2025/09/12 02:03:48 Increased receive buffer size to 14336 kiB 2025/09/12 02:03:48 Increased send buffer size to 14336 kiB 2025/09/12 02:03:48 Setting DF for IPv4 and IPv6. 2025/09/12 02:03:48 Activating reading of ECN bits for IPv4 and IPv6. 2025/09/12 02:03:48 Activating reading of packet info for IPv4 and IPv6. 2025/09/12 02:03:48 server Listening for udp connections on [::]:443 2025/09/12 02:03:48 server Client offered version 0x57414954, sending Version Negotiation 2025/09/12 02:03:49 server <- Received Initial packet. 2025/09/12 02:03:49 Created qlog file: /logs/qlog/7cee2dc227c70df25c1fb28062a289db.sqlog 2025/09/12 02:03:49 server Changing connection ID to 58542814. 2025/09/12 02:03:49 Adding connection IDs 7cee2dc227c70df25c1fb28062a289db and 58542814 for a new connection. 2025/09/12 02:03:49 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/09/12 02:03:49 server <- Reading packet 0 (333 bytes) for connection 7cee2dc227c70df25c1fb28062a289db, Initial 2025/09/12 02:03:49 server Long Header{Type: Initial, DestConnectionID: 7cee2dc227c70df25c1fb28062a289db, SrcConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 287, Version: v1} 2025/09/12 02:03:49 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/09/12 02:03:49 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:03:49 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:03:49 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:03:49 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, InitialMaxStreamDataBidiLocal: 1000000, InitialMaxStreamDataBidiRemote: 1000000, InitialMaxStreamDataUni: 1000000, InitialMaxData: 10000000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 8, EnableResetStreamAt: false} 2025/09/12 02:03:49 Adding connection ID 63e99d91. 2025/09/12 02:03:49 Adding connection ID 848ffbde. 2025/09/12 02:03:49 Adding connection ID 852eaedb. 2025/09/12 02:03:49 Adding connection ID 729a5e2e. 2025/09/12 02:03:49 Adding connection ID 28cc741b. 2025/09/12 02:03:49 server coalesced packet has different destination connection ID: 00000000, expected 7cee2dc227c70df25c1fb28062a289db 2025/09/12 02:03:49 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7cee2dc227c70df25c1fb28062a289db 2025/09/12 02:03:49 server Long Header{Type: Initial, DestConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, SrcConnectionID: 58542814, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 310, Version: v1} 2025/09/12 02:03:49 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:03:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 02:03:49 server Long Header{Type: Handshake, DestConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, SrcConnectionID: 58542814, PacketNumber: 0, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:03:49 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:03:49 server Short Header{DestConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:03:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 63e99d91, StatelessResetToken: 0x1a9fdb4984b994f02ef61046076e6e1a} 2025/09/12 02:03:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 852eaedb, StatelessResetToken: 0x5b30e28d8e222aef7eed0df41be03cce} 2025/09/12 02:03:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 729a5e2e, StatelessResetToken: 0x34450cae6cc17423350b6a362b73e48f} 2025/09/12 02:03:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 848ffbde, StatelessResetToken: 0xf2cef8b565755b3664b32f0c0dff2a1f} 2025/09/12 02:03:49 server -> &wire.NewConnectionIDFrame{SequenceNumber: 5, RetirePriorTo: 0, ConnectionID: 28cc741b, StatelessResetToken: 0x0a24c1f0f3702537fe57a02b51b8dfb3} 2025/09/12 02:03:50 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/09/12 02:03:50 server -> Sending packet 1 (1280 bytes) for connection 7cee2dc227c70df25c1fb28062a289db, Initial 2025/09/12 02:03:50 server Long Header{Type: Initial, DestConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, SrcConnectionID: 58542814, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/09/12 02:03:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 02:03:50 server -> Sending packet 2 (1280 bytes) for connection 7cee2dc227c70df25c1fb28062a289db, Initial 2025/09/12 02:03:50 server Long Header{Type: Initial, DestConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, SrcConnectionID: 58542814, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/09/12 02:03:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 02:03:50 server Canceling loss detection timer. 