID: 3ea9fa9954ac63d57ee87ac28cc2553deb6affe4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:50 server -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 13, DelayTime: 187.631µs} 2025/04/30 08:48:50 server <- Reading packet 15 (307 bytes) for connection dcee217c, 1-RTT 2025/04/30 08:48:50 server Short Header{DestConnectionID: dcee217c, PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:50 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 104µs} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: f6943a74855e759d6a949dd6e05fde5dccbee07b, StatelessResetToken: 0x9f89d52c45c04712ae51fd9391ded990} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 3ea9fa9954ac63d57ee87ac28cc2553deb6affe4, StatelessResetToken: 0xca98ebba0e1f29a4021f56f888e14346} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: f8d5222176c78af9e47bd58d92b7225d0b5619b7, StatelessResetToken: 0x5ffce502f2b620e0769540a0300082d1} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 70f89d9ff8cb21b0b653a8cfc0f37dd64a7e5887, StatelessResetToken: 0x7b04b8453df5a69f79f5dc1c68d87af5} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 3ea9fa9954ac63d57ee87ac28cc2553deb6affe4, StatelessResetToken: 0xca98ebba0e1f29a4021f56f888e14346} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: f8d5222176c78af9e47bd58d92b7225d0b5619b7, StatelessResetToken: 0x5ffce502f2b620e0769540a0300082d1} 2025/04/30 08:48:50 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 70f89d9ff8cb21b0b653a8cfc0f37dd64a7e5887, StatelessResetToken: 0x7b04b8453df5a69f79f5dc1c68d87af5} 2025/04/30 08:48:50 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:50 server Sending ACK because the ACK timer expired. 2025/04/30 08:48:50 server -> Sending packet 6 (45 bytes) for connection 1722cb8428ce3aaa1e355900176ea9d4, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:50 server Short Header{DestConnectionID: 3ea9fa9954ac63d57ee87ac28cc2553deb6affe4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:50 server -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 13, DelayTime: 25.318625ms} 2025/04/30 08:48:50 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:50 server -> Sending packet 8 (1065 bytes) for connection 1722cb8428ce3aaa1e355900176ea9d4, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:50 server Short Header{DestConnectionID: 3ea9fa9954ac63d57ee87ac28cc2553deb6affe4, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:50 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:50 server -> Sending packet 9 (1065 bytes) for connection 1722cb8428ce3aaa1e355900176ea9d4, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:50 server Short Header{DestConnectionID: 3ea9fa9954ac63d57ee87ac28cc2553deb6affe4, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:50 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:50 server <- Reading packet 16 (32 bytes) for connection dcee217c, 1-RTT 2025/04/30 08:48:50 server Short Header{DestConnectionID: dcee217c, PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:50 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:50 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:50 Replacing connection for connection IDs [dcee217c dd4805ef 73fa9918 3eee4b38 34ab7358 3355f8c3] with a closed connection. 2025/04/30 08:48:50 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:50 server Connection 1722cb8428ce3aaa1e355900176ea9d4 closed. 2025/04/30 08:48:51 server <- Received Initial packet. 2025/04/30 08:48:51 Created qlog file: /logs/qlog/2dfb4573bde675a15a572a6e838d7ae7.sqlog 2025/04/30 08:48:51 server Changing connection ID to 02ead759. 2025/04/30 08:48:51 Adding connection IDs 2dfb4573bde675a15a572a6e838d7ae7 and 02ead759 for a new connection. 2025/04/30 08:48:51 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:51 server <- Reading packet 0 (333 bytes) for connection 2dfb4573bde675a15a572a6e838d7ae7, Initial 2025/04/30 08:48:51 server Long Header{Type: Initial, DestConnectionID: 2dfb4573bde675a15a572a6e838d7ae7, SrcConnectionID: ec2ae621d15a0da28c2f3a2b8a099e02eb0df37d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:51 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:51 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:51 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:51 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:51 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: ec2ae621d15a0da28c2f3a2b8a099e02eb0df37d, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:51 Adding connection ID 49092646. 2025/04/30 08:48:51 Adding connection ID f1a6e11c. 2025/04/30 08:48:51 Adding connection ID bb2a9a32. 2025/04/30 08:48:51 Adding connection ID 47e53379. 2025/04/30 08:48:51 Adding connection ID a3144d4c. 2025/04/30 08:48:51 server coalesced packet has different destination connection ID: 00000000, expected 2dfb4573bde675a15a572a6e838d7ae7 2025/04/30 08:48:51 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2dfb4573bde675a15a572a6e838d7ae7 2025/04/30 08:48:51 server Long Header{Type: Initial, DestConnectionID: ec2ae621d15a0da28c2f3a2b8a099e02eb0df37d, SrcConnectionID: 02ead759, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 325, Version: v1} 2025/04/30 08:48:51 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:51 server Long Header{Type: Handshake, DestConnectionID: ec2ae621d15a0da28c2f3a2b8a099e02eb0df37d, SrcConnectionID: 02ead759, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 08:48:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 08:48:51 server Short Header{DestConnectionID: ec2ae621d15a0da28c2f3a2b8a099e02eb0df37d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 47e53379, StatelessResetToken: 0x28fe119698e7cdc9ccd700ddc0e9edba} 2025/04/30 08:48:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a3144d4c, StatelessResetToken: 0x9af8871e3c4d2f70878e1633791aa15b} 2025/04/30 08:48:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f1a6e11c, StatelessResetToken: 0xc8b9d3eaf13fb9b447a2d0b47de93944} 2025/04/30 08:48:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 49092646, StatelessResetToken: 0x4711d4b14e91166ce398f5c2f32f5c6c} 2025/04/30 08:48:51 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: bb2a9a32, StatelessResetToken: 0xdb24e2b9bd06bae3ee3ab97fc9700bda} 2025/04/30 08:48:51 Removing connection ID 94f707849f7676383bb359e0c8ffa9cc after it has been retired. 2025/04/30 08:48:51 server <- Reading packet 4 (96 bytes) for connection 02ead759, Handshake 2025/04/30 08:48:51 server Long Header{Type: Handshake, DestConnectionID: 02ead759, SrcConnectionID: ec2ae621d15a0da28c2f3a2b8a099e02eb0df37d, PacketNumber: 4, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:51 server Dropping Initial keys. 2025/04/30 08:48:51 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 102.832ms} 2025/04/30 08:48:51 server newly acked packets (1): [0] 2025/04/30 08:48:51 server updated RTT: 135.098857ms (σ: 67.549428ms) 2025/04/30 08:48:51 server Canceling loss detection timer. 2025/04/30 08:48:51 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:51 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:51 Retiring connection ID 2dfb4573bde675a15a572a6e838d7ae7 in 5s. 2025/04/30 08:48:51 server Dropping Handshake keys. 2025/04/30 08:48:51 server -> Sending packet 1 (271 bytes) for connection 2dfb4573bde675a15a572a6e838d7ae7, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:51 server Short Header{DestConnectionID: ec2ae621d15a0da28c2f3a2b8a099e02eb0df37d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:51 server -> &wire.NewTokenFrame{Token: 0xe1f854dd4eacc771d92cf3213ff320330eabff172f9526bb970f273c5560a4b94f74bd80ff726b75e272e3378c4bfd41e19c993dfc733d11e0a73b5ed01f8809bcb45613663b5ce43c73c2cdada6a4d4ae146d5d5822} 2025/04/30 08:48:51 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:51 server <- Reading packet 5 (172 bytes) for connection 02ead759, 1-RTT 2025/04/30 08:48:51 server Short Header{DestConnectionID: 02ead759, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:51 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 255.048ms} 2025/04/30 08:48:51 server newly acked packets (1): [0] 2025/04/30 08:48:51 server updated RTT: 151.035ms (σ: 82.537ms) 2025/04/30 08:48:51 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6243aebe4c17b76b8eb77f8796b22ac54ee522ee, StatelessResetToken: 0x22b5edc12f7c4cb669c639d8e8b7cafd} 2025/04/30 08:48:51 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5f11110cdc9b5ac84c76892c9a3fb7e7bfa5baef, StatelessResetToken: 0xba5f53b04ad516f2eccbb444a2518a92} 2025/04/30 08:48:51 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: dc54fae568e20f2b87b83a846724e54385a2771b, StatelessResetToken: 0x451e0eaba073b8cd08940f7518d2c665} 2025/04/30 08:48:51 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:51 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:51 server -> Sending packet 2 (46 bytes) for connection 2dfb4573bde675a15a572a6e838d7ae7, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:51 server Short Header{DestConnectionID: 6243aebe4c17b76b8eb77f8796b22ac54ee522ee, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:51 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 309.358µs} 2025/04/30 08:48:51 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:51 Received request: GET /ornsjihxuy 2025/04/30 08:48:51 server -> Sending packet 3 (1065 bytes) for connection 2dfb4573bde675a15a572a6e838d7ae7, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:51 server Short Header{DestConnectionID: 6243aebe4c17b76b8eb77f8796b22ac54ee522ee, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:51 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:51 Tracking 44 connection IDs and 5 reset tokens. 2025/04/30 08:48:51 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:51 server -> Sending packet 5 (271 bytes) for connection 2dfb4573bde675a15a572a6e838d7ae7, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:51 server Short Header{DestConnectionID: 6243aebe4c17b76b8eb77f8796b22ac54ee522ee, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:51 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:51 server -> &wire.NewTokenFrame{Token: 0xe1f854dd4eacc771d92cf3213ff320330eabff172f9526bb970f273c5560a4b94f74bd80ff726b75e272e3378c4bfd41e19c993dfc733d11e0a73b5ed01f8809bcb45613663b5ce43c73c2cdada6a4d4ae146d5d5822} 2025/04/30 08:48:51 server Skipping packet number 4 2025/04/30 08:48:51 server -> Sending packet 6 (41 bytes) for connection 2dfb4573bde675a15a572a6e838d7ae7, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:51 server Short Header{DestConnectionID: 6243aebe4c17b76b8eb77f8796b22ac54ee522ee, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:51 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:51 server <- Reading packet 9 (69 bytes) for connection 02ead759, 1-RTT 2025/04/30 08:48:51 server Short Header{DestConnectionID: 02ead759, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:51 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs} 2025/04/30 08:48:51 server newly acked packets (2): [5 6] 2025/04/30 08:48:51 server updated RTT: 136.097ms (σ: 91.776ms) 2025/04/30 08:48:51 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:51 server lost packet 3 (time threshold) 2025/04/30 08:48:51 server Canceling loss detection timer. 