2025/04/30 08:47:13 Increased receive buffer size to 14336 kiB 2025/04/30 08:47:13 Increased send buffer size to 14336 kiB 2025/04/30 08:47:13 Setting DF for IPv4 and IPv6. 2025/04/30 08:47:13 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 08:47:13 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 08:47:13 server Listening for udp connections on [::]:443 2025/04/30 08:47:14 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 08:47:14 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 08:47:14 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 08:47:15 Tracking 0 connection IDs and 0 reset tokens. 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f.sqlog 2025/04/30 08:47:17 server Changing connection ID to f48129df. 2025/04/30 08:47:17 Adding connection IDs bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f and f48129df for a new connection. 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/736fb346ea9580e7163d4c4855d6801ff24cb272.sqlog 2025/04/30 08:47:17 server Changing connection ID to 175ada83. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f, SrcConnectionID: 40e6e6271f83b473, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 Adding connection IDs 736fb346ea9580e7163d4c4855d6801ff24cb272 and 175ada83 for a new connection. 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/99bc43191affa976f1141ec53dff877ac901264a.sqlog 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection 736fb346ea9580e7163d4c4855d6801ff24cb272, Initial 2025/04/30 08:47:17 server Changing connection ID to 020b527c. 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 736fb346ea9580e7163d4c4855d6801ff24cb272, SrcConnectionID: a743561c48232023, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 Adding connection IDs 99bc43191affa976f1141ec53dff877ac901264a and 020b527c for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection 99bc43191affa976f1141ec53dff877ac901264a, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 99bc43191affa976f1141ec53dff877ac901264a, SrcConnectionID: 3d88d2d218b52e3f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 Created qlog file: /logs/qlog/378814dfd105ad8ca1cca2afc939c0f1883bbe5b.sqlog 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Changing connection ID to b9077bb5. 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 Adding connection IDs 378814dfd105ad8ca1cca2afc939c0f1883bbe5b and b9077bb5 for a new connection. 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 40e6e6271f83b473, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID d8220fba. 2025/04/30 08:47:17 Adding connection ID 27b467f6. 2025/04/30 08:47:17 Adding connection ID d313d84c. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection 378814dfd105ad8ca1cca2afc939c0f1883bbe5b, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 378814dfd105ad8ca1cca2afc939c0f1883bbe5b, SrcConnectionID: 8cbd7efac589fd4a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 Adding connection ID 61d2de55. 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 3d88d2d218b52e3f, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID cfe9e6b3. 2025/04/30 08:47:17 Adding connection ID 6e4f42df. 2025/04/30 08:47:17 Adding connection ID 93dc0457. 2025/04/30 08:47:17 Adding connection ID 5f20abd7. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 40e6e6271f83b473, SrcConnectionID: f48129df, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 374, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 99bc43191affa976f1141ec53dff877ac901264a 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 3d88d2d218b52e3f, SrcConnectionID: 020b527c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 371, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: 3d88d2d218b52e3f, SrcConnectionID: 020b527c, PacketNumber: 0, PacketNumberLen: 2, Length: 743, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 08:47:17 server Short Header{DestConnectionID: 3d88d2d218b52e3f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 93dc0457, StatelessResetToken: 0xba32a478f35efba71b42ef49f7170b0b} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6e4f42df, StatelessResetToken: 0x65862fadc7ec90b2842c0aaf6f3ea04d} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cfe9e6b3, StatelessResetToken: 0xf75809b085c702e35bd40923b96b61ce} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5f20abd7, StatelessResetToken: 0xc42f60ef2d823a097dd9517624af17dc} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: 40e6e6271f83b473, SrcConnectionID: f48129df, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:47:17 server Short Header{DestConnectionID: 40e6e6271f83b473, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 61d2de55, StatelessResetToken: 0x094e4470adbfe823ab4c7c6cc4276f99} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8220fba, StatelessResetToken: 0x897ca36101f5c6f638dde84de9a83faa} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d313d84c, StatelessResetToken: 0x6d218b1a2c76ae6870c5d7c2e284a300} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 27b467f6, StatelessResetToken: 0x0ffbf9537657b458577af6064d67af43} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 8cbd7efac589fd4a, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID 9ce6c9c5. 2025/04/30 08:47:17 Adding connection ID 67f78247. 2025/04/30 08:47:17 Adding connection ID a650d647. 2025/04/30 08:47:17 Adding connection ID e64181a7. 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 378814dfd105ad8ca1cca2afc939c0f1883bbe5b 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 8cbd7efac589fd4a, SrcConnectionID: b9077bb5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 373, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a743561c48232023, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID 85c49817. 2025/04/30 08:47:17 Adding connection ID deb262ba. 2025/04/30 08:47:17 Adding connection ID 17417ecd. 2025/04/30 08:47:17 Adding connection ID 43b219b4. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 736fb346ea9580e7163d4c4855d6801ff24cb272 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: a743561c48232023, SrcConnectionID: 175ada83, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 368, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: a743561c48232023, SrcConnectionID: 175ada83, PacketNumber: 0, PacketNumberLen: 2, Length: 746, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 08:47:17 server Short Header{DestConnectionID: a743561c48232023, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: 8cbd7efac589fd4a, SrcConnectionID: b9077bb5, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 08:47:17 server Short Header{DestConnectionID: 8cbd7efac589fd4a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 17417ecd, StatelessResetToken: 0x108267ef0e4f943930ee2a1f51f2eb35} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 67f78247, StatelessResetToken: 0x8bf24d691f543f41d0342d6f7fc32f71} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 43b219b4, StatelessResetToken: 0xf901e79a03275ec1c56e6f70316e3e11} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 85c49817, StatelessResetToken: 0x86e0a3ee76a8a0d3259b500bd94c18b9} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9ce6c9c5, StatelessResetToken: 0x8118355324666d4f1ca72de8db8272e5} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: deb262ba, StatelessResetToken: 0xdfc139c69d5c1919bc1f04efd3f68ac2} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a650d647, StatelessResetToken: 0x0978366c5414b45264532c29a88aca6e} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e64181a7, StatelessResetToken: 0x6f4d8ea2004d450523954c928a02d342} 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5.sqlog 2025/04/30 08:47:17 server Changing connection ID to e920562f. 2025/04/30 08:47:17 Adding connection IDs 30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5 and e920562f for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection 30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5, SrcConnectionID: 2d92e842f5f04c00, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 2d92e842f5f04c00, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID a268f42d. 2025/04/30 08:47:17 Adding connection ID e0d12886. 2025/04/30 08:47:17 Adding connection ID cd4ff4bb. 2025/04/30 08:47:17 Adding connection ID c91c4fa8. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 2d92e842f5f04c00, SrcConnectionID: e920562f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 376, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: 2d92e842f5f04c00, SrcConnectionID: e920562f, PacketNumber: 0, PacketNumberLen: 2, Length: 738, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 08:47:17 server Short Header{DestConnectionID: 2d92e842f5f04c00, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a268f42d, StatelessResetToken: 0xd6e423442fb5f65b63990946bf5720a6} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cd4ff4bb, StatelessResetToken: 0x849e7ea7f193f2afd747bbbf125cdc34} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c91c4fa8, StatelessResetToken: 0x0bef301c947ba5477bccc78fa4f7ab50} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e0d12886, StatelessResetToken: 0xe5ed46129da252d55416af01335a3e08} 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/b7ae701d7781baebae33d7afb275340dd00b4630.sqlog 2025/04/30 08:47:17 server Changing connection ID to 61ba8ef8. 2025/04/30 08:47:17 Adding connection IDs b7ae701d7781baebae33d7afb275340dd00b4630 and 61ba8ef8 for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection b7ae701d7781baebae33d7afb275340dd00b4630, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: b7ae701d7781baebae33d7afb275340dd00b4630, SrcConnectionID: e0f10fdf3dee4bdf, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e0f10fdf3dee4bdf, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID 1875fe28. 2025/04/30 08:47:17 Adding connection ID 58b0c3c6. 2025/04/30 08:47:17 Adding connection ID 2b3ae016. 2025/04/30 08:47:17 Adding connection ID f55135ef. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b7ae701d7781baebae33d7afb275340dd00b4630 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: e0f10fdf3dee4bdf, SrcConnectionID: 61ba8ef8, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 379, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: e0f10fdf3dee4bdf, SrcConnectionID: 61ba8ef8, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 08:47:17 server Short Header{DestConnectionID: e0f10fdf3dee4bdf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1875fe28, StatelessResetToken: 0xd485172cf6f002fdb2719e0b1d0200e1} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2b3ae016, StatelessResetToken: 0xbb0916070995da818179faa386c2c56a} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 58b0c3c6, StatelessResetToken: 0x67bf76213abd5ff78308c27d7d5d0c6f} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f55135ef, StatelessResetToken: 0x82595acd137a02492f529e2bcfee54ae} 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/f5c02efb89d7759854e5c0ff1e192769804c3188.sqlog 2025/04/30 08:47:17 server Changing connection ID to 3464739d. 2025/04/30 08:47:17 Adding connection IDs f5c02efb89d7759854e5c0ff1e192769804c3188 and 3464739d for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection f5c02efb89d7759854e5c0ff1e192769804c3188, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: f5c02efb89d7759854e5c0ff1e192769804c3188, SrcConnectionID: 88c3a83989c90142, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 88c3a83989c90142, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID b1bae7aa. 2025/04/30 08:47:17 Adding connection ID cd9bd4d3. 2025/04/30 08:47:17 Adding connection ID 26854805. 2025/04/30 08:47:17 Adding connection ID 495c27c4. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f5c02efb89d7759854e5c0ff1e192769804c3188 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 88c3a83989c90142, SrcConnectionID: 3464739d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 372, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: 88c3a83989c90142, SrcConnectionID: 3464739d, PacketNumber: 0, PacketNumberLen: 2, Length: 742, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 08:47:17 server Short Header{DestConnectionID: 88c3a83989c90142, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 495c27c4, StatelessResetToken: 0xfac3029031d0da70e53eecd030485ae0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 26854805, StatelessResetToken: 0xd7cfc269a4a5a6b8261c22691463c3d9} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b1bae7aa, StatelessResetToken: 0x44c9ce512bb5f42fac2d658fb9b100e7} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cd9bd4d3, StatelessResetToken: 0xa7ba8048cd539d8e5ba82ef91592e161} 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/7607862b08b9bb2b8386c230b538fc65a46759b8.sqlog 2025/04/30 08:47:17 server Changing connection ID to 94a02ca1. 2025/04/30 08:47:17 Adding connection IDs 7607862b08b9bb2b8386c230b538fc65a46759b8 and 94a02ca1 for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection 7607862b08b9bb2b8386c230b538fc65a46759b8, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 7607862b08b9bb2b8386c230b538fc65a46759b8, SrcConnectionID: 92451ba2b1b9e5e0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 92451ba2b1b9e5e0, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID 6eb95b34. 2025/04/30 08:47:17 Adding connection ID 376cf7ea. 2025/04/30 08:47:17 Adding connection ID 792161f9. 2025/04/30 08:47:17 Adding connection ID e720c98b. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7607862b08b9bb2b8386c230b538fc65a46759b8 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 92451ba2b1b9e5e0, SrcConnectionID: 94a02ca1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 369, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: 92451ba2b1b9e5e0, SrcConnectionID: 94a02ca1, PacketNumber: 0, PacketNumberLen: 2, Length: 745, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 08:47:17 server Short Header{DestConnectionID: 92451ba2b1b9e5e0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 792161f9, StatelessResetToken: 0xed3a91ae3602c7a70de7c7cd427e39b6} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e720c98b, StatelessResetToken: 0xf351a68cc5ea5a4ac13ace43b4e35c39} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6eb95b34, StatelessResetToken: 0xf3709b1ee6d4706fde276b317febd785} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 376cf7ea, StatelessResetToken: 0x6e7318046711a9fe42af2abe9cf7428d} 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d.sqlog 2025/04/30 08:47:17 server Changing connection ID to e4ee6a80. 2025/04/30 08:47:17 Adding connection IDs b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d and e4ee6a80 for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, SrcConnectionID: 59684cf19b4bbfff, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 59684cf19b4bbfff, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID 76d94cef. 2025/04/30 08:47:17 Adding connection ID ce26594a. 2025/04/30 08:47:17 Adding connection ID d3fa2405. 2025/04/30 08:47:17 Adding connection ID 3fbeb11a. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 59684cf19b4bbfff, SrcConnectionID: e4ee6a80, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 378, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: 59684cf19b4bbfff, SrcConnectionID: e4ee6a80, PacketNumber: 0, PacketNumberLen: 2, Length: 736, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 714, Offset + Data length: 714} 2025/04/30 08:47:17 server Short Header{DestConnectionID: 59684cf19b4bbfff, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3fbeb11a, StatelessResetToken: 0x4759eb8de25e8cb1e4a0913f689dac2b} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ce26594a, StatelessResetToken: 0x77c037c4196204148bd05315aeda6e9a} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d3fa2405, StatelessResetToken: 0xade9fb187427c75d6ac6c95fba9a1574} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76d94cef, StatelessResetToken: 0x0cad256df6db3a03e5317d963170e157} 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/be8f423c0130ed857a74b261fc7d81a3374497e6.sqlog 2025/04/30 08:47:17 server Changing connection ID to a31e33f2. 2025/04/30 08:47:17 Adding connection IDs be8f423c0130ed857a74b261fc7d81a3374497e6 and a31e33f2 for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection be8f423c0130ed857a74b261fc7d81a3374497e6, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: be8f423c0130ed857a74b261fc7d81a3374497e6, SrcConnectionID: a0a1cccec2a3e34e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a0a1cccec2a3e34e, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID 7433fc2d. 2025/04/30 08:47:17 Adding connection ID 13c00006. 2025/04/30 08:47:17 Adding connection ID 7d196aa3. 2025/04/30 08:47:17 Adding connection ID 86075866. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection be8f423c0130ed857a74b261fc7d81a3374497e6 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: a0a1cccec2a3e34e, SrcConnectionID: a31e33f2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 379, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: a0a1cccec2a3e34e, SrcConnectionID: a31e33f2, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 08:47:17 server Short Header{DestConnectionID: a0a1cccec2a3e34e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7d196aa3, StatelessResetToken: 0x724fd61cddd3c5d75eeb7b17f8dbefba} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 86075866, StatelessResetToken: 0xf807d76090c24153250a5297d7b4e28e} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 13c00006, StatelessResetToken: 0x65abb899b822414fdf0d938b4df9df3f} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7433fc2d, StatelessResetToken: 0xa0c95a9667e428b3c16582269422a981} 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/9bed0558ce980257d716c844f4252149f62d9f6e.sqlog 2025/04/30 08:47:17 server Changing connection ID to c3863aa4. 2025/04/30 08:47:17 Adding connection IDs 9bed0558ce980257d716c844f4252149f62d9f6e and c3863aa4 for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection 9bed0558ce980257d716c844f4252149f62d9f6e, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 9bed0558ce980257d716c844f4252149f62d9f6e, SrcConnectionID: e7a2e5e2e73f6d5e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e7a2e5e2e73f6d5e, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID 34f32fdf. 2025/04/30 08:47:17 Adding connection ID 53b2b7ea. 2025/04/30 08:47:17 Adding connection ID c0735468. 2025/04/30 08:47:17 Adding connection ID 14865c3b. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9bed0558ce980257d716c844f4252149f62d9f6e 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: e7a2e5e2e73f6d5e, SrcConnectionID: c3863aa4, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 377, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: e7a2e5e2e73f6d5e, SrcConnectionID: c3863aa4, PacketNumber: 0, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:17 server Short Header{DestConnectionID: e7a2e5e2e73f6d5e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c0735468, StatelessResetToken: 0xfd9b1fef9936af4bab522aa7e3b1faab} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 14865c3b, StatelessResetToken: 0x3aa136062d1b0c7c4990288231e21847} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 53b2b7ea, StatelessResetToken: 0x7d360acd2e778b522bbf802ce9f462f6} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 34f32fdf, StatelessResetToken: 0xd3a79cc990a341ad05c00a0f1c5d2c0b} 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/6694a6888146584732754f15cbc04e75afe55fd6.sqlog 2025/04/30 08:47:17 server Changing connection ID to bb238c35. 2025/04/30 08:47:17 Adding connection IDs 6694a6888146584732754f15cbc04e75afe55fd6 and bb238c35 for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection 6694a6888146584732754f15cbc04e75afe55fd6, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 6694a6888146584732754f15cbc04e75afe55fd6, SrcConnectionID: 6ec1f62ac4e7ef9b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6ec1f62ac4e7ef9b, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID 5ef1b92a. 2025/04/30 08:47:17 Adding connection ID 9ccf1fa1. 2025/04/30 08:47:17 Adding connection ID 751fe480. 2025/04/30 08:47:17 Adding connection ID 5208c285. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6694a6888146584732754f15cbc04e75afe55fd6 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 6ec1f62ac4e7ef9b, SrcConnectionID: bb238c35, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 374, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: 6ec1f62ac4e7ef9b, SrcConnectionID: bb238c35, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:47:17 server Short Header{DestConnectionID: 6ec1f62ac4e7ef9b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5ef1b92a, StatelessResetToken: 0x7b381604e228227102e29c7d75934035} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 751fe480, StatelessResetToken: 0x93e96eac5f010f651beb6a203dc36fd4} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9ccf1fa1, StatelessResetToken: 0x35abec32238419976004a93f77de1487} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5208c285, StatelessResetToken: 0x3e456045b305967d98ec516534b492db} 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/f1fc49469a2086fad8a63d2d68be4da6bc7c84f1.sqlog 2025/04/30 08:47:17 server Changing connection ID to 39759913. 2025/04/30 08:47:17 Adding connection IDs f1fc49469a2086fad8a63d2d68be4da6bc7c84f1 and 39759913 for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection f1fc49469a2086fad8a63d2d68be4da6bc7c84f1, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: f1fc49469a2086fad8a63d2d68be4da6bc7c84f1, SrcConnectionID: 05d68400ab63c613, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 05d68400ab63c613, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID 7ba35e5c. 2025/04/30 08:47:17 Adding connection ID 3dc93bd3. 2025/04/30 08:47:17 Adding connection ID 948213c2. 2025/04/30 08:47:17 Adding connection ID 864b4d1d. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f1fc49469a2086fad8a63d2d68be4da6bc7c84f1 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 05d68400ab63c613, SrcConnectionID: 39759913, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 371, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: 05d68400ab63c613, SrcConnectionID: 39759913, PacketNumber: 0, PacketNumberLen: 2, Length: 743, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 08:47:17 server Short Header{DestConnectionID: 05d68400ab63c613, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7ba35e5c, StatelessResetToken: 0xa11b25d59276c3706698d5945bdaba44} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 864b4d1d, StatelessResetToken: 0xbbd2ec31d4eed9a340f455f6801b5def} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 948213c2, StatelessResetToken: 0x7e65d65b33ebdf09a1398fb4424c14a2} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3dc93bd3, StatelessResetToken: 0xbd85b8c8b692feeaf871502786a57e14} 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/1d751f10caeadbe902b2900a04e7cf7f3d15a091.sqlog 2025/04/30 08:47:17 server Changing connection ID to 5fae7cea. 2025/04/30 08:47:17 Adding connection IDs 1d751f10caeadbe902b2900a04e7cf7f3d15a091 and 5fae7cea for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection 1d751f10caeadbe902b2900a04e7cf7f3d15a091, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 1d751f10caeadbe902b2900a04e7cf7f3d15a091, SrcConnectionID: 09608a78d4f8061e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 09608a78d4f8061e, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID 3c6556da. 2025/04/30 08:47:17 Adding connection ID e028da1f. 2025/04/30 08:47:17 Adding connection ID 1bd7cced. 2025/04/30 08:47:17 Adding connection ID 89c8f60f. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1d751f10caeadbe902b2900a04e7cf7f3d15a091 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 09608a78d4f8061e, SrcConnectionID: 5fae7cea, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 374, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: 09608a78d4f8061e, SrcConnectionID: 5fae7cea, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:47:17 server Short Header{DestConnectionID: 09608a78d4f8061e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 89c8f60f, StatelessResetToken: 0xc15ea931fb2fbc1632c5b3f13f8622d4} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3c6556da, StatelessResetToken: 0x3edb2e077979665b5cd70c20390574cd} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1bd7cced, StatelessResetToken: 0xbe724d4edae8f2469276b6e572ab1675} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e028da1f, StatelessResetToken: 0x8cdd4e6b300de28baa761c3921b32580} 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/0bd87786881766c193d99efb9e2921c9b71c8220.sqlog 2025/04/30 08:47:17 server Changing connection ID to 5504d811. 2025/04/30 08:47:17 Adding connection IDs 0bd87786881766c193d99efb9e2921c9b71c8220 and 5504d811 for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection 0bd87786881766c193d99efb9e2921c9b71c8220, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 0bd87786881766c193d99efb9e2921c9b71c8220, SrcConnectionID: 379e93657f6cba65, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 379e93657f6cba65, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID a8a59ea5. 2025/04/30 08:47:17 Adding connection ID e10e7849. 2025/04/30 08:47:17 Adding connection ID aac4bb1b. 2025/04/30 08:47:17 Adding connection ID 21f3eeb1. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0bd87786881766c193d99efb9e2921c9b71c8220 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 379e93657f6cba65, SrcConnectionID: 5504d811, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 375, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: 379e93657f6cba65, SrcConnectionID: 5504d811, PacketNumber: 0, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 08:47:17 server Short Header{DestConnectionID: 379e93657f6cba65, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 21f3eeb1, StatelessResetToken: 0x7a0cd690ea0148d0b2c072a5d238bd29} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e10e7849, StatelessResetToken: 0x7c829fbc28f07fe4e4f641b936cffa68} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: aac4bb1b, StatelessResetToken: 0xb30dd5feac6fe164f8ebcbcac3247e8c} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a8a59ea5, StatelessResetToken: 0x01265b555f369ca6d172092d12238407} 2025/04/30 08:47:17 server <- Received Initial packet. 2025/04/30 08:47:17 Created qlog file: /logs/qlog/5fc64f8e771c7a8e5ef216c1bff525356c79cad6.sqlog 2025/04/30 08:47:17 server Changing connection ID to c79d0663. 2025/04/30 08:47:17 Adding connection IDs 5fc64f8e771c7a8e5ef216c1bff525356c79cad6 and c79d0663 for a new connection. 2025/04/30 08:47:17 server <- Reading packet 0 (1200 bytes) for connection 5fc64f8e771c7a8e5ef216c1bff525356c79cad6, Initial 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 5fc64f8e771c7a8e5ef216c1bff525356c79cad6, SrcConnectionID: 538553c64c96061d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 538553c64c96061d, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:17 Adding connection ID 66e37a5c. 2025/04/30 08:47:17 Adding connection ID 999ed5a2. 2025/04/30 08:47:17 Adding connection ID 9b3928c2. 2025/04/30 08:47:17 Adding connection ID 3459d1ae. 2025/04/30 08:47:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5fc64f8e771c7a8e5ef216c1bff525356c79cad6 2025/04/30 08:47:17 server Long Header{Type: Initial, DestConnectionID: 538553c64c96061d, SrcConnectionID: c79d0663, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 375, Version: v1} 2025/04/30 08:47:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:17 server Long Header{Type: Handshake, DestConnectionID: 538553c64c96061d, SrcConnectionID: c79d0663, PacketNumber: 0, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 08:47:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 08:47:17 server Short Header{DestConnectionID: 538553c64c96061d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3459d1ae, StatelessResetToken: 0x2a93d3e71fab3357e162a68048ad16ed} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 999ed5a2, StatelessResetToken: 0xab6643cc41098c5cb542d79106956e5e} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9b3928c2, StatelessResetToken: 0xe964b20d22e8e7195ce4fa5ba293f5dd} 2025/04/30 08:47:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 66e37a5c, StatelessResetToken: 0x34d3ce3f0239f657d04e83813390d26a} 2025/04/30 08:47:18 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:18 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection f48129df, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: f48129df, SrcConnectionID: 40e6e6271f83b473, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 34.37945ms (σ: 17.189725ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection f48129df, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: f48129df, SrcConnectionID: 40e6e6271f83b473, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 280µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 34.379ms (σ: 12.891ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 40e6e6271f83b473, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xa75a83f7a8f73c70a1b2234bc983d7f5edcda45c12ec4a261756587f5d2241e1b6b7fbcf69de530a5d1585f098e8dd4c72deb2ccbac012c40a19957256b2bff5a1656356c507a5205a7fca1d4a0c0b2ec3ea50cba345} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection f48129df, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: f48129df, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d43127b703e3b679, StatelessResetToken: 0xea601844b2400822a601c95663933c2c} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b3049a71f9b32b16, StatelessResetToken: 0x63d8a8c65ff6db2abe2c3017a49427c0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 0afe0dd4add993d0, StatelessResetToken: 0x2f50569092151ad4467fe4d51689eeab} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 2 (37 bytes) for connection bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: d43127b703e3b679, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 74.169µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection 175ada83, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 175ada83, SrcConnectionID: a743561c48232023, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 336µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 35.091417ms (σ: 17.545708ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection 175ada83, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 175ada83, SrcConnectionID: a743561c48232023, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 336µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 35.091ms (σ: 13.158ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 736fb346ea9580e7163d4c4855d6801ff24cb272 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server <- Reading packet 0 (126 bytes) for connection 175ada83, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 175ada83, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7237411430d0b5a5, StatelessResetToken: 0x2882ac919c4cbd68dd9e1cc06c3bf742} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0c2b6ed929ac3aeb, StatelessResetToken: 0x55c602d7fc1b1a3b15f7d1a71501d608} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: be61d36bedb8fa7d, StatelessResetToken: 0xbd974d8a90fe83e43564b60974e6a326} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 1 (269 bytes) for connection 736fb346ea9580e7163d4c4855d6801ff24cb272, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 7237411430d0b5a5, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 478.015µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x648967f22854701ac593ffcd2e96f1d44fb9041ceb675642fd748c264336407797f68e714bc28335844daa83ee1f08e7779a41e47d2b5112c37e2e8d1b95b4aacd8bed75864480199f192806efe93b6bded64e2aaf75} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 Received request: GET /ahoaoiokwo 2025/04/30 08:47:18 server -> Sending packet 2 (1053 bytes) for connection 736fb346ea9580e7163d4c4855d6801ff24cb272, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 7237411430d0b5a5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection b9077bb5, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: b9077bb5, SrcConnectionID: 8cbd7efac589fd4a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 264µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 36.273933ms (σ: 18.136966ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection b9077bb5, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: b9077bb5, SrcConnectionID: 8cbd7efac589fd4a, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 264µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 36.273ms (σ: 13.602ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 378814dfd105ad8ca1cca2afc939c0f1883bbe5b in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection 378814dfd105ad8ca1cca2afc939c0f1883bbe5b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8cbd7efac589fd4a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x234b6fc7b0fe06b2ccc190c7ddba923acbaa0de2c1ec9f79cf1edcfc4989f082d4f8015a8e699db47ce818a033ce4b4902d6acba6420c50bcddc20909045895d832e5235bd8c560423d867d814dcadf24cf12c37be7c} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection e920562f, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: e920562f, SrcConnectionID: 2d92e842f5f04c00, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 272µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 36.508943ms (σ: 18.254471ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection e920562f, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: e920562f, SrcConnectionID: 2d92e842f5f04c00, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 272µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 36.508ms (σ: 13.69ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection 30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2d92e842f5f04c00, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xf8a5565156f64c7d3c3eb3d57e13a1a4bf3b1beb7ce5bd0e964a1e02bc191b0ac493594f8d431d37147697aad701d2bb1bb6d44e096c48a5e6b543d207679d4bdc913e7a22aee63cce23ca6d99f3bbf4ceb41d6d7154} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection e920562f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e920562f, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection e920562f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e920562f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 4dfbbd38aa3ba894, StatelessResetToken: 0x8a82418d953f8e4b3efaa2f143c34d09} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c0829a1fb757488c, StatelessResetToken: 0x73ee76fdb731267aa281864912068174} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6f7dd4ac60fdb31a, StatelessResetToken: 0xb0237b91a2cc626d7476c5a910b16b35} 2025/04/30 08:47:18 server -> Sending packet 2 (37 bytes) for connection 30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 4dfbbd38aa3ba894, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 160.406µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 Received request: GET /xpiugyrrqg 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection 30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 4dfbbd38aa3ba894, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection 61ba8ef8, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 61ba8ef8, SrcConnectionID: e0f10fdf3dee4bdf, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 288µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 36.703905ms (σ: 18.351952ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection 61ba8ef8, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 61ba8ef8, SrcConnectionID: e0f10fdf3dee4bdf, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 288µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 36.703ms (σ: 13.763ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID b7ae701d7781baebae33d7afb275340dd00b4630 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection b7ae701d7781baebae33d7afb275340dd00b4630, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e0f10fdf3dee4bdf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x54ccd1bbacf4dcd98643a72cd61309aa522e6984f587d51f49a5e40d06674838a9632d74331dbcc670ec3e19d4b1722615307ccd3a16b21df1237d112165b1fb89cc14f62650057d5831fbc3617ea86d8c7221af0d7a} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 61ba8ef8, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 61ba8ef8, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 2 (35 bytes) for connection b7ae701d7781baebae33d7afb275340dd00b4630, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e0f10fdf3dee4bdf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 322.173µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 Received request: GET /vwfjohdxfs 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection b7ae701d7781baebae33d7afb275340dd00b4630, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e0f10fdf3dee4bdf, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection 94a02ca1, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 94a02ca1, SrcConnectionID: 92451ba2b1b9e5e0, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 34.471451ms (σ: 17.235725ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection 94a02ca1, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 94a02ca1, SrcConnectionID: 92451ba2b1b9e5e0, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 34.471ms (σ: 12.926ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 7607862b08b9bb2b8386c230b538fc65a46759b8 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection 7607862b08b9bb2b8386c230b538fc65a46759b8, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 92451ba2b1b9e5e0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x1124b5a846e0765056f4782c3602a156d578f4c1e50252ea3ae2ef6da938a2adeb283f86aaecb133862dd1f17eddedb2eb6325661685feb9b37968ed6477f946044ac70bd4169cc2889665c1487748b7da0086072fd6} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 94a02ca1, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 94a02ca1, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 2 (35 bytes) for connection 7607862b08b9bb2b8386c230b538fc65a46759b8, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 92451ba2b1b9e5e0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 281.193µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 Received request: GET /kbbtrfwvpr 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection 7607862b08b9bb2b8386c230b538fc65a46759b8, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 92451ba2b1b9e5e0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection e4ee6a80, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: e4ee6a80, SrcConnectionID: 59684cf19b4bbfff, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 34.463736ms (σ: 17.231868ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection e4ee6a80, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: e4ee6a80, SrcConnectionID: 59684cf19b4bbfff, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 34.463ms (σ: 12.923ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 59684cf19b4bbfff, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x0bdd64dac21f10d6de1ba9f12ab3b60228f9ea04f40a5bbd1cdf878a6a27f968ad9265e634fbfd087ceeed9e1d731da759f97fdeb8a8861a70fa5950f1a5b8858207bdf87415d6b1312af8794096360532742ea271f6} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection e4ee6a80, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e4ee6a80, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cc86b6dc0840ab6f, StatelessResetToken: 0xc3e17b8475e3321a1ac2b03a41c4d8e5} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9a9cd41b92b72365, StatelessResetToken: 0x048ce7c2efc6e771a4d01d1b0709ec57} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 59d094409ac0c4a7, StatelessResetToken: 0x0e49d324fec76f53a45cfe7c4f51d1ec} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 2 (37 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: cc86b6dc0840ab6f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 105.244µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection a31e33f2, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: a31e33f2, SrcConnectionID: a0a1cccec2a3e34e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 272µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.733378ms (σ: 16.866689ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection a31e33f2, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: a31e33f2, SrcConnectionID: a0a1cccec2a3e34e, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 272µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.733ms (σ: 12.649ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID be8f423c0130ed857a74b261fc7d81a3374497e6 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection be8f423c0130ed857a74b261fc7d81a3374497e6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: a0a1cccec2a3e34e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xd26b8ab01db0eadc35f31cab09c86a92eb03b6ce5a20d13ad2d9ace41b4c2921031bd1c5c1a38d4504fd2fbd2c3ced05180fc77e3e3c911aec7a4fc8ff51627de4cd9401334862f815af083b55e451fc07a3b141aea3} 2025/04/30 08:47:18 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection bb238c35, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: bb238c35, SrcConnectionID: 6ec1f62ac4e7ef9b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 264µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.927603ms (σ: 16.463801ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection bb238c35, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: bb238c35, SrcConnectionID: 6ec1f62ac4e7ef9b, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 264µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.927ms (σ: 12.347ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 6694a6888146584732754f15cbc04e75afe55fd6 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection 6694a6888146584732754f15cbc04e75afe55fd6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 6ec1f62ac4e7ef9b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xcc118729600a895f4f79181476ac2d96659a24971c45799a84ad4aa49c3c5139f3d8f7577fe32d4444155324d8b05a337262a7aa44cf96ba85aa134f6598571fe0f50d5b833266f0f395ed427bfa9386c2bb4956d8f8} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection bb238c35, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: bb238c35, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection bb238c35, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: bb238c35, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 19851b8b6cc3fca4, StatelessResetToken: 0x07c7b4b03a07fc77edd33aaa5612e4eb} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 816a44ed6b04e0fd, StatelessResetToken: 0x3122be0f723e6922bc0e9219421c561d} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5c1ed18fd9d51e04, StatelessResetToken: 0x3f9a592d5f41304be8f43425eee9ea4e} 2025/04/30 08:47:18 Received request: GET /xagzfzecrc 2025/04/30 08:47:18 server -> Sending packet 2 (37 bytes) for connection 6694a6888146584732754f15cbc04e75afe55fd6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 19851b8b6cc3fca4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 304.364µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection 6694a6888146584732754f15cbc04e75afe55fd6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 19851b8b6cc3fca4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection 39759913, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 39759913, SrcConnectionID: 05d68400ab63c613, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.808277ms (σ: 16.404138ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection 39759913, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 39759913, SrcConnectionID: 05d68400ab63c613, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 256µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.808ms (σ: 12.303ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID f1fc49469a2086fad8a63d2d68be4da6bc7c84f1 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection f1fc49469a2086fad8a63d2d68be4da6bc7c84f1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 05d68400ab63c613, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xc7147769a7e4fe1c32c4fad3f5c9c80044c5ed2afe082e72b1a4e64ca12c8a1c94529ddbd4f50862feaf9480b582a11aa9b2af646b68f1c0a980e60575e9a6361d39eab843a71de0cb914d3edcf5afc3a2b3e26d9bc2} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 39759913, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 39759913, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 Received request: GET /zoagliuudr 2025/04/30 08:47:18 server -> Sending packet 2 (36 bytes) for connection f1fc49469a2086fad8a63d2d68be4da6bc7c84f1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 05d68400ab63c613, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 947.838µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection 5fae7cea, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 5fae7cea, SrcConnectionID: 09608a78d4f8061e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.516883ms (σ: 16.758441ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection 5fae7cea, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 5fae7cea, SrcConnectionID: 09608a78d4f8061e, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.516ms (σ: 12.568ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 1d751f10caeadbe902b2900a04e7cf7f3d15a091 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection f1fc49469a2086fad8a63d2d68be4da6bc7c84f1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 05d68400ab63c613, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 5fae7cea, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 5fae7cea, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection 5fae7cea, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 5fae7cea, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 Received request: GET /rwryswcvnz 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e7eec19ee52c17e7, StatelessResetToken: 