2025/09/12 02:03:50 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/09/12 02:03:50 server Parsed a coalesced packet. Part 1: 333 bytes. Remaining: 867 bytes. 2025/09/12 02:03:50 server <- Reading packet 1 (333 bytes) for connection 7cee2dc227c70df25c1fb28062a289db, Initial 2025/09/12 02:03:50 server Long Header{Type: Initial, DestConnectionID: 7cee2dc227c70df25c1fb28062a289db, SrcConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 287, Version: v1} 2025/09/12 02:03:50 server <- &wire.CryptoFrame{Offset: 0, Data length: 266, Offset + Data length: 266} 2025/09/12 02:03:50 server coalesced packet has different destination connection ID: 00000000, expected 7cee2dc227c70df25c1fb28062a289db 2025/09/12 02:03:50 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/09/12 02:03:50 server -> Sending packet 1 (777 bytes) for connection 7cee2dc227c70df25c1fb28062a289db, Handshake 2025/09/12 02:03:50 server Long Header{Type: Handshake, DestConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, SrcConnectionID: 58542814, PacketNumber: 1, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:03:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:03:50 server -> Sending packet 2 (777 bytes) for connection 7cee2dc227c70df25c1fb28062a289db, Handshake 2025/09/12 02:03:50 server Long Header{Type: Handshake, DestConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, SrcConnectionID: 58542814, PacketNumber: 2, PacketNumberLen: 2, Length: 744, Version: v1} 2025/09/12 02:03:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 722, Offset + Data length: 722} 2025/09/12 02:03:50 server -> Sending packet 3 (57 bytes) for connection 7cee2dc227c70df25c1fb28062a289db, Initial 2025/09/12 02:03:50 server Long Header{Type: Initial, DestConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, SrcConnectionID: 58542814, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 23, Version: v1} 2025/09/12 02:03:50 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s} 2025/09/12 02:03:50 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/09/12 02:03:50 server -> Sending packet 4 (1280 bytes) for connection 7cee2dc227c70df25c1fb28062a289db, Initial 2025/09/12 02:03:50 server Long Header{Type: Initial, DestConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, SrcConnectionID: 58542814, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/09/12 02:03:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 02:03:50 server -> Sending packet 5 (1280 bytes) for connection 7cee2dc227c70df25c1fb28062a289db, Initial 2025/09/12 02:03:50 server Long Header{Type: Initial, DestConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, SrcConnectionID: 58542814, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1246, Version: v1} 2025/09/12 02:03:50 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/09/12 02:03:50 server Canceling loss detection timer. 2025/09/12 02:03:50 server Amplification window limited. Received 2400 bytes, already sent out 8011 bytes 2025/09/12 02:03:51 server Parsed a coalesced packet. Part 1: 57 bytes. Remaining: 1293 bytes. 2025/09/12 02:03:51 server <- Reading packet 2 (57 bytes) for connection 58542814, Initial 2025/09/12 02:03:51 server Long Header{Type: Initial, DestConnectionID: 58542814, SrcConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 23, Version: v1} 2025/09/12 02:03:51 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 688µs} 2025/09/12 02:03:51 server Parsed a coalesced packet. Part 2: 95 bytes. Remaining: 1198 bytes. 2025/09/12 02:03:51 server <- Reading packet 3 (95 bytes) for connection 58542814, Handshake 2025/09/12 02:03:51 server Long Header{Type: Handshake, DestConnectionID: 58542814, SrcConnectionID: 2f1a67f420c07bc55b9f66865d6ad5fd0341da42, PacketNumber: 3, PacketNumberLen: 1, Length: 62, Version: v1} 2025/09/12 02:03:51 server Dropping Initial keys. 2025/09/12 02:03:51 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 480µs} 2025/09/12 02:03:51 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/09/12 02:03:51 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/09/12 02:03:51 server Dropping Handshake keys. 2025/09/12 02:03:51 server <- Reading packet 4 (1198 bytes) for connection 58542814, 1-RTT 2025/09/12 02:03:51 server Short Header{DestConnectionID: 58542814, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:03:51 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 224µs} 2025/09/12 02:03:51 server newly acked packets (1): [0] 2025/09/12 02:03:51 server updated RTT: 1.503795785s (σ: 751.897892ms) 2025/09/12 02:03:51 server Canceling loss detection timer. 