2025/04/30 08:48:51 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: ca666fa76f754f0133fbfbad4d5fee5a495c560e, StatelessResetToken: 0x914fecb41f449064290cc41f35fcfa96} 2025/04/30 08:48:51 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:48:51 server -> Sending packet 7 (1315 bytes) for connection 2dfb4573bde675a15a572a6e838d7ae7, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:51 server Short Header{DestConnectionID: 6243aebe4c17b76b8eb77f8796b22ac54ee522ee, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:51 server -> &wire.PingFrame{} 2025/04/30 08:48:51 server -> Sending packet 8 (1072 bytes) for connection 2dfb4573bde675a15a572a6e838d7ae7, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:51 server Short Header{DestConnectionID: 6243aebe4c17b76b8eb77f8796b22ac54ee522ee, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:51 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 5}}, DelayTime: 200.595µs} 2025/04/30 08:48:51 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:51 server <- Reading packet 10 (29 bytes) for connection 02ead759, 1-RTT 2025/04/30 08:48:51 server Short Header{DestConnectionID: 02ead759, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:51 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs} 2025/04/30 08:48:51 server newly acked packets (1): [7] 2025/04/30 08:48:51 server updated RTT: 123.083ms (σ: 94.858ms) 2025/04/30 08:48:51 server <- Reading packet 11 (32 bytes) for connection 02ead759, 1-RTT 2025/04/30 08:48:51 server Short Header{DestConnectionID: 02ead759, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:51 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:51 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:51 Replacing connection for connection IDs [02ead759 49092646 f1a6e11c bb2a9a32 47e53379 a3144d4c] with a closed connection. 2025/04/30 08:48:51 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:51 server Connection 2dfb4573bde675a15a572a6e838d7ae7 closed. 2025/04/30 08:48:52 server <- Received Initial packet. 2025/04/30 08:48:52 Created qlog file: /logs/qlog/b6522d9f14ae26935d5b43da8cb2af95.sqlog 2025/04/30 08:48:52 server Changing connection ID to 60e97726. 2025/04/30 08:48:52 Adding connection IDs b6522d9f14ae26935d5b43da8cb2af95 and 60e97726 for a new connection. 2025/04/30 08:48:52 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:52 server <- Reading packet 0 (333 bytes) for connection b6522d9f14ae26935d5b43da8cb2af95, Initial 2025/04/30 08:48:52 server Long Header{Type: Initial, DestConnectionID: b6522d9f14ae26935d5b43da8cb2af95, SrcConnectionID: 69bf3da5170af58bb69059f3d15bc4a16ec0b4d7, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:52 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:52 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:52 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:52 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:52 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 69bf3da5170af58bb69059f3d15bc4a16ec0b4d7, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:52 Adding connection ID 17614665. 2025/04/30 08:48:52 Adding connection ID 78673524. 2025/04/30 08:48:52 Adding connection ID fd830365. 2025/04/30 08:48:52 Adding connection ID a5d9e80d. 2025/04/30 08:48:52 Adding connection ID d2030b55. 2025/04/30 08:48:52 server coalesced packet has different destination connection ID: 00000000, expected b6522d9f14ae26935d5b43da8cb2af95 2025/04/30 08:48:52 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b6522d9f14ae26935d5b43da8cb2af95 2025/04/30 08:48:52 server Long Header{Type: Initial, DestConnectionID: 69bf3da5170af58bb69059f3d15bc4a16ec0b4d7, SrcConnectionID: 60e97726, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 319, Version: v1} 2025/04/30 08:48:52 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:52 server Long Header{Type: Handshake, DestConnectionID: 69bf3da5170af58bb69059f3d15bc4a16ec0b4d7, SrcConnectionID: 60e97726, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 08:48:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 08:48:52 server Short Header{DestConnectionID: 69bf3da5170af58bb69059f3d15bc4a16ec0b4d7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fd830365, StatelessResetToken: 0xd700465be6c083df1ac35a23e1279179} 2025/04/30 08:48:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 17614665, StatelessResetToken: 0x29edff719d50e3cf9d37d8265f9ffc11} 2025/04/30 08:48:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a5d9e80d, StatelessResetToken: 0x04fc34332726be6bd6f0d1c0fc2dae3f} 2025/04/30 08:48:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 78673524, StatelessResetToken: 0xc952ad7b193002ac4485451edb53e1a3} 2025/04/30 08:48:52 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: d2030b55, StatelessResetToken: 0xc43586c865ed56eaba9dd35dfbdc110e} 2025/04/30 08:48:52 server <- Reading packet 4 (96 bytes) for connection 60e97726, Handshake 2025/04/30 08:48:52 server Long Header{Type: Handshake, DestConnectionID: 60e97726, SrcConnectionID: 69bf3da5170af58bb69059f3d15bc4a16ec0b4d7, PacketNumber: 4, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:52 server Dropping Initial keys. 2025/04/30 08:48:52 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 103.016ms} 2025/04/30 08:48:52 server newly acked packets (1): [0] 2025/04/30 08:48:52 server updated RTT: 135.462377ms (σ: 67.731188ms) 2025/04/30 08:48:52 server Canceling loss detection timer. 2025/04/30 08:48:52 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:52 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:52 Retiring connection ID b6522d9f14ae26935d5b43da8cb2af95 in 5s. 2025/04/30 08:48:52 server Dropping Handshake keys. 2025/04/30 08:48:52 server -> Sending packet 1 (271 bytes) for connection b6522d9f14ae26935d5b43da8cb2af95, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:52 server Short Header{DestConnectionID: 69bf3da5170af58bb69059f3d15bc4a16ec0b4d7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:52 server -> &wire.NewTokenFrame{Token: 0x4096478a01400593be734f1eea61f8c731f7933b2d55258423b385601398ca33f64aaf755441d6612768acf65a01d439c1e954c3a875cead48524f69c947b6a41c765d9cb6427019c032395b72bf952d4e3cc55e68ad} 2025/04/30 08:48:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:52 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:52 server <- Reading packet 5 (172 bytes) for connection 60e97726, 1-RTT 2025/04/30 08:48:52 server Short Header{DestConnectionID: 60e97726, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:52 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 257.144ms} 2025/04/30 08:48:52 server newly acked packets (1): [0] 2025/04/30 08:48:52 server updated RTT: 151.657ms (σ: 83.189ms) 2025/04/30 08:48:52 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b48de49f1c1f99b1f503c6cb4dcb1272e16606ba, StatelessResetToken: 0x7f917cba91e3f0fbf38eeb4463719ab3} 2025/04/30 08:48:52 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b625382028e7ac8d909ca6549e31559889934c28, StatelessResetToken: 0xcc15a4ef634d9284aa4fba8193bd5dac} 2025/04/30 08:48:52 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9a5f88e58d1f39a1568ec4f23903edde5d5cda61, StatelessResetToken: 0x86a3e5ac43cd9327cba299922e8d6280} 2025/04/30 08:48:52 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:52 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:52 server <- Reading packet 6 (31 bytes) for connection 60e97726, 1-RTT 2025/04/30 08:48:52 server Short Header{DestConnectionID: 60e97726, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:52 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 257.32ms} 2025/04/30 08:48:52 server <- &wire.PingFrame{} 2025/04/30 08:48:52 server -> Sending packet 2 (46 bytes) for connection b6522d9f14ae26935d5b43da8cb2af95, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:52 server Short Header{DestConnectionID: b48de49f1c1f99b1f503c6cb4dcb1272e16606ba, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:52 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 243.174µs} 2025/04/30 08:48:52 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:52 Received request: GET /oqjvzydlqv 2025/04/30 08:48:52 server -> Sending packet 3 (1065 bytes) for connection b6522d9f14ae26935d5b43da8cb2af95, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:52 server Short Header{DestConnectionID: b48de49f1c1f99b1f503c6cb4dcb1272e16606ba, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:52 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:52 Removing connection IDs [becdaf2d ebf4aa09 878298a0 3fda83f3 e73fe1bb 50eef13b] for a closed connection after it has been retired. 2025/04/30 08:48:52 server Dropping %!s(logging.PacketType=1) packet (59 bytes) because we already dropped the keys. 2025/04/30 08:48:52 server <- Reading packet 11 (31 bytes) for connection 60e97726, 1-RTT 2025/04/30 08:48:52 server Short Header{DestConnectionID: 60e97726, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:52 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 453.464ms} 2025/04/30 08:48:52 server newly acked packets (1): [2] 2025/04/30 08:48:52 server updated RTT: 190.139ms (σ: 139.356ms) 2025/04/30 08:48:52 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:52 server lost packet 1 (time threshold) 2025/04/30 08:48:52 server <- &wire.PingFrame{} 2025/04/30 08:48:52 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:48:52 server Ignoring all packets below 7. 2025/04/30 08:48:52 server -> Sending packet 4 (276 bytes) for connection b6522d9f14ae26935d5b43da8cb2af95, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:52 server Short Header{DestConnectionID: b48de49f1c1f99b1f503c6cb4dcb1272e16606ba, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:52 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 173.244µs} 2025/04/30 08:48:52 server -> &wire.NewTokenFrame{Token: 0x4096478a01400593be734f1eea61f8c731f7933b2d55258423b385601398ca33f64aaf755441d6612768acf65a01d439c1e954c3a875cead48524f69c947b6a41c765d9cb6427019c032395b72bf952d4e3cc55e68ad} 2025/04/30 08:48:52 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:52 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:53 server <- Reading packet 13 (187 bytes) for connection 60e97726, 1-RTT 2025/04/30 08:48:53 server Short Header{DestConnectionID: 60e97726, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:53 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 144µs} 2025/04/30 08:48:53 server newly acked packets (1): [4] 2025/04/30 08:48:53 server updated RTT: 170.301ms (σ: 144.192ms) 2025/04/30 08:48:53 server lost packet 3 (time threshold) 2025/04/30 08:48:53 server Canceling loss detection timer. 