0xfd9a89701d96f6da93fdcd91ac609333} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a81b5ca13de252e2, StatelessResetToken: 0x8b3d65e5f80a53ad52f6bc8ee98f4f8b} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: df641d9f6059f1d7, StatelessResetToken: 0x0546ac47aae085dd44dbd6cad0705476} 2025/04/30 08:47:18 server -> Sending packet 1 (269 bytes) for connection 1d751f10caeadbe902b2900a04e7cf7f3d15a091, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e7eec19ee52c17e7, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 372.327µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x62aa032e89ea13c2d55f0d823f843d184066b141d05b39884a07ae5bb442efd443ed0758cade2b32dad6e37d0eeee8f3eb624394ab996cc2336e560c186c9e4a81935589d81706d9defb23faf273f1268b52805ad5ff} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> Sending packet 2 (1053 bytes) for connection 1d751f10caeadbe902b2900a04e7cf7f3d15a091, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e7eec19ee52c17e7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection 5504d811, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 5504d811, SrcConnectionID: 379e93657f6cba65, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 304µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.831692ms (σ: 16.415846ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection 5504d811, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 5504d811, SrcConnectionID: 379e93657f6cba65, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 304µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.831ms (σ: 12.311ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 0bd87786881766c193d99efb9e2921c9b71c8220 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection 0bd87786881766c193d99efb9e2921c9b71c8220, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 379e93657f6cba65, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x2dc49617665bedd068acaaf5895d3cc66468d2679322b4be642534ff8574f5746fe13ccb8856492e5fed25722c0d83fd663818db0c4e7cd998b619a263ed57a9a767ad03a658c1e6687c7ef4375ad6b2eaecea24d71a} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 5504d811, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 5504d811, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 2 (106 bytes) for connection 5504d811, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 5504d811, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b9eba7694128b142, StatelessResetToken: 0xf22053428cbdd14bbe0e85b1332eacd8} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f7d2128b5e2a28ef, StatelessResetToken: 0xd683d4e6265fc462f85bad539595f502} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 02b4111d02446409, StatelessResetToken: 0xb6ed3c19c4f0523ae18dd69a04e4dd68} 2025/04/30 08:47:18 server -> Sending packet 2 (39 bytes) for connection 0bd87786881766c193d99efb9e2921c9b71c8220, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: b9eba7694128b142, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 138.098µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 Received request: GET /guwpyxefep 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection 0bd87786881766c193d99efb9e2921c9b71c8220, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: b9eba7694128b142, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 1 (44 bytes) for connection c79d0663, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: c79d0663, SrcConnectionID: 538553c64c96061d, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 320µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.991647ms (σ: 16.495823ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection c79d0663, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: c79d0663, SrcConnectionID: 538553c64c96061d, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 320µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.991ms (σ: 12.371ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 5fc64f8e771c7a8e5ef216c1bff525356c79cad6 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection 5fc64f8e771c7a8e5ef216c1bff525356c79cad6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 538553c64c96061d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x0ae4804c1c241e723e24e5375a5d0f918eed26d260301e3a00de68de688978ddb5c06d8d27adcf1a8cc0c12cc5a8c765f5f11f24f36c6d1f888fbe9bcd1ca3395b4b780d77345b4fae9077e335c2acdabce752d071b7} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection c79d0663, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: c79d0663, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 2 (35 bytes) for connection 5fc64f8e771c7a8e5ef216c1bff525356c79cad6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 538553c64c96061d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 208.658µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 Received request: GET /ntsusfhkss 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection 5fc64f8e771c7a8e5ef216c1bff525356c79cad6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 538553c64c96061d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection f48129df, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: f48129df, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 88µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (3): [0 1 2] 2025/04/30 08:47:18 server updated RTT: 33.914ms (σ: 10.597ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server Ignoring all packets below 2. 2025/04/30 08:47:18 server <- Reading packet 3 (50 bytes) for connection f48129df, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: f48129df, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ba95be7cdc3dafda, StatelessResetToken: 0xcf3c3770a273b9f2aa474eddaa864d89} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server <- Reading packet 1 (30 bytes) for connection 175ada83, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 175ada83, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 1] 2025/04/30 08:47:18 server updated RTT: 34.556ms (σ: 10.936ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Ignoring all packets below 1. 2025/04/30 08:47:18 server <- Reading packet 3 (33 bytes) for connection 175ada83, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 175ada83, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 224µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [2] 2025/04/30 08:47:18 server updated RTT: 34.163ms (σ: 8.986ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [deb262ba 17417ecd 43b219b4 175ada83 85c49817] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 736fb346ea9580e7163d4c4855d6801ff24cb272 closed. 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection e920562f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e920562f, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 1] 2025/04/30 08:47:18 server updated RTT: 35.794ms (σ: 11.695ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server <- Reading packet 4 (35 bytes) for connection 61ba8ef8, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 61ba8ef8, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 184µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (3): [0 1 3] 2025/04/30 08:47:18 server updated RTT: 36.073ms (σ: 11.58ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [f55135ef 61ba8ef8 1875fe28 58b0c3c6 2b3ae016] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection b7ae701d7781baebae33d7afb275340dd00b4630 closed. 2025/04/30 08:47:18 server <- Reading packet 2 (32 bytes) for connection 94a02ca1, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 94a02ca1, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 24µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 3] 2025/04/30 08:47:18 server updated RTT: 34.104ms (σ: 10.428ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server setting loss timer for packet 1 (1-RTT) to 38.367ms (in 2025-04-30 08:47:18.051518754 +0000 UTC m=+4.100381408) 2025/04/30 08:47:18 server -> Sending packet 4 (30 bytes) for connection 7607862b08b9bb2b8386c230b538fc65a46759b8, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 92451ba2b1b9e5e0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 51 bytes. Remaining: 35 bytes. 2025/04/30 08:47:18 server Dropping %!s(logging.PacketType=1) packet (51 bytes) because we already dropped the keys. 2025/04/30 08:47:18 server <- Reading packet 3 (35 bytes) for connection 94a02ca1, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 94a02ca1, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 144µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [94a02ca1 6eb95b34 376cf7ea 792161f9 e720c98b] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 7607862b08b9bb2b8386c230b538fc65a46759b8 closed. 2025/04/30 08:47:18 server <- Reading packet 3 (50 bytes) for connection e4ee6a80, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e4ee6a80, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 76f9863d4fa14357, StatelessResetToken: 0xaef6ba7cfff6f4ce3826d2fcc284d642} 2025/04/30 08:47:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:18 server -> Sending packet 3 (37 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: cc86b6dc0840ab6f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 91.12µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection a31e33f2, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: a31e33f2, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 1] 2025/04/30 08:47:18 server updated RTT: 33.359ms (σ: 10.234ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection bb238c35, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: bb238c35, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 1] 2025/04/30 08:47:18 server updated RTT: 32.67ms (σ: 9.773ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server <- Reading packet 3 (50 bytes) for connection bb238c35, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: bb238c35, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a7e38baf99dd80a8, StatelessResetToken: 0xef6e551c04cc337a45ed1c9059bb9367} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server <- Reading packet 5 (33 bytes) for connection bb238c35, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: bb238c35, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 128µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [2 3] 2025/04/30 08:47:18 server updated RTT: 32.528ms (σ: 7.613ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [5208c285 bb238c35 5ef1b92a 9ccf1fa1 751fe480] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 6694a6888146584732754f15cbc04e75afe55fd6 closed. 2025/04/30 08:47:18 server <- Reading packet 4 (42 bytes) for connection f48129df, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: f48129df, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 08:47:18 server -> Sending packet 3 (35 bytes) for connection bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: d43127b703e3b679, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 90.59µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 Received request: GET /tqqqulihgu 2025/04/30 08:47:18 server -> Sending packet 4 (1053 bytes) for connection bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: d43127b703e3b679, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 4 (33 bytes) for connection 5fae7cea, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 5fae7cea, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 128µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (3): [0 1 2] 2025/04/30 08:47:18 server updated RTT: 33.383ms (σ: 9.691ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [5fae7cea 3c6556da e028da1f 1bd7cced 89c8f60f] with a closed connection. 2025/04/30 08:47:18 server Connection 1d751f10caeadbe902b2900a04e7cf7f3d15a091 closed. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server <- Reading packet 3 (30 bytes) for connection 5504d811, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 5504d811, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 1] 2025/04/30 08:47:18 server updated RTT: 32.763ms (σ: 9.368ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server <- Reading packet 4 (50 bytes) for connection 5504d811, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 5504d811, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d4e35946632d2562, StatelessResetToken: 0x18140966dc5e4a059fb4b06149a76cbe} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server <- Reading packet 2 (32 bytes) for connection c79d0663, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: c79d0663, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 24µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 3] 2025/04/30 08:47:18 server updated RTT: 32.97ms (σ: 9.319ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server setting loss timer for packet 1 (1-RTT) to 37.09125ms (in 2025-04-30 08:47:18.061033698 +0000 UTC m=+4.109896352) 2025/04/30 08:47:18 server -> Sending packet 4 (30 bytes) for connection 5fc64f8e771c7a8e5ef216c1bff525356c79cad6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 538553c64c96061d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 51 bytes. Remaining: 35 bytes. 2025/04/30 08:47:18 server Dropping %!s(logging.PacketType=1) packet (51 bytes) because we already dropped the keys. 2025/04/30 08:47:18 server <- Reading packet 3 (35 bytes) for connection c79d0663, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: c79d0663, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 168µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [c79d0663 66e37a5c 999ed5a2 9b3928c2 3459d1ae] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 5fc64f8e771c7a8e5ef216c1bff525356c79cad6 closed. 2025/04/30 08:47:18 server <- Reading packet 4 (31 bytes) for connection e920562f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e920562f, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 26.816ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [2] 2025/04/30 08:47:18 server updated RTT: 35.406ms (σ: 9.546ms) 2025/04/30 08:47:18 server Ignoring all packets below 2. 2025/04/30 08:47:18 server Sending ACK because the ACK timer expired. 2025/04/30 08:47:18 server -> Sending packet 4 (38 bytes) for connection 0bd87786881766c193d99efb9e2921c9b71c8220, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: b9eba7694128b142, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 25.480808ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 5 (32 bytes) for connection f48129df, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: f48129df, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 40µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [4] 2025/04/30 08:47:18 server updated RTT: 33.604ms (σ: 8.566ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server -> Sending packet 5 (30 bytes) for connection bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: d43127b703e3b679, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server <- Reading packet 6 (35 bytes) for connection f48129df, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: f48129df, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 216µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [f48129df d8220fba 27b467f6 d313d84c 61d2de55] with a closed connection. 2025/04/30 08:47:18 server Connection bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f closed. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 5 (1053 bytes) for connection 30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 4dfbbd38aa3ba894, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server -> Sending packet 6 (1053 bytes) for connection 30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 4dfbbd38aa3ba894, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 6 (29 bytes) for connection 0bd87786881766c193d99efb9e2921c9b71c8220, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: b9eba7694128b142, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server Skipping packet number 5 2025/04/30 08:47:18 server -> Sending packet 7 (1053 bytes) for connection 0bd87786881766c193d99efb9e2921c9b71c8220, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: b9eba7694128b142, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 3 (123 bytes) for connection 378814dfd105ad8ca1cca2afc939c0f1883bbe5b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8cbd7efac589fd4a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a650d647, StatelessResetToken: 0x0978366c5414b45264532c29a88aca6e} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9ce6c9c5, StatelessResetToken: 0x8118355324666d4f1ca72de8db8272e5} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e64181a7, StatelessResetToken: 0x6f4d8ea2004d450523954c928a02d342} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 67f78247, StatelessResetToken: 0x8bf24d691f543f41d0342d6f7fc32f71} 2025/04/30 08:47:18 server Skipping packet number 2 2025/04/30 08:47:18 server -> Sending packet 4 (259 bytes) for connection 378814dfd105ad8ca1cca2afc939c0f1883bbe5b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8cbd7efac589fd4a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x234b6fc7b0fe06b2ccc190c7ddba923acbaa0de2c1ec9f79cf1edcfc4989f082d4f8015a8e699db47ce818a033ce4b4902d6acba6420c50bcddc20909045895d832e5235bd8c560423d867d814dcadf24cf12c37be7c} 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 5 (123 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: cc86b6dc0840ab6f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d3fa2405, StatelessResetToken: 0xade9fb187427c75d6ac6c95fba9a1574} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3fbeb11a, StatelessResetToken: 0x4759eb8de25e8cb1e4a0913f689dac2b} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76d94cef, StatelessResetToken: 0x0cad256df6db3a03e5317d963170e157} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ce26594a, StatelessResetToken: 0x77c037c4196204148bd05315aeda6e9a} 2025/04/30 08:47:18 server Skipping packet number 4 2025/04/30 08:47:18 server -> Sending packet 6 (259 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: cc86b6dc0840ab6f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x0bdd64dac21f10d6de1ba9f12ab3b60228f9ea04f40a5bbd1cdf878a6a27f968ad9265e634fbfd087ceeed9e1d731da759f97fdeb8a8861a70fa5950f1a5b8858207bdf87415d6b1312af8794096360532742ea271f6} 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 5 (123 bytes) for connection f1fc49469a2086fad8a63d2d68be4da6bc7c84f1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 05d68400ab63c613, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 864b4d1d, StatelessResetToken: 0xbbd2ec31d4eed9a340f455f6801b5def} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 948213c2, StatelessResetToken: 0x7e65d65b33ebdf09a1398fb4424c14a2} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3dc93bd3, StatelessResetToken: 0xbd85b8c8b692feeaf871502786a57e14} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7ba35e5c, StatelessResetToken: 0xa11b25d59276c3706698d5945bdaba44} 2025/04/30 08:47:18 server Skipping packet number 4 2025/04/30 08:47:18 server -> Sending packet 6 (259 bytes) for connection f1fc49469a2086fad8a63d2d68be4da6bc7c84f1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 05d68400ab63c613, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xc7147769a7e4fe1c32c4fad3f5c9c80044c5ed2afe082e72b1a4e64ca12c8a1c94529ddbd4f50862feaf9480b582a11aa9b2af646b68f1c0a980e60575e9a6361d39eab843a71de0cb914d3edcf5afc3a2b3e26d9bc2} 2025/04/30 08:47:18 server <- Reading packet 2 (77 bytes) for connection 020b527c, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 020b527c, SrcConnectionID: 3d88d2d218b52e3f, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 99bc43191affa976f1141ec53dff877ac901264a in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (1366 bytes) for connection 99bc43191affa976f1141ec53dff877ac901264a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 3d88d2d218b52e3f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 020b527c, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 020b527c, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection 020b527c, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 020b527c, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 44837e17e92d524b, StatelessResetToken: 0xc4a35961aed46c3272c6e96c86e63fa5} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3c2fdfc1e9f2fb4c, StatelessResetToken: 0xac36b1a89b10b1dbc6fa31da25b8ba5b} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 37cd8676a4d57ddb, StatelessResetToken: 0xf15cdb61c0acd82e4f023ac9ff3b9465} 2025/04/30 08:47:18 server -> Sending packet 2 (267 bytes) for connection 99bc43191affa976f1141ec53dff877ac901264a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 44837e17e92d524b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 131.035902ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x0db1644b385c39408fe4a6fcacb2399e105da72c70b545e1f36b556f50f47d308e17dc501076e84836abd89ee5e7563997d8a8e2a2f54092af81fdc70a80c80de621e8fa387cee69964e804caa8327c8044e3d39d5a9} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 Received request: GET /tjfrlbjmty 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection 99bc43191affa976f1141ec53dff877ac901264a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 44837e17e92d524b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 5 (32 bytes) for connection e920562f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e920562f, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 56µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 6 (35 bytes) for connection e920562f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e920562f, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 224µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [c91c4fa8 e920562f a268f42d e0d12886 cd4ff4bb] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5 closed. 2025/04/30 08:47:18 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 08:47:18 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 08:47:18 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 08:47:18 server <- Reading packet 7 (34 bytes) for connection 5504d811, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 5504d811, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 94.328ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [5504d811 a8a59ea5 e10e7849 aac4bb1b 21f3eeb1] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 0bd87786881766c193d99efb9e2921c9b71c8220 closed. 