2025/09/12 02:03:51 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 52f15bfff6c07bda955f718957231b1ec712fa40, StatelessResetToken: 0xe2947ff43584f3d5d50bced5b72a0b50} 2025/09/12 02:03:51 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4fd7fc0c7de9d0c02e4b0e16de8d326b9f75dca2, StatelessResetToken: 0x18411179c7429e78bc4c3d2835b12dbd} 2025/09/12 02:03:51 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: aa36014e34955fb37a3d4ea2347bcfc3b47de971, StatelessResetToken: 0x267acbc152f348129cf0c8428ac89e1f} 2025/09/12 02:03:51 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/09/12 02:03:51 server Queueing ACK because the first packet should be acknowledged. 2025/09/12 02:03:51 server -> Sending packet 1 (313 bytes) for connection 7cee2dc227c70df25c1fb28062a289db, 1-RTT (ECN: ECT(0)) 2025/09/12 02:03:51 server Short Header{DestConnectionID: 52f15bfff6c07bda955f718957231b1ec712fa40, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:03:51 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 362.88µs} 2025/09/12 02:03:51 server -> &wire.NewTokenFrame{Token: 0x48bc11a6d72f31a9cb6f67ae75ebe8b63e3bcd23c38b79544e9c3618c800e8bf52ce214479b33ee71f4e05ac4ef3c7ee7ff4409743e448a7dcb4dac73da2a02aac0c572e3b2239d22b27587fca8ac674caf0f905a1dd349022} 2025/09/12 02:03:51 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/09/12 02:03:51 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/09/12 02:03:51 server -> &wire.HandshakeDoneFrame{} 2025/09/12 02:03:51 Received request: GET /qnwobndyve 2025/09/12 02:03:51 server -> Sending packet 2 (1065 bytes) for connection 7cee2dc227c70df25c1fb28062a289db, 1-RTT (ECN: ECT(0)) 2025/09/12 02:03:51 server Short Header{DestConnectionID: 52f15bfff6c07bda955f718957231b1ec712fa40, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:03:51 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/09/12 02:03:52 Removing connection ID 7cee2dc227c70df25c1fb28062a289db. 2025/09/12 02:03:52 server Dropping %!s(logging.PacketType=1) packet (55 bytes) because we already dropped the keys. 2025/09/12 02:03:52 server Dropping %!s(logging.PacketType=1) packet (55 bytes) because we already dropped the keys. 2025/09/12 02:03:52 server <- Reading packet 7 (67 bytes) for connection 58542814, 1-RTT 2025/09/12 02:03:52 server Short Header{DestConnectionID: 58542814, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:03:52 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 184µs} 2025/09/12 02:03:52 server newly acked packets (1): [1] 2025/09/12 02:03:52 server updated RTT: 1.503493s (σ: 564.526ms) 2025/09/12 02:03:52 server Disabling ECN. ECN-marked packet acknowledged, but no ECN counts on ACK frame. 2025/09/12 02:03:52 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 1, ConnectionID: 88bf41eeda8963d33615b72355f4bfe2f563457b, StatelessResetToken: 0xedff0bad887b2d1392dfd80407e388f9} 2025/09/12 02:03:52 server Queuing ACK because there's a new missing packet to report. 2025/09/12 02:03:52 server Ignoring all packets below 5. 2025/09/12 02:03:52 server -> Sending packet 3 (44 bytes) for connection 7cee2dc227c70df25c1fb28062a289db, 1-RTT (ECN: Not-ECT) 2025/09/12 02:03:52 server Short Header{DestConnectionID: 52f15bfff6c07bda955f718957231b1ec712fa40, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/09/12 02:03:52 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 154.981µs} 2025/09/12 02:03:52 server <- Reading packet 8 (32 bytes) for connection 58542814, 1-RTT 2025/09/12 02:03:52 server Short Header{DestConnectionID: 58542814, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/09/12 02:03:52 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:"kthxbye"} 2025/09/12 02:03:52 server Closing connection with error: Application error 0x0 (remote): kthxbye 2025/09/12 02:03:52 Replacing connection for connection IDs [28cc741b 58542814 63e99d91 848ffbde 852eaedb 729a5e2e] with a closed connection. 2025/09/12 02:03:52 Error accepting stream: Application error 0x0 (remote): kthxbye 2025/09/12 02:03:52 server Connection 7cee2dc227c70df25c1fb28062a289db closed. 2025/09/12 02:04:04 Removing connection IDs [28cc741b 58542814 63e99d91 848ffbde 852eaedb 729a5e2e] for a closed connection after it has been retired.