2025/04/30 08:48:53 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 5ce353eeba0016be798a8f3b122d96d87f4665e1, StatelessResetToken: 0xdfdf5c9568cf8e84c607486c928a6f16} 2025/04/30 08:48:53 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: b48de49f1c1f99b1f503c6cb4dcb1272e16606ba, StatelessResetToken: 0x7f917cba91e3f0fbf38eeb4463719ab3} 2025/04/30 08:48:53 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: b625382028e7ac8d909ca6549e31559889934c28, StatelessResetToken: 0xcc15a4ef634d9284aa4fba8193bd5dac} 2025/04/30 08:48:53 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 9a5f88e58d1f39a1568ec4f23903edde5d5cda61, StatelessResetToken: 0x86a3e5ac43cd9327cba299922e8d6280} 2025/04/30 08:48:53 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:48:53 server Ignoring all packets below 12. 2025/04/30 08:48:53 server -> Sending packet 5 (1070 bytes) for connection b6522d9f14ae26935d5b43da8cb2af95, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:53 server Short Header{DestConnectionID: b48de49f1c1f99b1f503c6cb4dcb1272e16606ba, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:53 server -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 13, DelayTime: 241.601µs} 2025/04/30 08:48:53 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:53 server <- Reading packet 14 (32 bytes) for connection 60e97726, 1-RTT 2025/04/30 08:48:53 server Short Header{DestConnectionID: 60e97726, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:53 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:53 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:53 Replacing connection for connection IDs [78673524 fd830365 a5d9e80d d2030b55 60e97726 17614665] with a closed connection. 2025/04/30 08:48:53 server Connection b6522d9f14ae26935d5b43da8cb2af95 closed. 2025/04/30 08:48:53 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:53 Tracking 45 connection IDs and 4 reset tokens. 2025/04/30 08:48:54 server Destroying connection: timeout: no recent network activity 2025/04/30 08:48:54 Removing connection ID 10dade8e. 2025/04/30 08:48:54 Removing connection ID c1361734. 2025/04/30 08:48:54 Removing connection ID a9c1a1ea. 2025/04/30 08:48:54 Removing connection ID 36e2d794. 2025/04/30 08:48:54 Error accepting stream: timeout: no recent network activity 2025/04/30 08:48:54 Removing connection ID 7c738ae5. 2025/04/30 08:48:54 Removing connection ID 33335c34. 2025/04/30 08:48:54 server Connection b6d488943f4a9d3786308d64172d8591 closed. 2025/04/30 08:48:54 server <- Received Initial packet. 2025/04/30 08:48:54 Created qlog file: /logs/qlog/9edc74ced76af8d7fc50ff2cf739458a.sqlog 2025/04/30 08:48:54 server Changing connection ID to 5db2c25f. 2025/04/30 08:48:54 Adding connection IDs 9edc74ced76af8d7fc50ff2cf739458a and 5db2c25f for a new connection. 2025/04/30 08:48:54 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:54 server <- Reading packet 1 (333 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, Initial 2025/04/30 08:48:54 server Long Header{Type: Initial, DestConnectionID: 9edc74ced76af8d7fc50ff2cf739458a, SrcConnectionID: 32604f7b6f06081cd9213b738ea32670666011cb, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:54 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:54 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:54 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:54 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 32604f7b6f06081cd9213b738ea32670666011cb, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:54 Adding connection ID 5316f956. 2025/04/30 08:48:54 Adding connection ID 032698c8. 2025/04/30 08:48:54 Adding connection ID e8528232. 2025/04/30 08:48:54 Adding connection ID 2be41f76. 2025/04/30 08:48:54 Adding connection ID a2e13f74. 2025/04/30 08:48:54 server coalesced packet has different destination connection ID: 00000000, expected 9edc74ced76af8d7fc50ff2cf739458a 2025/04/30 08:48:54 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a 2025/04/30 08:48:54 server Long Header{Type: Initial, DestConnectionID: 32604f7b6f06081cd9213b738ea32670666011cb, SrcConnectionID: 5db2c25f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 326, Version: v1} 2025/04/30 08:48:54 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s} 2025/04/30 08:48:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:54 server Long Header{Type: Handshake, DestConnectionID: 32604f7b6f06081cd9213b738ea32670666011cb, SrcConnectionID: 5db2c25f, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 08:48:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 08:48:54 server Short Header{DestConnectionID: 32604f7b6f06081cd9213b738ea32670666011cb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5316f956, StatelessResetToken: 0x873b7eddd00331349eb56a3faec926d0} 2025/04/30 08:48:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2be41f76, StatelessResetToken: 0x62618d7e6a6dc1e18dc17e2a635f5873} 2025/04/30 08:48:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a2e13f74, StatelessResetToken: 0xb1c5c7d55cbca20f43af4ce24401cad7} 2025/04/30 08:48:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e8528232, StatelessResetToken: 0x164510382e542dc264ebd7347df0e777} 2025/04/30 08:48:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 032698c8, StatelessResetToken: 0xfa4a3ea93986150868b8115b2dc25875} 2025/04/30 08:48:54 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:54 server <- Reading packet 2 (57 bytes) for connection 5db2c25f, Initial 2025/04/30 08:48:54 server Long Header{Type: Initial, DestConnectionID: 5db2c25f, SrcConnectionID: 32604f7b6f06081cd9213b738ea32670666011cb, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:54 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 672µs} 2025/04/30 08:48:54 server newly acked packets (1): [0] 2025/04/30 08:48:54 server updated RTT: 33.723806ms (σ: 16.861903ms) 2025/04/30 08:48:54 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:54 server <- Reading packet 3 (95 bytes) for connection 5db2c25f, Handshake 2025/04/30 08:48:54 server Long Header{Type: Handshake, DestConnectionID: 5db2c25f, SrcConnectionID: 32604f7b6f06081cd9213b738ea32670666011cb, PacketNumber: 3, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:54 server Dropping Initial keys. 2025/04/30 08:48:54 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 464µs} 2025/04/30 08:48:54 server newly acked packets (1): [0] 2025/04/30 08:48:54 server updated RTT: 33.723ms (σ: 12.645ms) 2025/04/30 08:48:54 server Canceling loss detection timer. 2025/04/30 08:48:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:54 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:54 Retiring connection ID 9edc74ced76af8d7fc50ff2cf739458a in 5s. 2025/04/30 08:48:54 server Dropping Handshake keys. 2025/04/30 08:48:54 server <- Reading packet 4 (1198 bytes) for connection 5db2c25f, 1-RTT 2025/04/30 08:48:54 server Short Header{DestConnectionID: 5db2c25f, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:54 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208µs} 2025/04/30 08:48:54 server newly acked packets (1): [0] 2025/04/30 08:48:54 server updated RTT: 33.723ms (σ: 9.483ms) 2025/04/30 08:48:54 server Canceling loss detection timer. 2025/04/30 08:48:54 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, StatelessResetToken: 0x9547f8275b7248b600f268b7ed4a7d66} 2025/04/30 08:48:54 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3aa0056e7a6c4788851c5e731d9c86d670a58d54, StatelessResetToken: 0xe382c24f6cd2252beb35440f298a9523} 2025/04/30 08:48:54 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9ea44ab2a8778e78560f2aef7afa485335747fd0, StatelessResetToken: 0x51d8a111e2c2fcb1d433cc588101fabf} 2025/04/30 08:48:54 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:54 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:54 server -> Sending packet 1 (278 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:54 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:54 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 395.94µs} 2025/04/30 08:48:54 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:54 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:54 server -> &wire.NewTokenFrame{Token: 0xeb6d302c88237063eb794834f4d1ce5c58b11f3b3a19439645e40fdbe15f661dfb9fd1ee45de2d692773cba2d6e232f9d83acf6cda1dc3601413b7dac5693fbbe0e5dbe1f30cbb50fb5d3f7a9f1f9306e77110925356} 2025/04/30 08:48:54 Received request: GET /ltmmgebjtf 2025/04/30 08:48:54 server -> Sending packet 2 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:54 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:54 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:54 server <- Reading packet 5 (67 bytes) for connection 5db2c25f, 1-RTT 2025/04/30 08:48:54 server Short Header{DestConnectionID: 5db2c25f, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:54 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 192µs} 2025/04/30 08:48:54 server newly acked packets (1): [1] 2025/04/30 08:48:54 server updated RTT: 33.422ms (σ: 7.713ms) 2025/04/30 08:48:54 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:54 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: b19bcd4df9fb01b125a5a81227007abfd45fec90, StatelessResetToken: 0x66154cc364fc546ea6535c0b88019d66} 2025/04/30 08:48:54 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:54 server Ignoring all packets below 5. 2025/04/30 08:48:54 server Sending ACK because the ACK timer expired. 2025/04/30 08:48:54 server -> Sending packet 3 (45 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:54 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:54 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 25.436959ms} 2025/04/30 08:48:54 Removing connection ID 1722cb8428ce3aaa1e355900176ea9d4 after it has been retired. 2025/04/30 08:48:54 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:54 server -> Sending packet 5 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:54 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:54 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:54 server -> Sending packet 6 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:54 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:54 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:54 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:48:54 server -> Sending packet 8 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:54 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:54 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:54 server -> Sending packet 9 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:54 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:54 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:54 server -> Sending packet 10 (1315 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:54 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:54 server -> &wire.PingFrame{} 2025/04/30 08:48:54 server <- Received Initial packet. 2025/04/30 08:48:54 Created qlog file: /logs/qlog/9d731ff360ee8d351d01e27c878d5675.sqlog 2025/04/30 08:48:54 server Changing connection ID to 3f8eea06. 2025/04/30 08:48:54 Adding connection IDs 9d731ff360ee8d351d01e27c878d5675 and 3f8eea06 for a new connection. 