2025/04/30 08:47:18 server <- Reading packet 1 (77 bytes) for connection 3464739d, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 3464739d, SrcConnectionID: 88c3a83989c90142, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID f5c02efb89d7759854e5c0ff1e192769804c3188 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (1366 bytes) for connection f5c02efb89d7759854e5c0ff1e192769804c3188, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 88c3a83989c90142, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 3464739d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 3464739d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 08:47:18 server -> Sending packet 2 (267 bytes) for connection f5c02efb89d7759854e5c0ff1e192769804c3188, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 88c3a83989c90142, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 Received request: GET /blqljazzzr 2025/04/30 08:47:18 server <- Reading packet 2 (32 bytes) for connection b9077bb5, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: b9077bb5, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [3] 2025/04/30 08:47:18 server updated RTT: 35.593ms (σ: 11.559ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 144.036086ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xf4cb850f65861caa50f77cff7f399bc70832ab5d3d321e1a9b5dee6a3e1a5b8b4e80590b840bf67605a2d28b7b9c754e819f579e6b2e3f25151f033fcd20975b79f31c6a487d06fcf391a1d60e52c61ed0f97f7996cb} 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection f5c02efb89d7759854e5c0ff1e192769804c3188, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 88c3a83989c90142, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 3 (50 bytes) for connection 020b527c, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 020b527c, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0f64b8198a62ae2a, StatelessResetToken: 0xd497d2aafb88b14676377e012ad79c59} 2025/04/30 08:47:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:18 server -> Sending packet 4 (37 bytes) for connection 99bc43191affa976f1141ec53dff877ac901264a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 44837e17e92d524b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 127.559µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 4 (30 bytes) for connection 020b527c, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 020b527c, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 16µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (4): [0 1 2 3] 2025/04/30 08:47:18 server updated RTT: 32.494902ms (σ: 16.247451ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server Ignoring all packets below 2. 2025/04/30 08:47:18 server -> Sending packet 5 (30 bytes) for connection 99bc43191affa976f1141ec53dff877ac901264a, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 44837e17e92d524b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server <- Reading packet 5 (33 bytes) for connection 020b527c, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 020b527c, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 184µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [93dc0457 5f20abd7 020b527c cfe9e6b3 6e4f42df] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 99bc43191affa976f1141ec53dff877ac901264a closed. 2025/04/30 08:47:18 server <- Reading packet 1 (77 bytes) for connection c3863aa4, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: c3863aa4, SrcConnectionID: e7a2e5e2e73f6d5e, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 9bed0558ce980257d716c844f4252149f62d9f6e in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (1366 bytes) for connection 9bed0558ce980257d716c844f4252149f62d9f6e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e7a2e5e2e73f6d5e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection c3863aa4, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: c3863aa4, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 08:47:18 server -> Sending packet 2 (267 bytes) for connection 9bed0558ce980257d716c844f4252149f62d9f6e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e7a2e5e2e73f6d5e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 Received request: GET /agetcwkjzs 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 163.426674ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x2ef876e30552f21e86002a324742c0352a914fa8864f5e6b8400260675495f0a9866a4dac56c0d28daff46abf248bc5e3156339d6f98341132130ceb5c31335d7a753dede7ff6fb9fca15381e3b51d8489438f17a6a6} 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection 9bed0558ce980257d716c844f4252149f62d9f6e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e7a2e5e2e73f6d5e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server -> Sending packet 4 (31 bytes) for connection 9bed0558ce980257d716c844f4252149f62d9f6e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e7a2e5e2e73f6d5e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 3 (33 bytes) for connection b9077bb5, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: b9077bb5, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 26.216ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [4] 2025/04/30 08:47:18 server updated RTT: 35.178ms (σ: 9.498ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- Reading packet 6 (35 bytes) for connection e4ee6a80, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e4ee6a80, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 26.2ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (3): [2 5 6] 2025/04/30 08:47:18 server updated RTT: 37.3ms (σ: 15.367ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server Ignoring all packets below 2. 2025/04/30 08:47:18 server <- Reading packet 3 (35 bytes) for connection 39759913, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 39759913, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 26.024ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [5 6] 2025/04/30 08:47:18 server updated RTT: 35.83ms (σ: 15.272ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server lost packet 3 (time threshold) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server -> Sending packet 7 (1053 bytes) for connection f1fc49469a2086fad8a63d2d68be4da6bc7c84f1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 05d68400ab63c613, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection 3464739d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 3464739d, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 1] 2025/04/30 08:47:18 server updated RTT: 31.750467ms (σ: 15.875233ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server <- Reading packet 4 (106 bytes) for connection a31e33f2, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: a31e33f2, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 73b55e200b06dee7, StatelessResetToken: 0xdacb3fb7883bc74daa63c86da7efc875} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: df563e953bfe9ccd, StatelessResetToken: 0x9c00f7c4cc598e677359073739da69e6} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 387d1acb7fd31547, StatelessResetToken: 0x3bd65a27da33a8e24f5a511853d5f102} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 2 (1366 bytes) for connection be8f423c0130ed857a74b261fc7d81a3374497e6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 73b55e200b06dee7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server -> Sending packet 3 (39 bytes) for connection be8f423c0130ed857a74b261fc7d81a3374497e6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 73b55e200b06dee7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 170.129µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server <- Reading packet 2 (32 bytes) for connection c3863aa4, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: c3863aa4, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 4] 2025/04/30 08:47:18 server updated RTT: 32.773921ms (σ: 16.38696ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server lost packet 1 (reordering threshold) 2025/04/30 08:47:18 server setting loss timer for packet 2 (1-RTT) to 36.870661ms (in 2025-04-30 08:47:18.21746577 +0000 UTC m=+4.266328424) 2025/04/30 08:47:18 server <- Reading packet 4 (106 bytes) for connection 39759913, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 39759913, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fe0d054d49075b8c, StatelessResetToken: 0x4875d5ffda3f33499ec44f91a7f4a6fb} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 985749dbb705473d, StatelessResetToken: 0x74a17af3244102ee075ec08de7fbe77e} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2e347d43975fdf6d, StatelessResetToken: 0x9bc2114b0f3c7efbe85dff6a3ea2ab54} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server -> Sending packet 8 (1366 bytes) for connection f1fc49469a2086fad8a63d2d68be4da6bc7c84f1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2e347d43975fdf6d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 5 (106 bytes) for connection 39759913, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 39759913, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2e347d43975fdf6d, StatelessResetToken: 0x9bc2114b0f3c7efbe85dff6a3ea2ab54} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 985749dbb705473d, StatelessResetToken: 0x74a17af3244102ee075ec08de7fbe77e} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fe0d054d49075b8c, StatelessResetToken: 0x4875d5ffda3f33499ec44f91a7f4a6fb} 2025/04/30 08:47:18 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 08:47:18 server -> Sending packet 9 (39 bytes) for connection f1fc49469a2086fad8a63d2d68be4da6bc7c84f1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2e347d43975fdf6d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 101.918µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 08:47:18.21746577 +0000 UTC m=+4.266328424 2025/04/30 08:47:18 server lost packet 2 (time threshold) 2025/04/30 08:47:18 server lost packet 3 (time threshold) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server -> Sending packet 5 (1280 bytes) for connection 9bed0558ce980257d716c844f4252149f62d9f6e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e7a2e5e2e73f6d5e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x2ef876e30552f21e86002a324742c0352a914fa8864f5e6b8400260675495f0a9866a4dac56c0d28daff46abf248bc5e3156339d6f98341132130ceb5c31335d7a753dede7ff6fb9fca15381e3b51d8489438f17a6a6} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1022, Offset + Data length: 1022} 2025/04/30 08:47:18 server -> Sending packet 6 (33 bytes) for connection 9bed0558ce980257d716c844f4252149f62d9f6e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e7a2e5e2e73f6d5e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1022, Data length: 2, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 6 (37 bytes) for connection 39759913, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 39759913, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 152µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [7] 2025/04/30 08:47:18 server updated RTT: 35.302ms (σ: 12.508ms) 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [7ba35e5c 3dc93bd3 948213c2 864b4d1d 39759913] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection f1fc49469a2086fad8a63d2d68be4da6bc7c84f1 closed. 2025/04/30 08:47:18 server <- Reading packet 5 (50 bytes) for connection a31e33f2, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: a31e33f2, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 48µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [2 3] 2025/04/30 08:47:18 server updated RTT: 33.171ms (σ: 8.05ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server Ignoring all packets below 5. 2025/04/30 08:47:18 server <- Reading packet 6 (50 bytes) for connection a31e33f2, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: a31e33f2, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: c2697cec71febec4, StatelessResetToken: 0xbb77d8db0392d0f6ec87459ca0a28e1f} 2025/04/30 08:47:18 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 08:47:18 server -> Sending packet 4 (35 bytes) for connection be8f423c0130ed857a74b261fc7d81a3374497e6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 73b55e200b06dee7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 113.131µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 Received request: GET /wmpkaeotdb 2025/04/30 08:47:18 server -> Sending packet 5 (1053 bytes) for connection be8f423c0130ed857a74b261fc7d81a3374497e6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 73b55e200b06dee7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 4 (35 bytes) for connection c3863aa4, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: c3863aa4, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 184µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [5 6] 2025/04/30 08:47:18 server updated RTT: 32.67ms (σ: 12.493ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [c0735468 14865c3b c3863aa4 34f32fdf 53b2b7ea] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 9bed0558ce980257d716c844f4252149f62d9f6e closed. 2025/04/30 08:47:18 server <- Reading packet 7 (32 bytes) for connection a31e33f2, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: a31e33f2, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 40µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [5] 2025/04/30 08:47:18 server updated RTT: 32.955ms (σ: 6.469ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server -> Sending packet 6 (30 bytes) for connection be8f423c0130ed857a74b261fc7d81a3374497e6, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 73b55e200b06dee7, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server <- Reading packet 8 (35 bytes) for connection a31e33f2, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: a31e33f2, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 208µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [13c00006 7d196aa3 86075866 a31e33f2 7433fc2d] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection be8f423c0130ed857a74b261fc7d81a3374497e6 closed. 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/6f0677b21ad653a9ffcd00e35b249672cb7af0e9.sqlog 2025/04/30 08:47:18 server Changing connection ID to 2002d3dc. 2025/04/30 08:47:18 Adding connection IDs 6f0677b21ad653a9ffcd00e35b249672cb7af0e9 and 2002d3dc for a new connection. 2025/04/30 08:47:18 server <- Reading packet 1 (1200 bytes) for connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, SrcConnectionID: 1841179219dac4ee, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 1841179219dac4ee, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 8490bff6. 2025/04/30 08:47:18 Adding connection ID ab6ae2bb. 2025/04/30 08:47:18 Adding connection ID 29334ab7. 2025/04/30 08:47:18 Adding connection ID 10fad7a8. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 1841179219dac4ee, SrcConnectionID: 2002d3dc, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 382, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 1841179219dac4ee, SrcConnectionID: 2002d3dc, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 1841179219dac4ee, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ab6ae2bb, StatelessResetToken: 0xf65ef058642d35490343e204289f0cf3} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 10fad7a8, StatelessResetToken: 0xe4b189f6ee6ea5246ea678769673ec8f} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8490bff6, StatelessResetToken: 0x9f68993e6be0567563142f3f22204edc} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 29334ab7, StatelessResetToken: 0x6ae20057af4f6c9046d2f514ee6f9520} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/ea295db2678a6867fafcf23237c262b1219820c9.sqlog 2025/04/30 08:47:18 server Changing connection ID to dc9a4c27. 2025/04/30 08:47:18 Adding connection IDs ea295db2678a6867fafcf23237c262b1219820c9 and dc9a4c27 for a new connection. 2025/04/30 08:47:18 server <- Reading packet 1 (1200 bytes) for connection ea295db2678a6867fafcf23237c262b1219820c9, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: ea295db2678a6867fafcf23237c262b1219820c9, SrcConnectionID: 8df81a7b38c3a547, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 8df81a7b38c3a547, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID bad56f1b. 2025/04/30 08:47:18 Adding connection ID 11b3487d. 2025/04/30 08:47:18 Adding connection ID 2e97015b. 2025/04/30 08:47:18 Adding connection ID cc12d488. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ea295db2678a6867fafcf23237c262b1219820c9 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 8df81a7b38c3a547, SrcConnectionID: dc9a4c27, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 367, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 8df81a7b38c3a547, SrcConnectionID: dc9a4c27, PacketNumber: 0, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8df81a7b38c3a547, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bad56f1b, StatelessResetToken: 0x39b0aefdabbab8b0558ad4810b71c8c8} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2e97015b, StatelessResetToken: 0x4c127ac6fda34259a5dc9d8741ff3fd2} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 11b3487d, StatelessResetToken: 0x0206f4c507b532af8f7010520302f443} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: cc12d488, StatelessResetToken: 0x51933cf8b1c729a02a9f68f5c65357e1} 2025/04/30 08:47:18 server <- Reading packet 2 (1200 bytes) for connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, SrcConnectionID: 1841179219dac4ee, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 1841179219dac4ee, SrcConnectionID: 2002d3dc, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/11d6a67a6d19a2798e062289be7c7c6feebd64e2.sqlog 2025/04/30 08:47:18 server Changing connection ID to 28b04c6d. 2025/04/30 08:47:18 Adding connection IDs 11d6a67a6d19a2798e062289be7c7c6feebd64e2 and 28b04c6d for a new connection. 2025/04/30 08:47:18 server <- Reading packet 2 (1200 bytes) for connection 11d6a67a6d19a2798e062289be7c7c6feebd64e2, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 11d6a67a6d19a2798e062289be7c7c6feebd64e2, SrcConnectionID: ba22d385ad896c4e, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: ba22d385ad896c4e, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 2c22109b. 2025/04/30 08:47:18 Adding connection ID a5c4e64c. 2025/04/30 08:47:18 Adding connection ID 4c773218. 2025/04/30 08:47:18 Adding connection ID 3d178c06. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 11d6a67a6d19a2798e062289be7c7c6feebd64e2 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: ba22d385ad896c4e, SrcConnectionID: 28b04c6d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 374, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: ba22d385ad896c4e, SrcConnectionID: 28b04c6d, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:47:18 server Short Header{DestConnectionID: ba22d385ad896c4e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5c4e64c, StatelessResetToken: 0x5f20255288807fcb114bc928e54fcfa2} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3d178c06, StatelessResetToken: 0xe7feffadf2372800eed6a98ee013b9a8} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2c22109b, StatelessResetToken: 0x48a08df2f8022256c271c118550b5345} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4c773218, StatelessResetToken: 0x3abaf94571643f69714db002a69f56be} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/965b418001180a1245e873a4e1bb31bc1ccd464b.sqlog 2025/04/30 08:47:18 server Changing connection ID to d2b38c8c. 2025/04/30 08:47:18 Adding connection IDs 965b418001180a1245e873a4e1bb31bc1ccd464b and d2b38c8c for a new connection. 2025/04/30 08:47:18 server <- Reading packet 1 (1200 bytes) for connection 965b418001180a1245e873a4e1bb31bc1ccd464b, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 965b418001180a1245e873a4e1bb31bc1ccd464b, SrcConnectionID: 3c22598dd5d657af, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 3c22598dd5d657af, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 1188e3cd. 2025/04/30 08:47:18 Adding connection ID 4d137b6b. 2025/04/30 08:47:18 Adding connection ID a39867b6. 2025/04/30 08:47:18 Adding connection ID 9b150454. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 965b418001180a1245e873a4e1bb31bc1ccd464b 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 3c22598dd5d657af, SrcConnectionID: d2b38c8c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 367, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 3c22598dd5d657af, SrcConnectionID: d2b38c8c, PacketNumber: 0, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 3c22598dd5d657af, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 9b150454, StatelessResetToken: 0xd7556186af941254e03e15788151665d} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4d137b6b, StatelessResetToken: 0xcb295d3335d2e2c19b95ef8fd77de5c0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1188e3cd, StatelessResetToken: 0xe3fb96b3ca79578ee647d21033aa23b6} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a39867b6, StatelessResetToken: 0xcc340678982566bbd901059a5d306333} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/5f751bf0b3ac9cfd4e550071dcb5adaa343d487f.sqlog 2025/04/30 08:47:18 server Changing connection ID to 2e05c16a. 2025/04/30 08:47:18 Adding connection IDs 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f and 2e05c16a for a new connection. 2025/04/30 08:47:18 server <- Reading packet 1 (1200 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, SrcConnectionID: c2e00f0b8f8898e8, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c2e00f0b8f8898e8, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 7f72d2a8. 2025/04/30 08:47:18 Adding connection ID 2d9975c5. 2025/04/30 08:47:18 Adding connection ID f4782141. 2025/04/30 08:47:18 Adding connection ID 2143617d. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: c2e00f0b8f8898e8, SrcConnectionID: 2e05c16a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 377, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: c2e00f0b8f8898e8, SrcConnectionID: 2e05c16a, PacketNumber: 0, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:18 server Short Header{DestConnectionID: c2e00f0b8f8898e8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f4782141, StatelessResetToken: 0x1b7f02e0528b7c705b9b5ae0d5a6703d} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2143617d, StatelessResetToken: 0x67bd1068a6a26a7b61c7af3563de690b} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2d9975c5, StatelessResetToken: 0x60d71e8affb6217e463257df92a81d7c} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7f72d2a8, StatelessResetToken: 0xb1e24b8b68c57a7f623914aba787b5df} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/7329227b9d4d748545be0a9b080b58a5eb45daba.sqlog 2025/04/30 08:47:18 server Changing connection ID to 8eb9e69f. 2025/04/30 08:47:18 Adding connection IDs 7329227b9d4d748545be0a9b080b58a5eb45daba and 8eb9e69f for a new connection. 2025/04/30 08:47:18 server <- Reading packet 2 (1200 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 7329227b9d4d748545be0a9b080b58a5eb45daba, SrcConnectionID: f60a0f2837485d7e, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f60a0f2837485d7e, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID ec36d4cd. 2025/04/30 08:47:18 Adding connection ID 9e4cff29. 2025/04/30 08:47:18 Adding connection ID 3cbd7faa. 2025/04/30 08:47:18 Adding connection ID 950d0739. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: f60a0f2837485d7e, SrcConnectionID: 8eb9e69f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 372, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: f60a0f2837485d7e, SrcConnectionID: 8eb9e69f, PacketNumber: 0, PacketNumberLen: 2, Length: 742, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 08:47:18 server Short Header{DestConnectionID: f60a0f2837485d7e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e4cff29, StatelessResetToken: 0x1184919153e0312df281ad89fc0ba0a4} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3cbd7faa, StatelessResetToken: 0x4c5ee3ab0aabc3620eae611abdd4bfbb} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec36d4cd, StatelessResetToken: 0xe0002595b6b173994a4054ba7d395881} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 950d0739, StatelessResetToken: 0xb071f3c37fcbd7d8117a324260317f94} 2025/04/30 08:47:18 server <- Reading packet 2 (1200 bytes) for connection 965b418001180a1245e873a4e1bb31bc1ccd464b, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 965b418001180a1245e873a4e1bb31bc1ccd464b, SrcConnectionID: 3c22598dd5d657af, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection 965b418001180a1245e873a4e1bb31bc1ccd464b, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 3c22598dd5d657af, SrcConnectionID: d2b38c8c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/d448869dadc1154d4ecfb2fb8f39b922fed6012b.sqlog 2025/04/30 08:47:18 server Changing connection ID to 22b7565c. 2025/04/30 08:47:18 Adding connection IDs d448869dadc1154d4ecfb2fb8f39b922fed6012b and 22b7565c for a new connection. 2025/04/30 08:47:18 server <- Reading packet 2 (1200 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d448869dadc1154d4ecfb2fb8f39b922fed6012b, SrcConnectionID: 74b506831f27e638, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 74b506831f27e638, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 6971f609. 2025/04/30 08:47:18 Adding connection ID 4063e067. 2025/04/30 08:47:18 Adding connection ID 6168f11e. 2025/04/30 08:47:18 Adding connection ID 1d314e3c. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 74b506831f27e638, SrcConnectionID: 22b7565c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 374, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 74b506831f27e638, SrcConnectionID: 22b7565c, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 74b506831f27e638, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6168f11e, StatelessResetToken: 0x3f6d08ca530c7a4685f77a6c28d98c91} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6971f609, StatelessResetToken: 0x40d6e818e786c717deb5b7123b2df8ee} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4063e067, StatelessResetToken: 0x4678d30c2edcbef92401d88d6d902af0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1d314e3c, StatelessResetToken: 0xc2e50da98bbd1303d27c87ca8e1c7c60} 2025/04/30 08:47:18 server <- Reading packet 2 (1200 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, SrcConnectionID: c2e00f0b8f8898e8, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: c2e00f0b8f8898e8, SrcConnectionID: 2e05c16a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/43352d89fac45a686e7b8d8eabdb0e2c19551927.sqlog 2025/04/30 08:47:18 server Changing connection ID to 61c52980. 2025/04/30 08:47:18 Adding connection IDs 43352d89fac45a686e7b8d8eabdb0e2c19551927 and 61c52980 for a new connection. 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 5 (256 bytes) for connection f5c02efb89d7759854e5c0ff1e192769804c3188, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 88c3a83989c90142, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xf4cb850f65861caa50f77cff7f399bc70832ab5d3d321e1a9b5dee6a3e1a5b8b4e80590b840bf67605a2d28b7b9c754e819f579e6b2e3f25151f033fcd20975b79f31c6a487d06fcf391a1d60e52c61ed0f97f7996cb} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server Skipping packet number 4 2025/04/30 08:47:18 server -> Sending packet 6 (1053 bytes) for connection f5c02efb89d7759854e5c0ff1e192769804c3188, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server <- Reading packet 1 (1200 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 43352d89fac45a686e7b8d8eabdb0e2c19551927, SrcConnectionID: d697d79fc80d4e3e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 88c3a83989c90142, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d697d79fc80d4e3e, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 7675c1b1. 2025/04/30 08:47:18 Adding connection ID d821da6e. 2025/04/30 08:47:18 Adding connection ID 5a92c65b. 2025/04/30 08:47:18 Adding connection ID 07743ac3. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d697d79fc80d4e3e, SrcConnectionID: 61c52980, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 371, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: d697d79fc80d4e3e, SrcConnectionID: 61c52980, PacketNumber: 0, PacketNumberLen: 2, Length: 743, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 08:47:18 server Short Header{DestConnectionID: d697d79fc80d4e3e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d821da6e, StatelessResetToken: 0xe863d02c5a41b1419695feaae3b336bc} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5a92c65b, StatelessResetToken: 0x3478df7206065b036157bfc702e872f3} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7675c1b1, StatelessResetToken: 0xcc11254a2bff3acd90caceef9c6ca2f7} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 07743ac3, StatelessResetToken: 0x6949a5265f98b95d95887ebe97654714} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/d62f069f618bc48e026b9dfaaaa8932c9e8525bb.sqlog 2025/04/30 08:47:18 server Changing connection ID to f114175b. 2025/04/30 08:47:18 Adding connection IDs d62f069f618bc48e026b9dfaaaa8932c9e8525bb and f114175b for a new connection. 2025/04/30 08:47:18 server <- Reading packet 1 (1200 bytes) for connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d62f069f618bc48e026b9dfaaaa8932c9e8525bb, SrcConnectionID: 441737c112b1182b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 441737c112b1182b, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 550b3933. 2025/04/30 08:47:18 Adding connection ID 0e9c3490. 2025/04/30 08:47:18 Adding connection ID 941aa410. 2025/04/30 08:47:18 Adding connection ID f371bb17. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 441737c112b1182b, SrcConnectionID: f114175b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 380, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 441737c112b1182b, SrcConnectionID: f114175b, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 441737c112b1182b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0e9c3490, StatelessResetToken: 0x5a7a4b054623d9125d367da3c1cb3ce3} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 550b3933, StatelessResetToken: 0x2d3335815dd9eda0ec4b1af882f06c68} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f371bb17, StatelessResetToken: 0xe5eba125f0b018c3dac2a9848a654ce5} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 941aa410, StatelessResetToken: 0xdf3a85551061b75126cf3c14232b625b} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/76343757d25a11b33d160df68b12aec1dfb0da11.sqlog 2025/04/30 08:47:18 server Changing connection ID to 182ff44f. 2025/04/30 08:47:18 Adding connection IDs 76343757d25a11b33d160df68b12aec1dfb0da11 and 182ff44f for a new connection. 2025/04/30 08:47:18 server <- Reading packet 1 (1200 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 76343757d25a11b33d160df68b12aec1dfb0da11, SrcConnectionID: 0096c0b456fc78a3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0096c0b456fc78a3, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 9eb65c2e. 2025/04/30 08:47:18 Adding connection ID 4f752051. 2025/04/30 08:47:18 Adding connection ID 63938bc5. 2025/04/30 08:47:18 Adding connection ID bc6360fa. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 0096c0b456fc78a3, SrcConnectionID: 182ff44f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 376, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 0096c0b456fc78a3, SrcConnectionID: 182ff44f, PacketNumber: 0, PacketNumberLen: 2, Length: 738, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0096c0b456fc78a3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9eb65c2e, StatelessResetToken: 0x883d333880c64a868e5540dafaffe178} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bc6360fa, StatelessResetToken: 0x0f6dc1a03b062d8150ea65bada56c323} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 63938bc5, StatelessResetToken: 0x1da73939f4c6d521e1819e054708b28e} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f752051, StatelessResetToken: 0x093435e296273763e0485233b8ab9118} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/28dcc31725c6f8e5ac4687be705d0a5c754bcbfd.sqlog 2025/04/30 08:47:18 server Changing connection ID to e545a12d. 2025/04/30 08:47:18 Adding connection IDs 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd and e545a12d for a new connection. 2025/04/30 08:47:18 server <- Reading packet 1 (1200 bytes) for connection 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd, SrcConnectionID: 7ad2dbe8e1d60c3e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7ad2dbe8e1d60c3e, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 3224d13e. 2025/04/30 08:47:18 Adding connection ID 3005628f. 2025/04/30 08:47:18 Adding connection ID a6a57aa4. 2025/04/30 08:47:18 Adding connection ID e47b7dde. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 7ad2dbe8e1d60c3e, SrcConnectionID: e545a12d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 374, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 7ad2dbe8e1d60c3e, SrcConnectionID: e545a12d, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 7ad2dbe8e1d60c3e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a6a57aa4, StatelessResetToken: 0x135041cf77b5da88aa36c7f79ba87b7c} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: e47b7dde, StatelessResetToken: 0xa0a9b62afed51f5bbccc6132171fd5f0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3005628f, StatelessResetToken: 0xeb725e97a96a3959211cd97606601bd7} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3224d13e, StatelessResetToken: 0x585b76f12f38bf51bd713a1f4ecf0472} 2025/04/30 08:47:18 server <- Reading packet 2 (1200 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 43352d89fac45a686e7b8d8eabdb0e2c19551927, SrcConnectionID: d697d79fc80d4e3e, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d697d79fc80d4e3e, SrcConnectionID: 61c52980, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 2 (1200 bytes) for connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d62f069f618bc48e026b9dfaaaa8932c9e8525bb, SrcConnectionID: 441737c112b1182b, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 441737c112b1182b, SrcConnectionID: f114175b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 2 (1200 bytes) for connection 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd, SrcConnectionID: 7ad2dbe8e1d60c3e, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 7ad2dbe8e1d60c3e, SrcConnectionID: e545a12d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/aaef47c08c1d8816b4ee6443adf964e5c5cd3a93.sqlog 2025/04/30 08:47:18 server Changing connection ID to 619c4a08. 2025/04/30 08:47:18 Adding connection IDs aaef47c08c1d8816b4ee6443adf964e5c5cd3a93 and 619c4a08 for a new connection. 2025/04/30 08:47:18 server <- Reading packet 1 (1200 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, SrcConnectionID: 49289a687d038052, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 49289a687d038052, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 7b48cd42. 2025/04/30 08:47:18 Adding connection ID 7d87a711. 2025/04/30 08:47:18 Adding connection ID 8756a586. 2025/04/30 08:47:18 Adding connection ID 81b8be28. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 49289a687d038052, SrcConnectionID: 619c4a08, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 380, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 49289a687d038052, SrcConnectionID: 619c4a08, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 49289a687d038052, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 81b8be28, StatelessResetToken: 0xde468998fab29713205fc3a1fa910dde} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d87a711, StatelessResetToken: 0xfc502ba0741bc87ebc742a0a5bf54231} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b48cd42, StatelessResetToken: 0xe83c7610a67a4ef3c5ac3eb7fe3e6c03} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8756a586, StatelessResetToken: 0xc635858ea75bc68fd68709dcdb76a7f7} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/56c584c98fc991d7b87083eb794dc848a0d60e9e.sqlog 2025/04/30 08:47:18 server Changing connection ID to b0fe6155. 2025/04/30 08:47:18 Adding connection IDs 56c584c98fc991d7b87083eb794dc848a0d60e9e and b0fe6155 for a new connection. 2025/04/30 08:47:18 server <- Reading packet 1 (1200 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 56c584c98fc991d7b87083eb794dc848a0d60e9e, SrcConnectionID: 3614c4c165c04b50, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 3614c4c165c04b50, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID f41609d7. 2025/04/30 08:47:18 Adding connection ID 3260094f. 2025/04/30 08:47:18 Adding connection ID 8802608c. 2025/04/30 08:47:18 Adding connection ID 2cdfeddf. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 3614c4c165c04b50, SrcConnectionID: b0fe6155, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 368, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 3614c4c165c04b50, SrcConnectionID: b0fe6155, PacketNumber: 0, PacketNumberLen: 2, Length: 746, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 3614c4c165c04b50, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3260094f, StatelessResetToken: 0xc7bc7eda579d012982f5464d7cfe4b8a} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2cdfeddf, StatelessResetToken: 0x76e2356feedb95eeedac6a6c49ddc57e} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f41609d7, StatelessResetToken: 0x3f3160937f7c1aadba2e2073bc042907} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8802608c, StatelessResetToken: 0xa2043ddc5d467c35aee595f8c5c9011c} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/be52bed8febad4d092c40a485d678500a360ab0e.sqlog 2025/04/30 08:47:18 server Changing connection ID to dccdfe1f. 2025/04/30 08:47:18 Adding connection IDs be52bed8febad4d092c40a485d678500a360ab0e and dccdfe1f for a new connection. 2025/04/30 08:47:18 server <- Reading packet 1 (1200 bytes) for connection be52bed8febad4d092c40a485d678500a360ab0e, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: be52bed8febad4d092c40a485d678500a360ab0e, SrcConnectionID: 907fb95463742cab, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 907fb95463742cab, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 733ab39b. 2025/04/30 08:47:18 Adding connection ID 5be5858b. 2025/04/30 08:47:18 Adding connection ID ee80133d. 2025/04/30 08:47:18 Adding connection ID da1d6f60. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection be52bed8febad4d092c40a485d678500a360ab0e 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 907fb95463742cab, SrcConnectionID: dccdfe1f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 381, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 907fb95463742cab, SrcConnectionID: dccdfe1f, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 907fb95463742cab, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: da1d6f60, StatelessResetToken: 0x02d9de72bab402b954a6b7970fbcdc82} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 733ab39b, StatelessResetToken: 0xdd3a55aa40f161c8a0e7d487ed024049} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee80133d, StatelessResetToken: 0x8621a69fe6dfb74be15c0f254d2b9e27} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5be5858b, StatelessResetToken: 0x22601e31b1137825719a40152a8ecb8a} 2025/04/30 08:47:18 server <- Reading packet 2 (1200 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 56c584c98fc991d7b87083eb794dc848a0d60e9e, SrcConnectionID: 3614c4c165c04b50, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 3614c4c165c04b50, SrcConnectionID: b0fe6155, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 2 (1200 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, SrcConnectionID: 49289a687d038052, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 49289a687d038052, SrcConnectionID: 619c4a08, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 4 (106 bytes) for connection 3464739d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 3464739d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1fcb97a688eac337, StatelessResetToken: 0x6db5319a2845b03b604d3ff4eab082ee} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ca02a6121c7ad6f4, StatelessResetToken: 0xd0b8870489e4788a51da51330295db14} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a8f8082d43f921fc, StatelessResetToken: 0x14e10c68fbd6b63dabd0bd7cf842734b} 2025/04/30 08:47:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:18 server -> Sending packet 7 (41 bytes) for connection f5c02efb89d7759854e5c0ff1e192769804c3188, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: a8f8082d43f921fc, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 94.677µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 3 (44 bytes) for connection 2002d3dc, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 2002d3dc, SrcConnectionID: 1841179219dac4ee, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 432µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.122121ms (σ: 16.56106ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection 2002d3dc, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 2002d3dc, SrcConnectionID: 1841179219dac4ee, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 432µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.122ms (σ: 12.42ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 6f0677b21ad653a9ffcd00e35b249672cb7af0e9 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 2002d3dc, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2002d3dc, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 1 (267 bytes) for connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 1841179219dac4ee, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 398.075µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xad963199a4da82600719ff57623e66b69b5c22b5d5e2cd4bf1e20c680affb41b71baa9e2a39823521f2ec1e8824dd1b0b00141c975bc994043f245b577dcdde26b7685df2cd64b71d29202d7980da366edb4434cc67c} 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection 2002d3dc, 1-RTT 2025/04/30 08:47:18 Received request: GET /obazsaykye 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2002d3dc, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0cbeb1aadf7cd9e5, StatelessResetToken: 0x4fd7b4f21bfa28bf61caaf5d504c8b13} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0b7a94156ea00e9f, StatelessResetToken: 0x0be1790fc652702b127f59ad89a25ea1} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d40293ac89135ed8, StatelessResetToken: 0x0e4e7bf1c2319d554a157c74c4b53fdc} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server -> Sending packet 2 (1063 bytes) for connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0cbeb1aadf7cd9e5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 466.273µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 3 (44 bytes) for connection dc9a4c27, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: dc9a4c27, SrcConnectionID: 8df81a7b38c3a547, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.785873ms (σ: 16.392936ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection dc9a4c27, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: dc9a4c27, SrcConnectionID: 8df81a7b38c3a547, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.785ms (σ: 12.294ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID ea295db2678a6867fafcf23237c262b1219820c9 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection ea295db2678a6867fafcf23237c262b1219820c9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8df81a7b38c3a547, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xf40eb53219966310cddb1d9955d8f930e52fae16b7e5651e051b8bc1f7da8631f8142b31343739988a7aea7ad364f8dad8bc03fbb1343f04c6379e1994cc5c3e602cbd5924061dce77f59b92a5dbb18e045c5f2cdded} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection dc9a4c27, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: dc9a4c27, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8734d55f07c94e8b, StatelessResetToken: 0xccac5fa281cec532289081e1c3555f52} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cbd008280e21cbe3, StatelessResetToken: 0xa919c39c77115d529817f098799574f8} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 18a12d44c72308b7, StatelessResetToken: 0x2947738a3b4dbf98ee237706c48ef90f} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 2 (37 bytes) for connection ea295db2678a6867fafcf23237c262b1219820c9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8734d55f07c94e8b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 139.268µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:18 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 3 (44 bytes) for connection d2b38c8c, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d2b38c8c, SrcConnectionID: 3c22598dd5d657af, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 336µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.046179ms (σ: 16.523089ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection d2b38c8c, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: d2b38c8c, SrcConnectionID: 3c22598dd5d657af, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 336µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.046ms (σ: 12.392ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 965b418001180a1245e873a4e1bb31bc1ccd464b in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection 965b418001180a1245e873a4e1bb31bc1ccd464b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 3c22598dd5d657af, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xbf6cbdb9a28f4629e24055087ac23cd7bd83e993f1d4f6acd6cdcdfead328d96fef36f691bb0d5377305b3488fbcc3acd500082f9cbef219a6589d6cd29b84fa61cb3641fb25424ca6d35a02cda75452a682f1481ebf} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection d2b38c8c, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: d2b38c8c, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 00bd478fb692be8d, StatelessResetToken: 0x47584a8af47996dede2d2224285463f7} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7e464a8d34443387, StatelessResetToken: 0x67bfd8510590d7f3b58fea7de497681a} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b5f21dc53dddc6d2, StatelessResetToken: 0x3eabcfd98792f66f1a2855993dc95cef} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 2 (37 bytes) for connection 965b418001180a1245e873a4e1bb31bc1ccd464b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 00bd478fb692be8d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 201.527µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:18 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:18 server <- Reading packet 6 (32 bytes) for connection 3464739d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 3464739d, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 0}}, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [6] 2025/04/30 08:47:18 server updated RTT: 31.733ms (σ: 11.939ms) 2025/04/30 08:47:18 