2025/04/30 08:48:54 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:54 server <- Reading packet 0 (333 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, Initial 2025/04/30 08:48:54 server Long Header{Type: Initial, DestConnectionID: 9d731ff360ee8d351d01e27c878d5675, SrcConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:54 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:54 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:54 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:54 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:54 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:54 Adding connection ID a11b73c9. 2025/04/30 08:48:54 Adding connection ID b457cddf. 2025/04/30 08:48:54 Adding connection ID 1eb9f410. 2025/04/30 08:48:54 Adding connection ID d798e476. 2025/04/30 08:48:54 Adding connection ID 43c764a4. 2025/04/30 08:48:54 server coalesced packet has different destination connection ID: 00000000, expected 9d731ff360ee8d351d01e27c878d5675 2025/04/30 08:48:54 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9d731ff360ee8d351d01e27c878d5675 2025/04/30 08:48:54 server Long Header{Type: Initial, DestConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, SrcConnectionID: 3f8eea06, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 323, Version: v1} 2025/04/30 08:48:54 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:54 server Long Header{Type: Handshake, DestConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, SrcConnectionID: 3f8eea06, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 08:48:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 08:48:54 server Short Header{DestConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1eb9f410, StatelessResetToken: 0xad128668a38c44ed26f677b175533d6f} 2025/04/30 08:48:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a11b73c9, StatelessResetToken: 0xb7d9c4f37947cc5f0e4fee0f14177167} 2025/04/30 08:48:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b457cddf, StatelessResetToken: 0x23a048ddc4842e54026e8a7537208b3e} 2025/04/30 08:48:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d798e476, StatelessResetToken: 0xfe5b92b60b9d81a67e0e0b84b5fa7af5} 2025/04/30 08:48:54 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 43c764a4, StatelessResetToken: 0x3d57e201273a3305c4a27ae2916af74d} 2025/04/30 08:48:54 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:48:54 server -> Sending packet 1 (1280 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, Initial 2025/04/30 08:48:54 server Long Header{Type: Initial, DestConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, SrcConnectionID: 3f8eea06, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:54 server -> Sending packet 2 (1280 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, Initial 2025/04/30 08:48:54 server Long Header{Type: Initial, DestConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, SrcConnectionID: 3f8eea06, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:54 server Canceling loss detection timer. 2025/04/30 08:48:54 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:48:54 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:48:54 server <- Reading packet 1 (56 bytes) for connection 3f8eea06, Initial 2025/04/30 08:48:54 server Long Header{Type: Initial, DestConnectionID: 3f8eea06, SrcConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:54 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 272µs} 2025/04/30 08:48:54 server coalesced packet has different destination connection ID: 00000000, expected 3f8eea06 2025/04/30 08:48:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 08:48:55 server -> Sending packet 12 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:55 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:55 server -> Sending packet 13 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:55 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:55 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:48:55 server -> Sending packet 1 (764 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, Handshake 2025/04/30 08:48:55 server Long Header{Type: Handshake, DestConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, SrcConnectionID: 3f8eea06, PacketNumber: 1, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 08:48:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 08:48:55 server -> Sending packet 2 (764 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, Handshake 2025/04/30 08:48:55 server Long Header{Type: Handshake, DestConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, SrcConnectionID: 3f8eea06, PacketNumber: 2, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 08:48:55 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 08:48:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 08:48:55 server -> Sending packet 24 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:55 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:55 server -> Sending packet 25 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:55 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:55 server Parsed a coalesced packet. Part 1: 329 bytes. Remaining: 871 bytes. 2025/04/30 08:48:55 server <- Reading packet 3 (329 bytes) for connection 3f8eea06, Initial 2025/04/30 08:48:55 server Long Header{Type: Initial, DestConnectionID: 3f8eea06, SrcConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 295, Version: v1} 2025/04/30 08:48:55 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 765.088ms} 2025/04/30 08:48:55 server newly acked packets (1): [2] 2025/04/30 08:48:55 server updated RTT: 799.139754ms (σ: 399.569877ms) 2025/04/30 08:48:55 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:55 server coalesced packet has different destination connection ID: 00000000, expected 3f8eea06 2025/04/30 08:48:55 server -> Sending packet 3 (59 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, Initial 2025/04/30 08:48:55 server Long Header{Type: Initial, DestConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, SrcConnectionID: 3f8eea06, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 25, Version: v1} 2025/04/30 08:48:55 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 0s} 2025/04/30 08:48:55 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:48:55 server <- Reading packet 4 (56 bytes) for connection 3f8eea06, Initial 2025/04/30 08:48:55 server Long Header{Type: Initial, DestConnectionID: 3f8eea06, SrcConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:55 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 96µs} 2025/04/30 08:48:55 server coalesced packet has different destination connection ID: 00000000, expected 3f8eea06 2025/04/30 08:48:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 08:48:55 server -> Sending packet 15 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:55 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:55 server -> Sending packet 16 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:55 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:55 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:55 Tracking 52 connection IDs and 4 reset tokens. 2025/04/30 08:48:55 Removing connection IDs [dcee217c dd4805ef 73fa9918 3eee4b38 34ab7358 3355f8c3] for a closed connection after it has been retired. 2025/04/30 08:48:55 server <- Reading packet 6 (54 bytes) for connection 3f8eea06, Handshake 2025/04/30 08:48:55 server Long Header{Type: Handshake, DestConnectionID: 3f8eea06, SrcConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, PacketNumber: 6, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 08:48:55 server Dropping Initial keys. 2025/04/30 08:48:55 server <- &wire.PingFrame{} 2025/04/30 08:48:55 server -> Sending packet 3 (56 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, Handshake 2025/04/30 08:48:55 server Long Header{Type: Handshake, DestConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, SrcConnectionID: 3f8eea06, PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 08:48:55 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s} 2025/04/30 08:48:55 server <- Reading packet 7 (54 bytes) for connection 3f8eea06, Handshake 2025/04/30 08:48:55 server Long Header{Type: Handshake, DestConnectionID: 3f8eea06, SrcConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, PacketNumber: 7, PacketNumberLen: 1, Length: 21, Version: v1} 2025/04/30 08:48:55 server <- &wire.PingFrame{} 2025/04/30 08:48:55 server -> Sending packet 4 (56 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, Handshake 2025/04/30 08:48:55 server Long Header{Type: Handshake, DestConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, SrcConnectionID: 3f8eea06, PacketNumber: 4, PacketNumberLen: 2, Length: 23, Version: v1} 2025/04/30 08:48:55 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 0s} 2025/04/30 08:48:56 Removing connection ID 2dfb4573bde675a15a572a6e838d7ae7 after it has been retired. 2025/04/30 08:48:56 Removing connection IDs [02ead759 49092646 f1a6e11c bb2a9a32 47e53379 a3144d4c] for a closed connection after it has been retired. 2025/04/30 08:48:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 08:48:57 server -> Sending packet 18 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:57 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:57 server -> Sending packet 19 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:57 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:57 Removing connection ID b6522d9f14ae26935d5b43da8cb2af95 after it has been retired. 2025/04/30 08:48:57 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:48:57 server -> Sending packet 5 (764 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, Handshake 2025/04/30 08:48:57 server Long Header{Type: Handshake, DestConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, SrcConnectionID: 3f8eea06, PacketNumber: 5, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 08:48:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 08:48:57 server -> Sending packet 6 (764 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, Handshake 2025/04/30 08:48:57 server Long Header{Type: Handshake, DestConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, SrcConnectionID: 3f8eea06, PacketNumber: 6, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 08:48:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 08:48:57 server Parsed a coalesced packet. Part 1: 97 bytes. Remaining: 164 bytes. 2025/04/30 08:48:57 server <- Reading packet 8 (97 bytes) for connection 3f8eea06, Handshake 2025/04/30 08:48:57 server Long Header{Type: Handshake, DestConnectionID: 3f8eea06, SrcConnectionID: eed7b57183c76f084ea0317cfe6deb2ca2a08faf, PacketNumber: 8, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 08:48:57 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 424µs} 2025/04/30 08:48:57 server newly acked packets (1): [6] 2025/04/30 08:48:57 server updated RTT: 703.372ms (σ: 491.21ms) 2025/04/30 08:48:57 server Canceling loss detection timer. 2025/04/30 08:48:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:57 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:57 Retiring connection ID 9d731ff360ee8d351d01e27c878d5675 in 5s. 2025/04/30 08:48:57 server Dropping Handshake keys. 2025/04/30 08:48:57 server <- Reading packet 9 (164 bytes) for connection 3f8eea06, 1-RTT 2025/04/30 08:48:57 server Short Header{DestConnectionID: 3f8eea06, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:57 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a3d9ea28a4eb53852544f4f76e9741065ef2abe7, StatelessResetToken: 0xd771c7e9dabba81361714e9ad536c6d8} 2025/04/30 08:48:57 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f60ec1fe3b12ae65a5b3d2497d9bf6cf360b279d, StatelessResetToken: 0xf7ba6c8145c33b4eca53ad5cf8eb332d} 2025/04/30 08:48:57 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: df33d7fdadae2e257d63d4071af26347bbf9648b, StatelessResetToken: 0x7d187f0d4c82ef030b9098a6d7ddc8d9} 2025/04/30 08:48:57 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:57 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:57 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:57 Received request: GET /rlecyarpgu 2025/04/30 08:48:57 server -> Sending packet 2 (398 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:57 server Short Header{DestConnectionID: a3d9ea28a4eb53852544f4f76e9741065ef2abe7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:57 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 349.663µs} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 43c764a4, StatelessResetToken: 0x3d57e201273a3305c4a27ae2916af74d} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d798e476, StatelessResetToken: 0xfe5b92b60b9d81a67e0e0b84b5fa7af5} 2025/04/30 08:48:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a11b73c9, StatelessResetToken: 0xb7d9c4f37947cc5f0e4fee0f14177167} 2025/04/30 08:48:57 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b457cddf, StatelessResetToken: 0x23a048ddc4842e54026e8a7537208b3e} 2025/04/30 08:48:57 server -> &wire.NewTokenFrame{Token: 0xacfd3e37168ec2ed733cb9b25dc8e21094960b1e77d0486c868f6b1a00bd6ad53c63dad1a1c510a0f6ae9549df227e89d1efc3459d8ffc7c46004d44fd5ff2b3ba6615ac99a32749c346bf87f0296c30b988feff85e1} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1eb9f410, StatelessResetToken: 0xad128668a38c44ed26f677b175533d6f} 2025/04/30 08:48:57 server -> Sending packet 3 (1280 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:57 server Short Header{DestConnectionID: a3d9ea28a4eb53852544f4f76e9741065ef2abe7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b457cddf, StatelessResetToken: 0x23a048ddc4842e54026e8a7537208b3e} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1eb9f410, StatelessResetToken: 0xad128668a38c44ed26f677b175533d6f} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a11b73c9, StatelessResetToken: 0xb7d9c4f37947cc5f0e4fee0f14177167} 2025/04/30 08:48:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:57 server -> &wire.NewTokenFrame{Token: 0xacfd3e37168ec2ed733cb9b25dc8e21094960b1e77d0486c868f6b1a00bd6ad53c63dad1a1c510a0f6ae9549df227e89d1efc3459d8ffc7c46004d44fd5ff2b3ba6615ac99a32749c346bf87f0296c30b988feff85e1} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 43c764a4, StatelessResetToken: 0x3d57e201273a3305c4a27ae2916af74d} 2025/04/30 08:48:57 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d798e476, StatelessResetToken: 0xfe5b92b60b9d81a67e0e0b84b5fa7af5} 2025/04/30 08:48:57 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 885, Offset + Data length: 885} 2025/04/30 08:48:57 server -> Sending packet 4 (182 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:57 server Short Header{DestConnectionID: a3d9ea28a4eb53852544f4f76e9741065ef2abe7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:57 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 885, Data length: 139, Offset + Data length: 1024} 2025/04/30 08:48:57 server <- Received Initial packet. 2025/04/30 08:48:57 Created qlog file: /logs/qlog/5acdfd90d8bc686df4aeeda53f948f85.sqlog 2025/04/30 08:48:57 server Changing connection ID to 8552dd79. 2025/04/30 08:48:57 Adding connection IDs 5acdfd90d8bc686df4aeeda53f948f85 and 8552dd79 for a new connection. 2025/04/30 08:48:57 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:57 server <- Reading packet 0 (333 bytes) for connection 5acdfd90d8bc686df4aeeda53f948f85, Initial 2025/04/30 08:48:57 server Long Header{Type: Initial, DestConnectionID: 5acdfd90d8bc686df4aeeda53f948f85, SrcConnectionID: 99b67cb9cde3322b3ee02b14991756eae33b170f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:57 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:57 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:57 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:57 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 99b67cb9cde3322b3ee02b14991756eae33b170f, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:57 Adding connection ID 03c84cd6. 2025/04/30 08:48:57 Adding connection ID 325066bb. 2025/04/30 08:48:57 Adding connection ID 03f6547b. 2025/04/30 08:48:57 Adding connection ID 7ccef92a. 2025/04/30 08:48:57 Adding connection ID 24010300. 2025/04/30 08:48:57 server coalesced packet has different destination connection ID: 00000000, expected 5acdfd90d8bc686df4aeeda53f948f85 2025/04/30 08:48:57 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5acdfd90d8bc686df4aeeda53f948f85 2025/04/30 08:48:57 server Long Header{Type: Initial, DestConnectionID: 99b67cb9cde3322b3ee02b14991756eae33b170f, SrcConnectionID: 8552dd79, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 322, Version: v1} 2025/04/30 08:48:57 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:57 server Long Header{Type: Handshake, DestConnectionID: 99b67cb9cde3322b3ee02b14991756eae33b170f, SrcConnectionID: 8552dd79, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 08:48:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 08:48:57 server Short Header{DestConnectionID: 99b67cb9cde3322b3ee02b14991756eae33b170f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 03c84cd6, StatelessResetToken: 0x071baa52fedb187bc0009eeb8d1bd7b6} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 03f6547b, StatelessResetToken: 0x4226ec0994934a7aa307432fe9425045} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 24010300, StatelessResetToken: 0x2eef0ea5c9cec05f2ddbf443066871bb} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7ccef92a, StatelessResetToken: 0xf56a6e1529c2bf018ec5d6d061f61732} 2025/04/30 08:48:57 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 325066bb, StatelessResetToken: 0x94f0c113c6e10a1632a1bccb91d180c8} 2025/04/30 08:48:57 Tracking 45 connection IDs and 5 reset tokens. 2025/04/30 08:48:57 server <- Reading packet 4 (96 bytes) for connection 8552dd79, Handshake 2025/04/30 08:48:57 server Long Header{Type: Handshake, DestConnectionID: 8552dd79, SrcConnectionID: 99b67cb9cde3322b3ee02b14991756eae33b170f, PacketNumber: 4, PacketNumberLen: 1, Length: 63, Version: v1} 2025/04/30 08:48:57 server Dropping Initial keys. 2025/04/30 08:48:57 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 102.888ms} 2025/04/30 08:48:57 server newly acked packets (1): [0] 2025/04/30 08:48:57 server updated RTT: 135.255545ms (σ: 67.627772ms) 2025/04/30 08:48:57 server Canceling loss detection timer. 2025/04/30 08:48:57 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:57 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:57 Retiring connection ID 5acdfd90d8bc686df4aeeda53f948f85 in 5s. 2025/04/30 08:48:57 server Dropping Handshake keys. 2025/04/30 08:48:57 server -> Sending packet 1 (271 bytes) for connection 5acdfd90d8bc686df4aeeda53f948f85, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:57 server Short Header{DestConnectionID: 99b67cb9cde3322b3ee02b14991756eae33b170f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:57 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:57 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:57 server -> &wire.NewTokenFrame{Token: 0x67dab5fdf2d0be761b980da874da73cab86cde985d1896b6b4cf210c09ab77fd34ddc61354f2bf9fd82eb7b8e2206cafb44ba9d7f05127e5af915d2f5e77355df9bf8252ec5be33a04a08133de45558854050fa6ed05} 2025/04/30 08:48:58 server <- Reading packet 5 (172 bytes) for connection 8552dd79, 1-RTT 2025/04/30 08:48:58 server Short Header{DestConnectionID: 8552dd79, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 257.048ms} 2025/04/30 08:48:58 server newly acked packets (1): [0] 2025/04/30 08:48:58 server updated RTT: 151.44ms (σ: 83.09ms) 2025/04/30 08:48:58 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a774fc2ded481d93f5b75bc2bdb959a84a67c713, StatelessResetToken: 0x804312a43d41086499e0c900bfb078e3} 2025/04/30 08:48:58 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 45ec43dcaa7e98d2207e7f8db63cc2662e12f99d, StatelessResetToken: 0x5c5b7b8fe304b4807c761e9aa7dd687b} 2025/04/30 08:48:58 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ec40759914e71d1b65dac044334a9ea3057c1cf8, StatelessResetToken: 0x3f57b351342d84203fe482f760eaa779} 2025/04/30 08:48:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:58 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:58 server <- Reading packet 6 (31 bytes) for connection 8552dd79, 1-RTT 2025/04/30 08:48:58 server Short Header{DestConnectionID: 8552dd79, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 257.216ms} 2025/04/30 08:48:58 server <- &wire.PingFrame{} 2025/04/30 08:48:58 server -> Sending packet 2 (46 bytes) for connection 5acdfd90d8bc686df4aeeda53f948f85, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:58 server Short Header{DestConnectionID: a774fc2ded481d93f5b75bc2bdb959a84a67c713, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 195.646µs} 2025/04/30 08:48:58 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:58 Received request: GET /yjvkfhjxfb 2025/04/30 08:48:58 server -> Sending packet 3 (1065 bytes) for connection 5acdfd90d8bc686df4aeeda53f948f85, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:58 server Short Header{DestConnectionID: a774fc2ded481d93f5b75bc2bdb959a84a67c713, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:58 Removing connection IDs [78673524 fd830365 a5d9e80d d2030b55 60e97726 17614665] for a closed connection after it has been retired. 2025/04/30 08:48:58 server <- Reading packet 7 (187 bytes) for connection 8552dd79, 1-RTT 2025/04/30 08:48:58 server Short Header{DestConnectionID: 8552dd79, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:58 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 200µs} 2025/04/30 08:48:58 server newly acked packets (1): [2] 2025/04/30 08:48:58 server updated RTT: 136.405ms (σ: 92.385ms) 2025/04/30 08:48:58 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:58 server lost packet 1 (time threshold) 2025/04/30 08:48:58 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 0ef0aa1837fb3526fa8dd3a4a13509d64ae3339d, StatelessResetToken: 0x2a1b682cd5cba896a31761812920a94f} 2025/04/30 08:48:58 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: a774fc2ded481d93f5b75bc2bdb959a84a67c713, StatelessResetToken: 0x804312a43d41086499e0c900bfb078e3} 2025/04/30 08:48:58 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 45ec43dcaa7e98d2207e7f8db63cc2662e12f99d, StatelessResetToken: 0x5c5b7b8fe304b4807c761e9aa7dd687b} 2025/04/30 08:48:58 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: ec40759914e71d1b65dac044334a9ea3057c1cf8, StatelessResetToken: 0x3f57b351342d84203fe482f760eaa779} 2025/04/30 08:48:58 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:48:58 server Ignoring all packets below 7. 