server setting loss timer for packet 5 (1-RTT) to 35.699625ms (in 2025-04-30 08:47:18.311770568 +0000 UTC m=+4.360633223) 2025/04/30 08:47:18 server -> Sending packet 8 (30 bytes) for connection f5c02efb89d7759854e5c0ff1e192769804c3188, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: a8f8082d43f921fc, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 08:47:18.311770568 +0000 UTC m=+4.360633223 2025/04/30 08:47:18 server lost packet 5 (time threshold) 2025/04/30 08:47:18 server -> Sending packet 9 (256 bytes) for connection f5c02efb89d7759854e5c0ff1e192769804c3188, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: a8f8082d43f921fc, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xf4cb850f65861caa50f77cff7f399bc70832ab5d3d321e1a9b5dee6a3e1a5b8b4e80590b840bf67605a2d28b7b9c754e819f579e6b2e3f25151f033fcd20975b79f31c6a487d06fcf391a1d60e52c61ed0f97f7996cb} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 3 (44 bytes) for connection e545a12d, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: e545a12d, SrcConnectionID: 7ad2dbe8e1d60c3e, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.794684ms (σ: 16.897342ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection e545a12d, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: e545a12d, SrcConnectionID: 7ad2dbe8e1d60c3e, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.794ms (σ: 12.672ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 7ad2dbe8e1d60c3e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x11b9025357563fbdc36d8148c3d9ec4f297d5e8aaf568ce7eea8d0f849c2491818ed6c2e91d4a3be64902eed5914ae62a39f701c1de340500e24bbd53e67f86f888d23d65f30c13082fc8143c349de817547808ef662} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection e545a12d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e545a12d, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2786ea75c4b51617, StatelessResetToken: 0x4886dfc642b5c0de6830014b5989d98e} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 342a690b0d5a718c, StatelessResetToken: 0xb59afb6b1bd1c163f597dd1f46749ef7} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 7f7e1097ef9cb110, StatelessResetToken: 0x3691a1539bf6faf35954353e31a8405b} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 2 (37 bytes) for connection 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2786ea75c4b51617, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 135.144µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:18 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:18 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 3 (44 bytes) for connection dccdfe1f, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: dccdfe1f, SrcConnectionID: 907fb95463742cab, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.815237ms (σ: 16.407618ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection dccdfe1f, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: dccdfe1f, SrcConnectionID: 907fb95463742cab, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.815ms (σ: 12.305ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID be52bed8febad4d092c40a485d678500a360ab0e in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection be52bed8febad4d092c40a485d678500a360ab0e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 907fb95463742cab, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xf192429f531a5add633da0361abd51c6aef4bf022397cb2668e331901d3fe83a6a4157249fe87a2c57874996054b5416b1a1e4f4b0caff7d8278156bf519e49dcc2a9f51d4d8da0aaf9cbc859d80424b812b49dd283d} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection dccdfe1f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: dccdfe1f, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection dccdfe1f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: dccdfe1f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8d7bbe12421519d3, StatelessResetToken: 0xd791549974452a1f3807926e36afd6a4} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 15373da40955d66d, StatelessResetToken: 0x56a6d7d7248f338ec73e8fe1cb3dd7bd} 2025/04/30 08:47:18 Received request: GET /deinghbmot 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c36488b900ae0359, StatelessResetToken: 0x5fd25328c40f066de7c08ac2995fb79f} 2025/04/30 08:47:18 server -> Sending packet 2 (1063 bytes) for connection be52bed8febad4d092c40a485d678500a360ab0e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8d7bbe12421519d3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 469.064µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server -> Sending packet 3 (31 bytes) for connection be52bed8febad4d092c40a485d678500a360ab0e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8d7bbe12421519d3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 8 (36 bytes) for connection 3464739d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 3464739d, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 0}}, DelayTime: 12.768ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [495c27c4 3464739d b1bae7aa cd9bd4d3 26854805] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection f5c02efb89d7759854e5c0ff1e192769804c3188 closed. 2025/04/30 08:47:18 server <- Reading packet 4 (106 bytes) for connection b9077bb5, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: b9077bb5, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 300c2c06bd0d405e, StatelessResetToken: 0x2b78d07b5130021840e883dd73f36c4b} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 868f3537b3706378, StatelessResetToken: 0xc3efce3637a1cc2973cdd35dddae34f9} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0fd9194c6d23742b, StatelessResetToken: 0x0545e471b32e5a363dbb8be8d833fe18} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 5 (1366 bytes) for connection 378814dfd105ad8ca1cca2afc939c0f1883bbe5b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0fd9194c6d23742b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 2 (32 bytes) for connection dc9a4c27, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: dc9a4c27, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server -> Sending packet 6 (37 bytes) for connection 378814dfd105ad8ca1cca2afc939c0f1883bbe5b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0fd9194c6d23742b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 219.41µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 48µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 2] 2025/04/30 08:47:18 server updated RTT: 32.587ms (σ: 9.616ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server setting loss timer for packet 1 (1-RTT) to 36.660375ms (in 2025-04-30 08:47:18.334393075 +0000 UTC m=+4.383255730) 2025/04/30 08:47:18 server Ignoring all packets below 2. 2025/04/30 08:47:18 server <- Reading packet 3 (50 bytes) for connection dc9a4c27, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: dc9a4c27, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: ef39181238fecbb4, StatelessResetToken: 0x77d15fe4e3a57d7b68bfe715952e7408} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection d2b38c8c, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: d2b38c8c, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 1] 2025/04/30 08:47:18 server updated RTT: 32.774ms (σ: 9.837ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server <- Reading packet 3 (50 bytes) for connection d2b38c8c, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: d2b38c8c, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a3b1698ead80073c, StatelessResetToken: 0xa5352c90c3de0bef8c02c93cce979975} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 08:47:18.334393075 +0000 UTC m=+4.383255730 2025/04/30 08:47:18 server lost packet 1 (time threshold) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server -> Sending packet 3 (268 bytes) for connection ea295db2678a6867fafcf23237c262b1219820c9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8734d55f07c94e8b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 6.050268ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xf40eb53219966310cddb1d9955d8f930e52fae16b7e5651e051b8bc1f7da8631f8142b31343739988a7aea7ad364f8dad8bc03fbb1343f04c6379e1994cc5c3e602cbd5924061dce77f59b92a5dbb18e045c5f2cdded} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server <- Reading packet 4 (42 bytes) for connection dc9a4c27, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: dc9a4c27, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 Received request: GET /wjwgticact 2025/04/30 08:47:18 server -> Sending packet 4 (1061 bytes) for connection ea295db2678a6867fafcf23237c262b1219820c9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8734d55f07c94e8b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 213.061µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection e545a12d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e545a12d, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 72µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (3): [0 1 2] 2025/04/30 08:47:18 server updated RTT: 33.445ms (σ: 10.201ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server Ignoring all packets below 2. 2025/04/30 08:47:18 server <- Reading packet 4 (42 bytes) for connection d2b38c8c, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: d2b38c8c, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 08:47:18 server -> Sending packet 3 (35 bytes) for connection 965b418001180a1245e873a4e1bb31bc1ccd464b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 00bd478fb692be8d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 82.826µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 Received request: GET /pgbhakjmba 2025/04/30 08:47:18 server -> Sending packet 4 (1053 bytes) for connection 965b418001180a1245e873a4e1bb31bc1ccd464b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 00bd478fb692be8d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection dccdfe1f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: dccdfe1f, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 1] 2025/04/30 08:47:18 server updated RTT: 32.57ms (σ: 9.717ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server <- Reading packet 5 (31 bytes) for connection d2b38c8c, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: d2b38c8c, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 26.048ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [2] 2025/04/30 08:47:18 server updated RTT: 32.67ms (σ: 7.584ms) 2025/04/30 08:47:18 server Ignoring all packets below 2. 2025/04/30 08:47:18 server <- Reading packet 6 (50 bytes) for connection b9077bb5, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: b9077bb5, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 32µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [5 6] 2025/04/30 08:47:18 server updated RTT: 34.755ms (σ: 7.967ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:18 server Ignoring all packets below 5. 2025/04/30 08:47:18 server -> Sending packet 7 (35 bytes) for connection 378814dfd105ad8ca1cca2afc939c0f1883bbe5b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0fd9194c6d23742b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 127.87µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 Received request: GET /pbjpxlonba 2025/04/30 08:47:18 server <- Reading packet 7 (50 bytes) for connection b9077bb5, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: b9077bb5, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4a95ac4d495c18e0, StatelessResetToken: 0x05a0d0966730a41eaef49840b4945f15} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server -> Sending packet 8 (1061 bytes) for connection 378814dfd105ad8ca1cca2afc939c0f1883bbe5b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0fd9194c6d23742b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 299.862µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 4 (42 bytes) for connection e545a12d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e545a12d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:18 server -> Sending packet 3 (37 bytes) for connection 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2786ea75c4b51617, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 77.405µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 Received request: GET /tswcurjuwg 2025/04/30 08:47:18 server -> Sending packet 4 (1053 bytes) for connection 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2786ea75c4b51617, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 5 (30 bytes) for connection dc9a4c27, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: dc9a4c27, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 56µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [3 4] 2025/04/30 08:47:18 server updated RTT: 32.439ms (σ: 7.506ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server Ignoring all packets below 5. 2025/04/30 08:47:18 server -> Sending packet 5 (30 bytes) for connection ea295db2678a6867fafcf23237c262b1219820c9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8734d55f07c94e8b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server <- Reading packet 6 (33 bytes) for connection dc9a4c27, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: dc9a4c27, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 208µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [dc9a4c27 bad56f1b 11b3487d 2e97015b cc12d488] with a closed connection. 2025/04/30 08:47:18 server Connection ea295db2678a6867fafcf23237c262b1219820c9 closed. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server <- Reading packet 6 (33 bytes) for connection d2b38c8c, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: d2b38c8c, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 128µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [4] 2025/04/30 08:47:18 server updated RTT: 32.507ms (σ: 6.013ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [d2b38c8c 1188e3cd 4d137b6b a39867b6 9b150454] with a closed connection. 2025/04/30 08:47:18 server Connection 965b418001180a1245e873a4e1bb31bc1ccd464b closed. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server <- Reading packet 9 (33 bytes) for connection b9077bb5, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: b9077bb5, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 128µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [8] 2025/04/30 08:47:18 server updated RTT: 34.353ms (σ: 6.778ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [9ce6c9c5 67f78247 a650d647 e64181a7 b9077bb5] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 378814dfd105ad8ca1cca2afc939c0f1883bbe5b closed. 2025/04/30 08:47:18 server <- Reading packet 7 (26 bytes) for connection e4ee6a80, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e4ee6a80, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.PingFrame{} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server -> Sending packet 7 (1366 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: cc86b6dc0840ab6f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 5 (50 bytes) for connection e545a12d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e545a12d, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 85393363eb99cc6a, StatelessResetToken: 0xcb12268d01a5b9196e6be828ab3fdb91} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server <- Reading packet 6 (33 bytes) for connection e545a12d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e545a12d, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 104µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [4] 2025/04/30 08:47:18 server updated RTT: 33.194ms (σ: 8.152ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [e47b7dde e545a12d 3224d13e 3005628f a6a57aa4] with a closed connection. 2025/04/30 08:47:18 server Connection 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd closed. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 4 (123 bytes) for connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0cbeb1aadf7cd9e5, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ab6ae2bb, StatelessResetToken: 0xf65ef058642d35490343e204289f0cf3} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 29334ab7, StatelessResetToken: 0x6ae20057af4f6c9046d2f514ee6f9520} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8490bff6, StatelessResetToken: 0x9f68993e6be0567563142f3f22204edc} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 10fad7a8, StatelessResetToken: 0xe4b189f6ee6ea5246ea678769673ec8f} 2025/04/30 08:47:18 server Skipping packet number 3 2025/04/30 08:47:18 server -> Sending packet 5 (259 bytes) for connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0cbeb1aadf7cd9e5, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xad963199a4da82600719ff57623e66b69b5c22b5d5e2cd4bf1e20c680affb41b71baa9e2a39823521f2ec1e8824dd1b0b00141c975bc994043f245b577dcdde26b7685df2cd64b71d29202d7980da366edb4434cc67c} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 5 (1055 bytes) for connection be52bed8febad4d092c40a485d678500a360ab0e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8d7bbe12421519d3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Skipping packet number 4 2025/04/30 08:47:18 server -> Sending packet 6 (31 bytes) for connection be52bed8febad4d092c40a485d678500a360ab0e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8d7bbe12421519d3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 08:47:18 server Sending ACK because the ACK timer expired. 2025/04/30 08:47:18 server -> Sending packet 8 (38 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: cc86b6dc0840ab6f, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 25.587568ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 5 (35 bytes) for connection dccdfe1f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: dccdfe1f, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 312µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [5 6] 2025/04/30 08:47:18 server updated RTT: 32.476ms (σ: 7.475ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [dccdfe1f 733ab39b 5be5858b ee80133d da1d6f60] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection be52bed8febad4d092c40a485d678500a360ab0e closed. 2025/04/30 08:47:18 server <- Reading packet 9 (35 bytes) for connection e4ee6a80, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e4ee6a80, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 26.416ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [7] 2025/04/30 08:47:18 server updated RTT: 39.913ms (σ: 16.752ms) 2025/04/30 08:47:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 1 (1280 bytes) for connection 11d6a67a6d19a2798e062289be7c7c6feebd64e2, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: ba22d385ad896c4e, SrcConnectionID: 28b04c6d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server -> Sending packet 2 (1280 bytes) for connection 11d6a67a6d19a2798e062289be7c7c6feebd64e2, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: ba22d385ad896c4e, SrcConnectionID: 28b04c6d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (1280 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: c2e00f0b8f8898e8, SrcConnectionID: 2e05c16a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server -> Sending packet 3 (1280 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: c2e00f0b8f8898e8, SrcConnectionID: 2e05c16a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 1 (1280 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: f60a0f2837485d7e, SrcConnectionID: 8eb9e69f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server -> Sending packet 2 (1280 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: f60a0f2837485d7e, SrcConnectionID: 8eb9e69f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 1 (1280 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 74b506831f27e638, SrcConnectionID: 22b7565c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server -> Sending packet 2 (1280 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 74b506831f27e638, SrcConnectionID: 22b7565c, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:47:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (1280 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d697d79fc80d4e3e, SrcConnectionID: 61c52980, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server -> Sending packet 3 (1280 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d697d79fc80d4e3e, SrcConnectionID: 61c52980, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (1280 bytes) for connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 441737c112b1182b, SrcConnectionID: f114175b, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server -> Sending packet 3 (1280 bytes) for connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 441737c112b1182b, SrcConnectionID: f114175b, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 1 (1280 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 0096c0b456fc78a3, SrcConnectionID: 182ff44f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server -> Sending packet 2 (1280 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 0096c0b456fc78a3, SrcConnectionID: 182ff44f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (1280 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 49289a687d038052, SrcConnectionID: 619c4a08, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server -> Sending packet 3 (1280 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 49289a687d038052, SrcConnectionID: 619c4a08, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (1280 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 3614c4c165c04b50, SrcConnectionID: b0fe6155, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server -> Sending packet 3 (1280 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 3614c4c165c04b50, SrcConnectionID: b0fe6155, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection 2e05c16a, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 2e05c16a, SrcConnectionID: c2e00f0b8f8898e8, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 200µs} 2025/04/30 08:47:18 server <- Reading packet 4 (1200 bytes) for connection 2e05c16a, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 2e05c16a, SrcConnectionID: c2e00f0b8f8898e8, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 40µs} 2025/04/30 08:47:18 server newly acked packets (1): [3] 2025/04/30 08:47:18 server updated RTT: 33.829496ms (σ: 16.914748ms) 2025/04/30 08:47:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 1 (758 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: c2e00f0b8f8898e8, SrcConnectionID: 2e05c16a, PacketNumber: 1, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:18 server -> Sending packet 2 (758 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: c2e00f0b8f8898e8, SrcConnectionID: 2e05c16a, PacketNumber: 2, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection f114175b, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: f114175b, SrcConnectionID: 441737c112b1182b, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 152µs} 2025/04/30 08:47:18 server newly acked packets (1): [3] 2025/04/30 08:47:18 server updated RTT: 36.114764ms (σ: 18.057382ms) 2025/04/30 