2025/04/30 08:48:58 server -> Sending packet 4 (276 bytes) for connection 5acdfd90d8bc686df4aeeda53f948f85, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:58 server Short Header{DestConnectionID: a774fc2ded481d93f5b75bc2bdb959a84a67c713, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 194.785µs} 2025/04/30 08:48:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:58 server -> &wire.NewTokenFrame{Token: 0x67dab5fdf2d0be761b980da874da73cab86cde985d1896b6b4cf210c09ab77fd34ddc61354f2bf9fd82eb7b8e2206cafb44ba9d7f05127e5af915d2f5e77355df9bf8252ec5be33a04a08133de45558854050fa6ed05} 2025/04/30 08:48:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:58 server <- Reading packet 9 (32 bytes) for connection 8552dd79, 1-RTT 2025/04/30 08:48:58 server Short Header{DestConnectionID: 8552dd79, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:58 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/04/30 08:48:58 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:58 Replacing connection for connection IDs [8552dd79 03c84cd6 325066bb 03f6547b 7ccef92a 24010300] with a closed connection. 2025/04/30 08:48:58 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/04/30 08:48:58 server Connection 5acdfd90d8bc686df4aeeda53f948f85 closed. 2025/04/30 08:48:58 server <- Received Initial packet. 2025/04/30 08:48:58 Created qlog file: /logs/qlog/c88afdc1d0f19ad9934f5ab780a533c5.sqlog 2025/04/30 08:48:58 server Changing connection ID to 162e7b08. 2025/04/30 08:48:58 Adding connection IDs c88afdc1d0f19ad9934f5ab780a533c5 and 162e7b08 for a new connection. 2025/04/30 08:48:58 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:58 server <- Reading packet 0 (333 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, Initial 2025/04/30 08:48:58 server Long Header{Type: Initial, DestConnectionID: c88afdc1d0f19ad9934f5ab780a533c5, SrcConnectionID: 8cddba788f2ed8b3fa3ceba634f02ace02005586, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:58 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:58 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:58 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:58 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 8cddba788f2ed8b3fa3ceba634f02ace02005586, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:58 Adding connection ID f3f70555. 2025/04/30 08:48:58 Adding connection ID 588c752e. 2025/04/30 08:48:58 Adding connection ID eec8f10a. 2025/04/30 08:48:58 Adding connection ID fadf54a9. 2025/04/30 08:48:58 Adding connection ID a2154a88. 2025/04/30 08:48:58 server coalesced packet has different destination connection ID: 00000000, expected c88afdc1d0f19ad9934f5ab780a533c5 2025/04/30 08:48:58 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5 2025/04/30 08:48:58 server Long Header{Type: Initial, DestConnectionID: 8cddba788f2ed8b3fa3ceba634f02ace02005586, SrcConnectionID: 162e7b08, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 323, Version: v1} 2025/04/30 08:48:58 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:58 server Long Header{Type: Handshake, DestConnectionID: 8cddba788f2ed8b3fa3ceba634f02ace02005586, SrcConnectionID: 162e7b08, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 08:48:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 08:48:58 server Short Header{DestConnectionID: 8cddba788f2ed8b3fa3ceba634f02ace02005586, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f3f70555, StatelessResetToken: 0x350397f2b13f03cb83246418f619570b} 2025/04/30 08:48:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: a2154a88, StatelessResetToken: 0xd56672447689dbbe83e7f4fec0cbe5ca} 2025/04/30 08:48:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fadf54a9, StatelessResetToken: 0xadd5fbcd9859823599a1937d579f4878} 2025/04/30 08:48:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: eec8f10a, StatelessResetToken: 0xb18c8d16368f1ea1510d10e0fe8e7fb8} 2025/04/30 08:48:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 588c752e, StatelessResetToken: 0x1bc30b9e2e7d5dcb0d819390b0bc389f} 2025/04/30 08:48:58 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/04/30 08:48:58 server <- Reading packet 1 (57 bytes) for connection 162e7b08, Initial 2025/04/30 08:48:58 server Long Header{Type: Initial, DestConnectionID: 162e7b08, SrcConnectionID: 8cddba788f2ed8b3fa3ceba634f02ace02005586, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 23, Version: v1} 2025/04/30 08:48:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 544µs} 2025/04/30 08:48:58 server newly acked packets (1): [0] 2025/04/30 08:48:58 server updated RTT: 33.572694ms (σ: 16.786347ms) 2025/04/30 08:48:58 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/04/30 08:48:58 server <- Reading packet 2 (95 bytes) for connection 162e7b08, Handshake 2025/04/30 08:48:58 server Long Header{Type: Handshake, DestConnectionID: 162e7b08, SrcConnectionID: 8cddba788f2ed8b3fa3ceba634f02ace02005586, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 08:48:58 server Dropping Initial keys. 2025/04/30 08:48:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 392µs} 2025/04/30 08:48:58 server newly acked packets (1): [0] 2025/04/30 08:48:58 server updated RTT: 33.572ms (σ: 12.589ms) 2025/04/30 08:48:58 server Canceling loss detection timer. 2025/04/30 08:48:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:48:58 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:58 Retiring connection ID c88afdc1d0f19ad9934f5ab780a533c5 in 5s. 2025/04/30 08:48:58 server Dropping Handshake keys. 2025/04/30 08:48:58 server <- Reading packet 3 (1198 bytes) for connection 162e7b08, 1-RTT 2025/04/30 08:48:58 server Short Header{DestConnectionID: 162e7b08, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:58 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 184µs} 2025/04/30 08:48:58 server newly acked packets (1): [0] 2025/04/30 08:48:58 server updated RTT: 33.572ms (σ: 9.441ms) 2025/04/30 08:48:58 server Canceling loss detection timer. 2025/04/30 08:48:58 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, StatelessResetToken: 0xe251da82994788e6f8b19144e64da015} 2025/04/30 08:48:58 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f266612244b57b07a8c7e4b0047851ecd95e21fb, StatelessResetToken: 0xfb7ab88d51b3a61b22df54dd5ba125de} 2025/04/30 08:48:58 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 619790db18e97bc66e1e161264a2265dc2176202, StatelessResetToken: 0x1671a84466bc0a8fa17a08ffa45aac88} 2025/04/30 08:48:58 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:48:58 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:48:58 server -> Sending packet 1 (278 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:58 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 483.283µs} 2025/04/30 08:48:58 server -> &wire.NewTokenFrame{Token: 0xee0694e6ecb8aeaba3d54270568657e7cf1766b6b1ce5a1fc81976258c637d60d24c477e4d49d3b2794372077d79b90d03db2420b9766c598599631e38668e4d2eeff9795602f1a44071f441e18b14617bb78ec34e4b} 2025/04/30 08:48:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:58 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:58 Received request: GET /cdmsfffwhm 2025/04/30 08:48:58 server -> Sending packet 2 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:58 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:58 server -> Sending packet 4 (273 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:58 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.NewTokenFrame{Token: 0xee0694e6ecb8aeaba3d54270568657e7cf1766b6b1ce5a1fc81976258c637d60d24c477e4d49d3b2794372077d79b90d03db2420b9766c598599631e38668e4d2eeff9795602f1a44071f441e18b14617bb78ec34e4b} 2025/04/30 08:48:58 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:48:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:48:58 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:48:58 server Skipping packet number 3 2025/04/30 08:48:58 server -> Sending packet 5 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:48:58 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:58 server Dropping %!s(logging.PacketType=1) packet (96 bytes) because we already dropped the keys. 2025/04/30 08:48:58 server <- Reading packet 5 (69 bytes) for connection 162e7b08, 1-RTT 2025/04/30 08:48:58 server Short Header{DestConnectionID: 162e7b08, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:48:58 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 152µs} 2025/04/30 08:48:58 server newly acked packets (1): [4] 2025/04/30 08:48:58 server updated RTT: 33.285ms (σ: 7.653ms) 2025/04/30 08:48:58 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/04/30 08:48:58 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 770c419b8fd34ae6832891c4b60c1d4a9a11b37e, StatelessResetToken: 0x544123342fd406c17b8a9679a3b80f94} 2025/04/30 08:48:58 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:48:58 server -> Sending packet 6 (46 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:58 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 151.513µs} 2025/04/30 08:48:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:48:58 server -> Sending packet 8 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:58 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:58 server -> Sending packet 9 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:58 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:58 server -> Sending packet 10 (1315 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:58 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.PingFrame{} 2025/04/30 08:48:58 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:48:58 server -> Sending packet 12 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:58 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:58 server -> Sending packet 13 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:58 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:58 server <- Received Initial packet. 2025/04/30 08:48:58 Created qlog file: /logs/qlog/207c92aa293a76448c211ff8b1396195.sqlog 2025/04/30 08:48:58 server Changing connection ID to 1e107747. 2025/04/30 08:48:58 Adding connection IDs 207c92aa293a76448c211ff8b1396195 and 1e107747 for a new connection. 2025/04/30 08:48:58 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/04/30 08:48:58 server <- Reading packet 0 (333 bytes) for connection 207c92aa293a76448c211ff8b1396195, Initial 2025/04/30 08:48:58 server Long Header{Type: Initial, DestConnectionID: 207c92aa293a76448c211ff8b1396195, SrcConnectionID: 741083b7ebdc05a78f1dfa46da27b9e33630aecd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/04/30 08:48:58 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/04/30 08:48:58 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:58 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:58 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:48:58 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 741083b7ebdc05a78f1dfa46da27b9e33630aecd, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8} 2025/04/30 08:48:58 Adding connection ID 01a7c558. 2025/04/30 08:48:58 Adding connection ID eb205fe2. 2025/04/30 08:48:58 Adding connection ID cee0001a. 2025/04/30 08:48:58 Adding connection ID 83ccea3d. 2025/04/30 08:48:58 Adding connection ID e0c78f76. 2025/04/30 08:48:58 server coalesced packet has different destination connection ID: 00000000, expected 207c92aa293a76448c211ff8b1396195 2025/04/30 08:48:58 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 207c92aa293a76448c211ff8b1396195 2025/04/30 08:48:58 server Long Header{Type: Initial, DestConnectionID: 741083b7ebdc05a78f1dfa46da27b9e33630aecd, SrcConnectionID: 1e107747, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 325, Version: v1} 2025/04/30 08:48:58 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/04/30 08:48:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:58 server Long Header{Type: Handshake, DestConnectionID: 741083b7ebdc05a78f1dfa46da27b9e33630aecd, SrcConnectionID: 1e107747, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 08:48:58 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 08:48:58 server Short Header{DestConnectionID: 741083b7ebdc05a78f1dfa46da27b9e33630aecd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cee0001a, StatelessResetToken: 0x36115acc019380ddf16c765ceee5954d} 2025/04/30 08:48:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: eb205fe2, StatelessResetToken: 0xebba1bb43701a1fe6482f84c577497b6} 2025/04/30 08:48:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 01a7c558, StatelessResetToken: 0x896c2aa767ab9c25c23b04d76c4f7ea9} 2025/04/30 08:48:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: e0c78f76, StatelessResetToken: 0x08f88b303d03f218fec5f9783880027d} 2025/04/30 08:48:58 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 83ccea3d, StatelessResetToken: 0xfd288ead019532223cc1ad7a369e1490} 2025/04/30 08:48:59 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:48:59 server -> Sending packet 1 (1280 bytes) for connection 207c92aa293a76448c211ff8b1396195, Initial 2025/04/30 08:48:59 server Long Header{Type: Initial, DestConnectionID: 741083b7ebdc05a78f1dfa46da27b9e33630aecd, SrcConnectionID: 1e107747, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:59 server -> Sending packet 2 (1280 bytes) for connection 207c92aa293a76448c211ff8b1396195, Initial 2025/04/30 08:48:59 server Long Header{Type: Initial, DestConnectionID: 741083b7ebdc05a78f1dfa46da27b9e33630aecd, SrcConnectionID: 1e107747, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:59 server Canceling loss detection timer. 2025/04/30 08:48:59 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:48:59 server Parsed a coalesced packet. Part 1: 56 bytes. Remaining: 1144 bytes. 2025/04/30 08:48:59 server <- Reading packet 1 (56 bytes) for connection 1e107747, Initial 2025/04/30 08:48:59 server Long Header{Type: Initial, DestConnectionID: 1e107747, SrcConnectionID: 741083b7ebdc05a78f1dfa46da27b9e33630aecd, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:48:59 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 272µs} 2025/04/30 08:48:59 server coalesced packet has different destination connection ID: 00000000, expected 1e107747 2025/04/30 08:48:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 08:48:59 server -> Sending packet 15 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:59 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:59 server -> Sending packet 16 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:59 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:59 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:48:59 server -> Sending packet 1 (762 bytes) for connection 207c92aa293a76448c211ff8b1396195, Handshake 2025/04/30 08:48:59 server Long Header{Type: Handshake, DestConnectionID: 741083b7ebdc05a78f1dfa46da27b9e33630aecd, SrcConnectionID: 1e107747, PacketNumber: 1, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 08:48:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 08:48:59 server -> Sending packet 2 (762 bytes) for connection 207c92aa293a76448c211ff8b1396195, Handshake 2025/04/30 08:48:59 server Long Header{Type: Handshake, DestConnectionID: 741083b7ebdc05a78f1dfa46da27b9e33630aecd, SrcConnectionID: 1e107747, PacketNumber: 2, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 08:48:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 08:48:59 Removing connection ID 9edc74ced76af8d7fc50ff2cf739458a after it has been retired. 2025/04/30 08:48:59 Tracking 52 connection IDs and 6 reset tokens. 2025/04/30 08:48:59 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 08:48:59 server -> Sending packet 18 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:59 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:59 server -> Sending packet 19 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:48:59 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:48:59 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:48:59 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 08:48:59 server -> Sending packet 3 (1280 bytes) for connection 207c92aa293a76448c211ff8b1396195, Initial 2025/04/30 08:48:59 server Long Header{Type: Initial, DestConnectionID: 741083b7ebdc05a78f1dfa46da27b9e33630aecd, SrcConnectionID: 1e107747, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:59 server -> Sending packet 4 (1280 bytes) for connection 207c92aa293a76448c211ff8b1396195, Initial 2025/04/30 08:48:59 server Long Header{Type: Initial, DestConnectionID: 741083b7ebdc05a78f1dfa46da27b9e33630aecd, SrcConnectionID: 1e107747, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/04/30 08:48:59 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:48:59 server Canceling loss detection timer. 2025/04/30 08:48:59 server Amplification window limited. Received 2400 bytes, already sent out 7924 bytes 2025/04/30 08:49:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 08:49:00 server -> Sending packet 21 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:00 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:00 server -> Sending packet 22 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:00 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:00 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 08:49:00 server -> Sending packet 28 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:00 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:00 server -> Sending packet 29 (1065 bytes) for connection c2cb60c1848fb7e53b8d407c00d7c39d, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:00 server Short Header{DestConnectionID: 6b116678072b57eab0454c4ccd629634ddf9ecdb, PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:00 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:01 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 08:49:01 server -> Sending packet 21 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:01 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:01 server -> Sending packet 22 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:01 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:01 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:01 server Queueing packet (164 bytes) for later decryption 2025/04/30 08:49:01 server Queueing packet (26 bytes) for later decryption 2025/04/30 08:49:01 Tracking 52 connection IDs and 6 reset tokens. 2025/04/30 08:49:02 Removing connection ID 9d731ff360ee8d351d01e27c878d5675 after it has been retired. 2025/04/30 08:49:02 Removing connection ID 5acdfd90d8bc686df4aeeda53f948f85 after it has been retired. 2025/04/30 08:49:02 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:49:02 server -> Sending packet 6 (1280 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, 1-RTT (ECN: ECT(0)) 2025/04/30 08:49:02 server Short Header{DestConnectionID: a3d9ea28a4eb53852544f4f76e9741065ef2abe7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:02 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:49:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a11b73c9, StatelessResetToken: 0xb7d9c4f37947cc5f0e4fee0f14177167} 2025/04/30 08:49:02 server -> &wire.NewTokenFrame{Token: 0xacfd3e37168ec2ed733cb9b25dc8e21094960b1e77d0486c868f6b1a00bd6ad53c63dad1a1c510a0f6ae9549df227e89d1efc3459d8ffc7c46004d44fd5ff2b3ba6615ac99a32749c346bf87f0296c30b988feff85e1} 2025/04/30 08:49:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b457cddf, StatelessResetToken: 0x23a048ddc4842e54026e8a7537208b3e} 2025/04/30 08:49:02 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:49:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d798e476, StatelessResetToken: 0xfe5b92b60b9d81a67e0e0b84b5fa7af5} 2025/04/30 08:49:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1eb9f410, StatelessResetToken: 0xad128668a38c44ed26f677b175533d6f} 2025/04/30 08:49:02 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 43c764a4, StatelessResetToken: 0x3d57e201273a3305c4a27ae2916af74d} 2025/04/30 08:49:02 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:49:02 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 885, Offset + Data length: 885} 2025/04/30 08:49:02 server Skipping packet number 5 2025/04/30 08:49:02 server -> Sending packet 7 (182 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, 1-RTT (ECN: ECT(0)) 2025/04/30 08:49:02 server Short Header{DestConnectionID: a3d9ea28a4eb53852544f4f76e9741065ef2abe7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:02 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 885, Data length: 139, Offset + Data length: 1024} 2025/04/30 08:49:02 server -> Sending packet 8 (1315 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, 1-RTT (ECN: ECT(0)) 2025/04/30 08:49:02 server Short Header{DestConnectionID: a3d9ea28a4eb53852544f4f76e9741065ef2abe7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:02 server -> &wire.PingFrame{} 2025/04/30 08:49:03 Removing connection IDs [8552dd79 03c84cd6 325066bb 03f6547b 7ccef92a 24010300] for a closed connection after it has been retired. 2025/04/30 08:49:03 Removing connection ID c88afdc1d0f19ad9934f5ab780a533c5 after it has been retired. 2025/04/30 08:49:03 Tracking 43 connection IDs and 6 reset tokens. 2025/04/30 08:49:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 08:49:04 server -> Sending packet 24 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:04 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:04 server -> Sending packet 25 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:04 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:04 server Destroying connection: timeout: no recent network activity 2025/04/30 08:49:04 Removing connection ID 207c92aa293a76448c211ff8b1396195. 2025/04/30 08:49:04 Removing connection ID 83ccea3d. 2025/04/30 08:49:04 Removing connection ID e0c78f76. 2025/04/30 08:49:04 Removing connection ID 1e107747. 2025/04/30 08:49:04 Removing connection ID 01a7c558. 2025/04/30 08:49:04 Error accepting stream: timeout: no recent network activity 2025/04/30 08:49:04 Removing connection ID eb205fe2. 