08:47:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 1 (755 bytes) for connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 441737c112b1182b, SrcConnectionID: f114175b, PacketNumber: 1, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 08:47:18 server -> Sending packet 2 (755 bytes) for connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 441737c112b1182b, SrcConnectionID: f114175b, PacketNumber: 2, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 08:47:18 server <- Reading packet 1 (77 bytes) for connection 28b04c6d, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 28b04c6d, SrcConnectionID: ba22d385ad896c4e, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 11d6a67a6d19a2798e062289be7c7c6feebd64e2 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (352 bytes) for connection 11d6a67a6d19a2798e062289be7c7c6feebd64e2, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: ba22d385ad896c4e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5c4e64c, StatelessResetToken: 0x5f20255288807fcb114bc928e54fcfa2} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4c773218, StatelessResetToken: 0x3abaf94571643f69714db002a69f56be} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2c22109b, StatelessResetToken: 0x48a08df2f8022256c271c118550b5345} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3d178c06, StatelessResetToken: 0xe7feffadf2372800eed6a98ee013b9a8} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x9cd9878fdf6e2aacac200f29aa7525d59e3a25ae16025a7ab2283c53ca98c606d485c182bfcd253be88530ef936c8e6e9a224bb78eaefbe949c0fa607b0756faa6c2e1db42ef67238aeb9c182792fbf31b2b4f2a3917} 2025/04/30 08:47:18 server -> Sending packet 3 (352 bytes) for connection 11d6a67a6d19a2798e062289be7c7c6feebd64e2, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: ba22d385ad896c4e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3d178c06, StatelessResetToken: 0xe7feffadf2372800eed6a98ee013b9a8} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x9cd9878fdf6e2aacac200f29aa7525d59e3a25ae16025a7ab2283c53ca98c606d485c182bfcd253be88530ef936c8e6e9a224bb78eaefbe949c0fa607b0756faa6c2e1db42ef67238aeb9c182792fbf31b2b4f2a3917} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4c773218, StatelessResetToken: 0x3abaf94571643f69714db002a69f56be} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5c4e64c, StatelessResetToken: 0x5f20255288807fcb114bc928e54fcfa2} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2c22109b, StatelessResetToken: 0x48a08df2f8022256c271c118550b5345} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> Sending packet 4 (1366 bytes) for connection 11d6a67a6d19a2798e062289be7c7c6feebd64e2, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: ba22d385ad896c4e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 28b04c6d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 28b04c6d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection 28b04c6d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 28b04c6d, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a637f83ecf74ea16, StatelessResetToken: 0x5ebf9a040b7747077a582aedf3dc8ec9} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 771c2da412c6a22b, StatelessResetToken: 0xe5155c2f6ff285aa4f749e7bcc8d9380} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5592e79b737a902d, StatelessResetToken: 0x823ddbdc21165cdef8cbcd37658e21ca} 2025/04/30 08:47:18 server -> Sending packet 5 (40 bytes) for connection 11d6a67a6d19a2798e062289be7c7c6feebd64e2, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: a637f83ecf74ea16, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 224.258788ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 Received request: GET /ufycwlgupw 2025/04/30 08:47:18 server -> Sending packet 6 (1053 bytes) for connection 11d6a67a6d19a2798e062289be7c7c6feebd64e2, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: a637f83ecf74ea16, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:18 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:18 server <- Reading packet 0 (82 bytes) for connection f114175b, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: f114175b, SrcConnectionID: 441737c112b1182b, PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 200µs} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID d62f069f618bc48e026b9dfaaaa8932c9e8525bb in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection f114175b, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: f114175b, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection f114175b, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: f114175b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 Received request: GET /nebrduonxm 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e8713d73c05807da, StatelessResetToken: 0x6a10a781a90206a31e824ab20e350f9f} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 42e2c69ccb4b0367, StatelessResetToken: 0x23a60d05b0df782a9f04a0aa6d0a1fb6} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b1d967a04c5ce7bd, StatelessResetToken: 0x6e7fd74138bc1ff0e58567093b58a249} 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (1280 bytes) for connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e8713d73c05807da, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 451.736µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0e9c3490, StatelessResetToken: 0x5a7a4b054623d9125d367da3c1cb3ce3} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x04dd76e7103ae389463950bf100de230d47d535f9f58454b6835148a56e219459ddc9864066dec4b6d4f1fbf978a9ff4d71838349b9d303f613cdaebae6776bbf989174098a9ef74c2d0c8a5de205dcab77cfa8ede50} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f371bb17, StatelessResetToken: 0xe5eba125f0b018c3dac2a9848a654ce5} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 550b3933, StatelessResetToken: 0x2d3335815dd9eda0ec4b1af882f06c68} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 941aa410, StatelessResetToken: 0xdf3a85551061b75126cf3c14232b625b} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 913, Offset + Data length: 913} 2025/04/30 08:47:18 server -> Sending packet 3 (1272 bytes) for connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e8713d73c05807da, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 550b3933, StatelessResetToken: 0x2d3335815dd9eda0ec4b1af882f06c68} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f371bb17, StatelessResetToken: 0xe5eba125f0b018c3dac2a9848a654ce5} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0e9c3490, StatelessResetToken: 0x5a7a4b054623d9125d367da3c1cb3ce3} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x04dd76e7103ae389463950bf100de230d47d535f9f58454b6835148a56e219459ddc9864066dec4b6d4f1fbf978a9ff4d71838349b9d303f613cdaebae6776bbf989174098a9ef74c2d0c8a5de205dcab77cfa8ede50} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 941aa410, StatelessResetToken: 0xdf3a85551061b75126cf3c14232b625b} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 913, Offset + Data length: 913} 2025/04/30 08:47:18 server -> Sending packet 4 (142 bytes) for connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e8713d73c05807da, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 913, Data length: 111, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 2 (32 bytes) for connection 28b04c6d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 28b04c6d, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 72µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 3 (34 bytes) for connection 28b04c6d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 28b04c6d, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 48µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [4] 2025/04/30 08:47:18 server updated RTT: 32.38299ms (σ: 16.191495ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server setting loss timer for packet 3 (1-RTT) to 36.430863ms (in 2025-04-30 08:47:18.560239996 +0000 UTC m=+4.609102650) 2025/04/30 08:47:18 server <- Reading packet 4 (36 bytes) for connection 28b04c6d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 28b04c6d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 16µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [6] 2025/04/30 08:47:18 server updated RTT: 32.44ms (σ: 12.259ms) 2025/04/30 08:47:18 server lost packet 3 (reordering threshold) 2025/04/30 08:47:18 server setting loss timer for packet 5 (1-RTT) to 36.952017ms (in 2025-04-30 08:47:18.560972666 +0000 UTC m=+4.609835310) 2025/04/30 08:47:18 server -> Sending packet 7 (355 bytes) for connection 11d6a67a6d19a2798e062289be7c7c6feebd64e2, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: a637f83ecf74ea16, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a5c4e64c, StatelessResetToken: 0x5f20255288807fcb114bc928e54fcfa2} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4c773218, StatelessResetToken: 0x3abaf94571643f69714db002a69f56be} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x9cd9878fdf6e2aacac200f29aa7525d59e3a25ae16025a7ab2283c53ca98c606d485c182bfcd253be88530ef936c8e6e9a224bb78eaefbe949c0fa607b0756faa6c2e1db42ef67238aeb9c182792fbf31b2b4f2a3917} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2c22109b, StatelessResetToken: 0x48a08df2f8022256c271c118550b5345} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 3d178c06, StatelessResetToken: 0xe7feffadf2372800eed6a98ee013b9a8} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server <- Reading packet 5 (39 bytes) for connection 28b04c6d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 28b04c6d, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 168µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [4c773218 3d178c06 28b04c6d 2c22109b a5c4e64c] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 11d6a67a6d19a2798e062289be7c7c6feebd64e2 closed. 2025/04/30 08:47:18 server <- Reading packet 2 (77 bytes) for connection 8eb9e69f, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 8eb9e69f, SrcConnectionID: f60a0f2837485d7e, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 7329227b9d4d748545be0a9b080b58a5eb45daba in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (352 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: f60a0f2837485d7e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e4cff29, StatelessResetToken: 0x1184919153e0312df281ad89fc0ba0a4} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3cbd7faa, StatelessResetToken: 0x4c5ee3ab0aabc3620eae611abdd4bfbb} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x5540aa0dd4bf28b8f9430f081b4490c99fc79355bcf8510080ddf34cc94da95d1d8fdf8e9704b3940aceab143ec889d386f89828bb3893415a1b35d08dda0fc914fbba6d8ffa3acbbe04716aa00a1ec77d2992ba99c7} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec36d4cd, StatelessResetToken: 0xe0002595b6b173994a4054ba7d395881} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 950d0739, StatelessResetToken: 0xb071f3c37fcbd7d8117a324260317f94} 2025/04/30 08:47:18 server -> Sending packet 3 (352 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: f60a0f2837485d7e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e4cff29, StatelessResetToken: 0x1184919153e0312df281ad89fc0ba0a4} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3cbd7faa, StatelessResetToken: 0x4c5ee3ab0aabc3620eae611abdd4bfbb} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 950d0739, StatelessResetToken: 0xb071f3c37fcbd7d8117a324260317f94} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec36d4cd, StatelessResetToken: 0xe0002595b6b173994a4054ba7d395881} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x5540aa0dd4bf28b8f9430f081b4490c99fc79355bcf8510080ddf34cc94da95d1d8fdf8e9704b3940aceab143ec889d386f89828bb3893415a1b35d08dda0fc914fbba6d8ffa3acbbe04716aa00a1ec77d2992ba99c7} 2025/04/30 08:47:18 server -> Sending packet 4 (1366 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: f60a0f2837485d7e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 8eb9e69f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8eb9e69f, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection 8eb9e69f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8eb9e69f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 43d768e07e42e906, StatelessResetToken: 0x64b95f58c84626dec75df0dbc60ea80b} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 08e00061bf75842e, StatelessResetToken: 0x98a46dd1b6e8f847e35a072d311c2231} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9c9c4be35dc1bcae, StatelessResetToken: 0xd6138d93b6f4207ef85df6d169d4b96d} 2025/04/30 08:47:18 server -> Sending packet 5 (40 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 43d768e07e42e906, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 253.252202ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 Received request: GET /kpsxcuxurb 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> Sending packet 6 (1053 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 43d768e07e42e906, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 3 (50 bytes) for connection f114175b, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: f114175b, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 862a22547fe18442, StatelessResetToken: 0x3334d46f3b3311671ee9c0629c8b2732} 2025/04/30 08:47:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:18 server -> Sending packet 5 (37 bytes) for connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e8713d73c05807da, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 106.249µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 2 (32 bytes) for connection 8eb9e69f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8eb9e69f, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 48µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 3 (34 bytes) for connection 8eb9e69f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8eb9e69f, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 48µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [4] 2025/04/30 08:47:18 server updated RTT: 32.376938ms (σ: 16.188469ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server setting loss timer for packet 3 (1-RTT) to 36.424055ms (in 2025-04-30 08:47:18.595112512 +0000 UTC m=+4.643975156) 2025/04/30 08:47:18 server <- Reading packet 4 (50 bytes) for connection 8eb9e69f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8eb9e69f, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5af115922cea2d03, StatelessResetToken: 0x061a9d190d32ae2f83b65b1015191d76} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server <- Reading packet 5 (34 bytes) for connection 8eb9e69f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8eb9e69f, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 16µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [5 6] 2025/04/30 08:47:18 server updated RTT: 32.438ms (σ: 12.266ms) 2025/04/30 08:47:18 server lost packet 3 (reordering threshold) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server Ignoring all packets below 2. 2025/04/30 08:47:18 server -> Sending packet 7 (363 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 43d768e07e42e906, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 90.269µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3cbd7faa, StatelessResetToken: 0x4c5ee3ab0aabc3620eae611abdd4bfbb} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e4cff29, StatelessResetToken: 0x1184919153e0312df281ad89fc0ba0a4} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec36d4cd, StatelessResetToken: 0xe0002595b6b173994a4054ba7d395881} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x5540aa0dd4bf28b8f9430f081b4490c99fc79355bcf8510080ddf34cc94da95d1d8fdf8e9704b3940aceab143ec889d386f89828bb3893415a1b35d08dda0fc914fbba6d8ffa3acbbe04716aa00a1ec77d2992ba99c7} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 950d0739, StatelessResetToken: 0xb071f3c37fcbd7d8117a324260317f94} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server <- Reading packet 2 (77 bytes) for connection 182ff44f, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 182ff44f, SrcConnectionID: 0096c0b456fc78a3, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 76343757d25a11b33d160df68b12aec1dfb0da11 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (352 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0096c0b456fc78a3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bc6360fa, StatelessResetToken: 0x0f6dc1a03b062d8150ea65bada56c323} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9eb65c2e, StatelessResetToken: 0x883d333880c64a868e5540dafaffe178} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 63938bc5, StatelessResetToken: 0x1da73939f4c6d521e1819e054708b28e} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x4ad89bb71412961ff14afd7b046bb9537fb4d9f80b42422c5fc4d5103e975ebae36312fe5450bdf6687845be32126a2fafe7381c090b85ff7b03a23af7bce2d7c88401f25df8e713971bda41b333e8e5d40a496d3ce0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f752051, StatelessResetToken: 0x093435e296273763e0485233b8ab9118} 2025/04/30 08:47:18 server -> Sending packet 3 (352 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0096c0b456fc78a3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: bc6360fa, StatelessResetToken: 0x0f6dc1a03b062d8150ea65bada56c323} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 63938bc5, StatelessResetToken: 0x1da73939f4c6d521e1819e054708b28e} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f752051, StatelessResetToken: 0x093435e296273763e0485233b8ab9118} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9eb65c2e, StatelessResetToken: 0x883d333880c64a868e5540dafaffe178} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x4ad89bb71412961ff14afd7b046bb9537fb4d9f80b42422c5fc4d5103e975ebae36312fe5450bdf6687845be32126a2fafe7381c090b85ff7b03a23af7bce2d7c88401f25df8e713971bda41b333e8e5d40a496d3ce0} 2025/04/30 08:47:18 server -> Sending packet 4 (1366 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0096c0b456fc78a3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection 182ff44f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 182ff44f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 27dd430046360e19, StatelessResetToken: 0x625c94096298d594016a8a3267eadce3} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e979d46a2065b8f2, StatelessResetToken: 0xd4e419f528bd9f14671af3a9507fe7e6} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: cfc6989fd9cea31a, StatelessResetToken: 0x6b927b5f05ae77c7aab5e17fc57ede81} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 5 (40 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 27dd430046360e19, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 291.141351ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server <- Reading packet 6 (34 bytes) for connection f114175b, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: f114175b, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 29.8ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [3 4] 2025/04/30 08:47:18 server updated RTT: 36.321ms (σ: 13.957ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [550b3933 0e9c3490 941aa410 f371bb17 f114175b] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection d62f069f618bc48e026b9dfaaaa8932c9e8525bb closed. 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:47:18 server -> Sending packet 7 (1055 bytes) for connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0cbeb1aadf7cd9e5, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Skipping packet number 6 2025/04/30 08:47:18 server -> Sending packet 8 (123 bytes) for connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0cbeb1aadf7cd9e5, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ab6ae2bb, StatelessResetToken: 0xf65ef058642d35490343e204289f0cf3} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8490bff6, StatelessResetToken: 0x9f68993e6be0567563142f3f22204edc} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 10fad7a8, StatelessResetToken: 0xe4b189f6ee6ea5246ea678769673ec8f} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 29334ab7, StatelessResetToken: 0x6ae20057af4f6c9046d2f514ee6f9520} 2025/04/30 08:47:18 server -> Sending packet 9 (1366 bytes) for connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0cbeb1aadf7cd9e5, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 2 (32 bytes) for connection 182ff44f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 182ff44f, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 3 (32 bytes) for connection 182ff44f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 182ff44f, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 48µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [3 4] 2025/04/30 08:47:18 server updated RTT: 32.424649ms (σ: 16.212324ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server <- Reading packet 1 (77 bytes) for connection 619c4a08, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 619c4a08, SrcConnectionID: 49289a687d038052, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID aaef47c08c1d8816b4ee6443adf964e5c5cd3a93 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (352 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 49289a687d038052, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xe82261818d1552aac80f0c120e8bdc1756f0994cdd823dbd004198c74e572801c072bc87e71cee73f2d82bfe22c12d6c1f3c1300a13c44a5fd2633b970efe3e8195b6e49cf9b8f5426439acee9a13677eb504e95e5f2} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 81b8be28, StatelessResetToken: 0xde468998fab29713205fc3a1fa910dde} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b48cd42, StatelessResetToken: 0xe83c7610a67a4ef3c5ac3eb7fe3e6c03} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8756a586, StatelessResetToken: 0xc635858ea75bc68fd68709dcdb76a7f7} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d87a711, StatelessResetToken: 0xfc502ba0741bc87ebc742a0a5bf54231} 2025/04/30 08:47:18 server -> Sending packet 3 (352 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 49289a687d038052, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d87a711, StatelessResetToken: 0xfc502ba0741bc87ebc742a0a5bf54231} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 81b8be28, StatelessResetToken: 0xde468998fab29713205fc3a1fa910dde} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xe82261818d1552aac80f0c120e8bdc1756f0994cdd823dbd004198c74e572801c072bc87e71cee73f2d82bfe22c12d6c1f3c1300a13c44a5fd2633b970efe3e8195b6e49cf9b8f5426439acee9a13677eb504e95e5f2} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8756a586, StatelessResetToken: 0xc635858ea75bc68fd68709dcdb76a7f7} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b48cd42, StatelessResetToken: 0xe83c7610a67a4ef3c5ac3eb7fe3e6c03} 2025/04/30 08:47:18 server -> Sending packet 4 (1366 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 49289a687d038052, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 619c4a08, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 619c4a08, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection 619c4a08, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 619c4a08, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec07003a1819afc0, StatelessResetToken: 