2025/04/30 08:49:04 Removing connection ID cee0001a. 2025/04/30 08:49:04 server Connection 207c92aa293a76448c211ff8b1396195 closed. 2025/04/30 08:49:04 server Dropping long header packet of type Handshake (98 bytes) 2025/04/30 08:49:04 server Dropping long header packet of type Handshake (59 bytes) 2025/04/30 08:49:04 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 08:49:04 server -> Sending packet 14 (1280 bytes) for connection beede84d3bddba44b4303cd9e3666562, 1-RTT (ECN: ECT(0)) 2025/04/30 08:49:04 server Short Header{DestConnectionID: 9e34937938d9f16ec66be92f82c0627aabaed634, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:04 server -> &wire.NewTokenFrame{Token: 0x6f0b4e01b8f509fcddfdfc4d4851ab3a7c5b36bf6f74e76602882a3976a13ef60a0cb75e7ceeab622950710b9c0163bac50750c82fc7befa4bb6ca728d39ec7e0802176f96c6d2952fbf8e83d6cb47f614461cb6a63a} 2025/04/30 08:49:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d3982a83, StatelessResetToken: 0xbf7286d9596409f32da0d55f7af2c72f} 2025/04/30 08:49:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f34ee2d5, StatelessResetToken: 0x5c37775da0fc77ca2c4ef5beb5cd741d} 2025/04/30 08:49:04 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:49:04 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:49:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b2452728, StatelessResetToken: 0xece782ea34b51719e8e4646e026a1f3a} 2025/04/30 08:49:04 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:49:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b995d6a7, StatelessResetToken: 0x22d884138b00f232aa8605a974cbe243} 2025/04/30 08:49:04 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 0852869e, StatelessResetToken: 0xbe26ca480bab194116a87c6c71055c8e} 2025/04/30 08:49:04 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 885, Offset + Data length: 885} 2025/04/30 08:49:04 server Skipping packet number 13 2025/04/30 08:49:04 server -> Sending packet 15 (182 bytes) for connection beede84d3bddba44b4303cd9e3666562, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:04 server Short Header{DestConnectionID: 9e34937938d9f16ec66be92f82c0627aabaed634, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:04 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 885, Data length: 139, Offset + Data length: 1024} 2025/04/30 08:49:05 server Destroying connection: timeout: no recent network activity 2025/04/30 08:49:05 Removing connection ID b2452728. 2025/04/30 08:49:05 Removing connection ID d3982a83. 2025/04/30 08:49:05 Removing connection ID b995d6a7. 2025/04/30 08:49:05 Removing connection ID 0852869e. 2025/04/30 08:49:05 Removing connection ID c4f18f5a. 2025/04/30 08:49:05 Error accepting stream: timeout: no recent network activity 2025/04/30 08:49:05 Removing connection ID f34ee2d5. 2025/04/30 08:49:05 server Connection beede84d3bddba44b4303cd9e3666562 closed. 2025/04/30 08:49:05 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 08:49:05 server -> Sending packet 24 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:05 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:05 server -> Sending packet 25 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:05 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:05 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:05 Tracking 30 connection IDs and 5 reset tokens. 2025/04/30 08:49:07 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 08:49:07 server -> Sending packet 27 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:07 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:07 server -> Sending packet 28 (1065 bytes) for connection b6b684e6e594fb71393c2125571fb866, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:07 server Short Header{DestConnectionID: b54749759e294e4ffc5be0bba07cd22191adfc78, PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:07 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:07 server Destroying connection: timeout: no recent network activity 2025/04/30 08:49:07 Removing connection ID cefeb73b. 2025/04/30 08:49:07 Removing connection ID c5a9dbeb. 2025/04/30 08:49:07 Removing connection ID caa8161c. 2025/04/30 08:49:07 Removing connection ID a03b1df9. 2025/04/30 08:49:07 Removing connection ID 702014e8. 2025/04/30 08:49:07 Removing connection ID b2f3e229. 2025/04/30 08:49:07 Error accepting stream: timeout: no recent network activity 2025/04/30 08:49:07 server Connection c2cb60c1848fb7e53b8d407c00d7c39d closed. 2025/04/30 08:49:07 Tracking 24 connection IDs and 4 reset tokens. 2025/04/30 08:49:09 Tracking 24 connection IDs and 4 reset tokens. 2025/04/30 08:49:09 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 08:49:09 server -> Sending packet 27 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:09 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:09 server -> Sending packet 28 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:09 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:09 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:11 Tracking 24 connection IDs and 4 reset tokens. 2025/04/30 08:49:13 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 08:49:13 server -> Sending packet 10 (1280 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, 1-RTT (ECN: ECT(0)) 2025/04/30 08:49:13 server Short Header{DestConnectionID: a3d9ea28a4eb53852544f4f76e9741065ef2abe7, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b457cddf, StatelessResetToken: 0x23a048ddc4842e54026e8a7537208b3e} 2025/04/30 08:49:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d798e476, StatelessResetToken: 0xfe5b92b60b9d81a67e0e0b84b5fa7af5} 2025/04/30 08:49:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 43c764a4, StatelessResetToken: 0x3d57e201273a3305c4a27ae2916af74d} 2025/04/30 08:49:13 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:49:13 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:49:13 server -> &wire.NewTokenFrame{Token: 0xacfd3e37168ec2ed733cb9b25dc8e21094960b1e77d0486c868f6b1a00bd6ad53c63dad1a1c510a0f6ae9549df227e89d1efc3459d8ffc7c46004d44fd5ff2b3ba6615ac99a32749c346bf87f0296c30b988feff85e1} 2025/04/30 08:49:13 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:49:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1eb9f410, StatelessResetToken: 0xad128668a38c44ed26f677b175533d6f} 2025/04/30 08:49:13 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a11b73c9, StatelessResetToken: 0xb7d9c4f37947cc5f0e4fee0f14177167} 2025/04/30 08:49:13 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 885, Offset + Data length: 885} 2025/04/30 08:49:13 server Skipping packet number 9 2025/04/30 08:49:13 server -> Sending packet 11 (182 bytes) for connection 9d731ff360ee8d351d01e27c878d5675, 1-RTT (ECN: ECT(0)) 2025/04/30 08:49:13 server Short Header{DestConnectionID: a3d9ea28a4eb53852544f4f76e9741065ef2abe7, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:13 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 885, Data length: 139, Offset + Data length: 1024} 2025/04/30 08:49:13 Tracking 24 connection IDs and 4 reset tokens. 2025/04/30 08:49:14 server Destroying connection: timeout: no recent network activity 2025/04/30 08:49:14 Removing connection ID 613f437e. 2025/04/30 08:49:14 Error accepting stream: timeout: no recent network activity 2025/04/30 08:49:14 Removing connection ID c7e3a517. 2025/04/30 08:49:14 Removing connection ID ec355123. 2025/04/30 08:49:14 Removing connection ID 019edced. 2025/04/30 08:49:14 Removing connection ID 81b0e20d. 2025/04/30 08:49:14 Removing connection ID 11ab7504. 2025/04/30 08:49:14 server Connection b6b684e6e594fb71393c2125571fb866 closed. 2025/04/30 08:49:15 Tracking 18 connection IDs and 3 reset tokens. 2025/04/30 08:49:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 08:49:17 server -> Sending packet 27 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:17 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 27, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:17 server -> Sending packet 28 (1065 bytes) for connection 9edc74ced76af8d7fc50ff2cf739458a, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:17 server Short Header{DestConnectionID: e79dba5a337d6531edbe7d1d05dfaaebf57eb447, PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:17 Tracking 18 connection IDs and 3 reset tokens. 2025/04/30 08:49:19 Tracking 18 connection IDs and 3 reset tokens. 2025/04/30 08:49:20 server Dropping long header packet of type Handshake (98 bytes) 2025/04/30 08:49:20 server Dropping long header packet of type Handshake (59 bytes) 2025/04/30 08:49:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 8 2025/04/30 08:49:21 server -> Sending packet 30 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:21 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 30, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:21 server -> Sending packet 31 (1065 bytes) for connection c88afdc1d0f19ad9934f5ab780a533c5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:49:21 server Short Header{DestConnectionID: 7a345d02ef1264ed11d0d81553d774cc6477c6a4, PacketNumber: 31, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:49:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:49:21 Tracking 18 connection IDs and 3 reset tokens. 2025/04/30 08:49:23 Tracking 18 connection IDs and 3 reset tokens. 2025/04/30 08:49:24 server Destroying connection: timeout: no recent network activity 2025/04/30 08:49:24 Removing connection ID 2be41f76. 2025/04/30 08:49:24 Removing connection ID a2e13f74. 2025/04/30 08:49:24 Removing connection ID 5db2c25f. 2025/04/30 08:49:24 Removing connection ID 5316f956. 2025/04/30 08:49:24 Removing connection ID 032698c8. 2025/04/30 08:49:24 Removing connection ID e8528232. 2025/04/30 08:49:24 Error accepting stream: timeout: no recent network activity 2025/04/30 08:49:24 server Connection 9edc74ced76af8d7fc50ff2cf739458a closed. 2025/04/30 08:49:25 Tracking 12 connection IDs and 2 reset tokens. 2025/04/30 08:49:27 server Destroying connection: timeout: no recent network activity 2025/04/30 08:49:27 Removing connection ID 1eb9f410. 2025/04/30 08:49:27 Removing connection ID d798e476. 2025/04/30 08:49:27 Error accepting stream: timeout: no recent network activity 2025/04/30 08:49:27 Removing connection ID 43c764a4. 2025/04/30 08:49:27 Removing connection ID 3f8eea06. 2025/04/30 08:49:27 Removing connection ID a11b73c9. 2025/04/30 08:49:27 Removing connection ID b457cddf. 2025/04/30 08:49:27 server Connection 9d731ff360ee8d351d01e27c878d5675 closed. 2025/04/30 08:49:27 Tracking 6 connection IDs and 1 reset tokens. 2025/04/30 08:49:28 server Destroying connection: timeout: no recent network activity 2025/04/30 08:49:28 Removing connection ID 162e7b08. 2025/04/30 08:49:28 Removing connection ID f3f70555. 2025/04/30 08:49:28 Removing connection ID 588c752e. 2025/04/30 08:49:28 Removing connection ID eec8f10a. 2025/04/30 08:49:28 Removing connection ID fadf54a9. 2025/04/30 08:49:28 Removing connection ID a2154a88. 2025/04/30 08:49:28 Error accepting stream: timeout: no recent network activity 2025/04/30 08:49:28 server Connection c88afdc1d0f19ad9934f5ab780a533c5 closed. 2025/04/30 08:49:29 Tracking 0 connection IDs and 0 reset tokens.