0xa25815f39663f918dad9d1a7ce841fe2} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a21edf5055f642a3, StatelessResetToken: 0x3d107a80b0b7804c8763bc22c0b4be49} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 98cfe40066186939, StatelessResetToken: 0x442526c4e2fe7888bedb9427751849e0} 2025/04/30 08:47:18 server -> Sending packet 5 (40 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: ec07003a1819afc0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 320.935882ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 Received request: GET /pnbzbdrlrb 2025/04/30 08:47:18 server -> Sending packet 6 (1053 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: ec07003a1819afc0, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 1 (77 bytes) for connection b0fe6155, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: b0fe6155, SrcConnectionID: 3614c4c165c04b50, PacketNumber: 1, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 56c584c98fc991d7b87083eb794dc848a0d60e9e in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (352 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 3614c4c165c04b50, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8802608c, StatelessResetToken: 0xa2043ddc5d467c35aee595f8c5c9011c} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x591a2c1c5f150c7bbe096246887438b13734b7fec2b0d8a3f29a4940141154c7fd84f676a9d619814e969f29654a3841b61071516a538bc772e1e3ac70e9573a59a49ba2f14bff910281024aa47296b0bfbbcee82ebf} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3260094f, StatelessResetToken: 0xc7bc7eda579d012982f5464d7cfe4b8a} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2cdfeddf, StatelessResetToken: 0x76e2356feedb95eeedac6a6c49ddc57e} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f41609d7, StatelessResetToken: 0x3f3160937f7c1aadba2e2073bc042907} 2025/04/30 08:47:18 server -> Sending packet 3 (352 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 3614c4c165c04b50, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f41609d7, StatelessResetToken: 0x3f3160937f7c1aadba2e2073bc042907} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x591a2c1c5f150c7bbe096246887438b13734b7fec2b0d8a3f29a4940141154c7fd84f676a9d619814e969f29654a3841b61071516a538bc772e1e3ac70e9573a59a49ba2f14bff910281024aa47296b0bfbbcee82ebf} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2cdfeddf, StatelessResetToken: 0x76e2356feedb95eeedac6a6c49ddc57e} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8802608c, StatelessResetToken: 0xa2043ddc5d467c35aee595f8c5c9011c} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3260094f, StatelessResetToken: 0xc7bc7eda579d012982f5464d7cfe4b8a} 2025/04/30 08:47:18 server -> Sending packet 4 (1366 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 3614c4c165c04b50, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection b0fe6155, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: b0fe6155, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f079ae84ccbda7a7, StatelessResetToken: 0x78ba0a822732c6d29383df4622707830} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3561abccfe4ff979, StatelessResetToken: 0x454757f17cc1e6ba93cfa4eae8ecff70} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fcd5ddba4599f63e, StatelessResetToken: 0x534d1b342ee7a74ef08c37b87d8b0a2e} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 5 (40 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: f079ae84ccbda7a7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 329.727252ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server <- Reading packet 2 (32 bytes) for connection 2002d3dc, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2002d3dc, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 0, Smallest: 0}}, DelayTime: 64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [7] 2025/04/30 08:47:18 server updated RTT: 32.954ms (σ: 9.649ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server lost packet 5 (time threshold) 2025/04/30 08:47:18 server <- Reading packet 3 (50 bytes) for connection 2002d3dc, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2002d3dc, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 26d60e1b01949532, StatelessResetToken: 0x928f6abd245fd60dc8a6389ac3241e71} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server -> Sending packet 10 (270 bytes) for connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 0cbeb1aadf7cd9e5, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 147.466µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xad963199a4da82600719ff57623e66b69b5c22b5d5e2cd4bf1e20c680affb41b71baa9e2a39823521f2ec1e8824dd1b0b00141c975bc994043f245b577dcdde26b7685df2cd64b71d29202d7980da366edb4434cc67c} 2025/04/30 08:47:18 server <- Reading packet 2 (32 bytes) for connection 619c4a08, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 619c4a08, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 3 (34 bytes) for connection 619c4a08, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 619c4a08, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 120µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [4 5] 2025/04/30 08:47:18 server updated RTT: 32.259428ms (σ: 16.129714ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server setting loss timer for packet 3 (1-RTT) to 36.291856ms (in 2025-04-30 08:47:18.674276306 +0000 UTC m=+4.723138960) 2025/04/30 08:47:18 server Ignoring all packets below 2. 2025/04/30 08:47:18 server <- Reading packet 4 (50 bytes) for connection 619c4a08, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 619c4a08, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 220ead7e11b1a184, StatelessResetToken: 0x5b788677c67cef3d8eb22cb72c9cee49} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 08:47:18.674276306 +0000 UTC m=+4.723138960 2025/04/30 08:47:18 server lost packet 3 (time threshold) 2025/04/30 08:47:18 server -> Sending packet 7 (361 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: ec07003a1819afc0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 4.210231ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xe82261818d1552aac80f0c120e8bdc1756f0994cdd823dbd004198c74e572801c072bc87e71cee73f2d82bfe22c12d6c1f3c1300a13c44a5fd2633b970efe3e8195b6e49cf9b8f5426439acee9a13677eb504e95e5f2} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 81b8be28, StatelessResetToken: 0xde468998fab29713205fc3a1fa910dde} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d87a711, StatelessResetToken: 0xfc502ba0741bc87ebc742a0a5bf54231} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b48cd42, StatelessResetToken: 0xe83c7610a67a4ef3c5ac3eb7fe3e6c03} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8756a586, StatelessResetToken: 0xc635858ea75bc68fd68709dcdb76a7f7} 2025/04/30 08:47:18 server <- Reading packet 6 (42 bytes) for connection 182ff44f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 182ff44f, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:18 server -> Sending packet 6 (37 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 27dd430046360e19, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 1}}, DelayTime: 92.453µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:47:18 Received request: GET /cdrvtlwvnt 2025/04/30 08:47:18 server -> Sending packet 1 (764 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: d697d79fc80d4e3e, SrcConnectionID: 61c52980, PacketNumber: 1, PacketNumberLen: 2, Length: 743, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 08:47:18 server -> Sending packet 2 (764 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: d697d79fc80d4e3e, SrcConnectionID: 61c52980, PacketNumber: 2, PacketNumberLen: 2, Length: 743, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 08:47:18 server -> Sending packet 7 (1053 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 27dd430046360e19, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 2 (32 bytes) for connection b0fe6155, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: b0fe6155, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [3] 2025/04/30 08:47:18 server updated RTT: 31.271078ms (σ: 15.635539ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 53 bytes. Remaining: 36 bytes. 2025/04/30 08:47:18 server Dropping %!s(logging.PacketType=1) packet (53 bytes) because we already dropped the keys. 2025/04/30 08:47:18 server <- Reading packet 6 (36 bytes) for connection 2002d3dc, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2002d3dc, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 0, Smallest: 0}}, DelayTime: 31.104ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [8] 2025/04/30 08:47:18 server updated RTT: 33.57ms (σ: 8.468ms) 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [2002d3dc 8490bff6 ab6ae2bb 29334ab7 10fad7a8] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 6f0677b21ad653a9ffcd00e35b249672cb7af0e9 closed. 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 9 (355 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 43d768e07e42e906, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec36d4cd, StatelessResetToken: 0xe0002595b6b173994a4054ba7d395881} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3cbd7faa, StatelessResetToken: 0x4c5ee3ab0aabc3620eae611abdd4bfbb} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e4cff29, StatelessResetToken: 0x1184919153e0312df281ad89fc0ba0a4} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 950d0739, StatelessResetToken: 0xb071f3c37fcbd7d8117a324260317f94} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x5540aa0dd4bf28b8f9430f081b4490c99fc79355bcf8510080ddf34cc94da95d1d8fdf8e9704b3940aceab143ec889d386f89828bb3893415a1b35d08dda0fc914fbba6d8ffa3acbbe04716aa00a1ec77d2992ba99c7} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> Sending packet 10 (355 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 43d768e07e42e906, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e4cff29, StatelessResetToken: 0x1184919153e0312df281ad89fc0ba0a4} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec36d4cd, StatelessResetToken: 0xe0002595b6b173994a4054ba7d395881} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 950d0739, StatelessResetToken: 0xb071f3c37fcbd7d8117a324260317f94} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x5540aa0dd4bf28b8f9430f081b4490c99fc79355bcf8510080ddf34cc94da95d1d8fdf8e9704b3940aceab143ec889d386f89828bb3893415a1b35d08dda0fc914fbba6d8ffa3acbbe04716aa00a1ec77d2992ba99c7} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3cbd7faa, StatelessResetToken: 0x4c5ee3ab0aabc3620eae611abdd4bfbb} 2025/04/30 08:47:18 server <- Reading packet 0 (82 bytes) for connection 61c52980, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 61c52980, SrcConnectionID: d697d79fc80d4e3e, PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 200µs} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 43352d89fac45a686e7b8d8eabdb0e2c19551927 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (352 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: d697d79fc80d4e3e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7675c1b1, StatelessResetToken: 0xcc11254a2bff3acd90caceef9c6ca2f7} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 07743ac3, StatelessResetToken: 0x6949a5265f98b95d95887ebe97654714} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xd9404f4022c7bdadc43b33264e00dfe3673b95ccb55862b5760913b91a1376f2846ad456ffbc8c8e3c5f0e59b4d591aa50d372c6a9d18ae0411c2e41018360eeb69a891dace79b6997313c2bc4766364918715d74b54} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d821da6e, StatelessResetToken: 0xe863d02c5a41b1419695feaae3b336bc} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5a92c65b, StatelessResetToken: 0x3478df7206065b036157bfc702e872f3} 2025/04/30 08:47:18 server -> Sending packet 3 (352 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: d697d79fc80d4e3e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5a92c65b, StatelessResetToken: 0x3478df7206065b036157bfc702e872f3} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d821da6e, StatelessResetToken: 0xe863d02c5a41b1419695feaae3b336bc} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xd9404f4022c7bdadc43b33264e00dfe3673b95ccb55862b5760913b91a1376f2846ad456ffbc8c8e3c5f0e59b4d591aa50d372c6a9d18ae0411c2e41018360eeb69a891dace79b6997313c2bc4766364918715d74b54} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 07743ac3, StatelessResetToken: 0x6949a5265f98b95d95887ebe97654714} 2025/04/30 08:47:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:47:18 server -> Sending packet 3 (758 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: c2e00f0b8f8898e8, SrcConnectionID: 2e05c16a, PacketNumber: 3, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7675c1b1, StatelessResetToken: 0xcc11254a2bff3acd90caceef9c6ca2f7} 2025/04/30 08:47:18 server -> Sending packet 4 (1366 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:18 server -> Sending packet 4 (758 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, Handshake 2025/04/30 08:47:18 server Short Header{DestConnectionID: d697d79fc80d4e3e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: c2e00f0b8f8898e8, SrcConnectionID: 2e05c16a, PacketNumber: 4, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 61c52980, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 61c52980, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection 61c52980, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 61c52980, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7a3f6a4052e79c97, StatelessResetToken: 0x786eabb33b00e54646ccd0c65a64fe44} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6c1a4c648242bb2f, StatelessResetToken: 0x43e3ebbf895c7468aeda87721eb789f7} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1df4fe0136218efa, StatelessResetToken: 0xba17eb3609fb12a35fc91114fab8706f} 2025/04/30 08:47:18 Received request: GET /qrhgfiiucl 2025/04/30 08:47:18 server -> Sending packet 5 (38 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 7a3f6a4052e79c97, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 514.51µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> Sending packet 6 (1053 bytes) for connection 43352d89fac45a686e7b8d8eabdb0e2c19551927, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 7a3f6a4052e79c97, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Dropping %!s(logging.PacketType=1) packet (43 bytes) because we already dropped the keys. 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection 61c52980, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 61c52980, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 72µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [3] 2025/04/30 08:47:18 server updated RTT: 31.545442ms (σ: 15.772721ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server <- Reading packet 1 (43 bytes) for connection 2e05c16a, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 2e05c16a, SrcConnectionID: c2e00f0b8f8898e8, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 16µs} 2025/04/30 08:47:18 server <- Reading packet 2 (43 bytes) for connection 2e05c16a, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 2e05c16a, SrcConnectionID: c2e00f0b8f8898e8, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 16µs} 2025/04/30 08:47:18 server newly acked packets (1): [4] 2025/04/30 08:47:18 server updated RTT: 33.79ms (σ: 12.763ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- Reading packet 4 (35 bytes) for connection 61c52980, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 61c52980, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}}, DelayTime: 184µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [4 6] 2025/04/30 08:47:18 server updated RTT: 31.86ms (σ: 12.459ms) 2025/04/30 08:47:18 server setting loss timer for packet 5 (1-RTT) to 38.325601ms (in 2025-04-30 08:47:18.747433416 +0000 UTC m=+4.796296070) 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [61c52980 7675c1b1 d821da6e 5a92c65b 07743ac3] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 43352d89fac45a686e7b8d8eabdb0e2c19551927 closed. 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 7 (29 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: f079ae84ccbda7a7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> Sending packet 8 (29 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: f079ae84ccbda7a7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 9 (1053 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: ec07003a1819afc0, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Skipping packet number 8 2025/04/30 08:47:18 server -> Sending packet 10 (352 bytes) for connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: ec07003a1819afc0, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 81b8be28, StatelessResetToken: 0xde468998fab29713205fc3a1fa910dde} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8756a586, StatelessResetToken: 0xc635858ea75bc68fd68709dcdb76a7f7} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xe82261818d1552aac80f0c120e8bdc1756f0994cdd823dbd004198c74e572801c072bc87e71cee73f2d82bfe22c12d6c1f3c1300a13c44a5fd2633b970efe3e8195b6e49cf9b8f5426439acee9a13677eb504e95e5f2} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7b48cd42, StatelessResetToken: 0xe83c7610a67a4ef3c5ac3eb7fe3e6c03} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d87a711, StatelessResetToken: 0xfc502ba0741bc87ebc742a0a5bf54231} 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 9 (29 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 27dd430046360e19, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server Skipping packet number 8 2025/04/30 08:47:18 server -> Sending packet 10 (1053 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 27dd430046360e19, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server -> Sending packet 11 (1409 bytes) for connection 76343757d25a11b33d160df68b12aec1dfb0da11, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 27dd430046360e19, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server <- Reading packet 3 (77 bytes) for connection 2e05c16a, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 2e05c16a, SrcConnectionID: c2e00f0b8f8898e8, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:18 server -> Sending packet 2 (355 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: c2e00f0b8f8898e8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x9553eff1c2a4cd16d9e2bec479f3a2faaba9ba92e71a2f3e7adae24509322f39886ca98e5a7c676f2f35680499448547751f9994ae8c348481fd9d9e30ad30e3d59c1e93de7a07bc822ef8e8b37528ce4a12c52631ac} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7f72d2a8, StatelessResetToken: 0xb1e24b8b68c57a7f623914aba787b5df} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f4782141, StatelessResetToken: 0x1b7f02e0528b7c705b9b5ae0d5a6703d} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2d9975c5, StatelessResetToken: 0x60d71e8affb6217e463257df92a81d7c} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2143617d, StatelessResetToken: 0x67bd1068a6a26a7b61c7af3563de690b} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> Sending packet 3 (355 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: c2e00f0b8f8898e8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2143617d, StatelessResetToken: 0x67bd1068a6a26a7b61c7af3563de690b} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2d9975c5, StatelessResetToken: 0x60d71e8affb6217e463257df92a81d7c} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: f4782141, StatelessResetToken: 0x1b7f02e0528b7c705b9b5ae0d5a6703d} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x9553eff1c2a4cd16d9e2bec479f3a2faaba9ba92e71a2f3e7adae24509322f39886ca98e5a7c676f2f35680499448547751f9994ae8c348481fd9d9e30ad30e3d59c1e93de7a07bc822ef8e8b37528ce4a12c52631ac} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7f72d2a8, StatelessResetToken: 0xb1e24b8b68c57a7f623914aba787b5df} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 2e05c16a, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2e05c16a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection 2e05c16a, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2e05c16a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 61deaa55acf0d764, StatelessResetToken: 0x3d8af1616e4ab6fb90c0ba1fa5fe09e7} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1800699a42009cff, StatelessResetToken: 0x8e44238d7af281862c3ff7c3fce9bd5a} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 251b89729aca9c11, StatelessResetToken: 0xdd2fcf865d196cf82c133cfb579008e4} 2025/04/30 08:47:18 Received request: GET /ikkcnkchcy 2025/04/30 08:47:18 server -> Sending packet 4 (40 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 61deaa55acf0d764, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 264.178739ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> Sending packet 5 (1053 bytes) for connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 61deaa55acf0d764, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 7 (40 bytes) for connection 619c4a08, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 619c4a08, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 157.84ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [81b8be28 619c4a08 7b48cd42 7d87a711 8756a586] with a closed connection. 2025/04/30 08:47:18 server Connection aaef47c08c1d8816b4ee6443adf964e5c5cd3a93 closed. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server <- Reading packet 8 (34 bytes) for connection 182ff44f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 182ff44f, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, DelayTime: 121.264ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [182ff44f 9eb65c2e 4f752051 63938bc5 bc6360fa] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 76343757d25a11b33d160df68b12aec1dfb0da11 closed. 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection 2e05c16a, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2e05c16a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [3] 2025/04/30 08:47:18 server updated RTT: 33.492ms (σ: 10.167ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server <- Reading packet 3 (50 bytes) for connection 2e05c16a, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2e05c16a, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0a5ce146b1462669, StatelessResetToken: 0x31c5608f880c219831063835456468a1} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server <- Reading packet 5 (33 bytes) for connection 2e05c16a, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2e05c16a, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 176µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [4 5] 2025/04/30 08:47:18 server updated RTT: 33.272ms (σ: 8.065ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [2d9975c5 f4782141 2143617d 2e05c16a 7f72d2a8] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f closed. 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/3e5bad73dcf94558a795b1ed42db43693fef8292.sqlog 2025/04/30 08:47:18 server Changing connection ID to c62c8fe5. 2025/04/30 08:47:18 Adding connection IDs 3e5bad73dcf94558a795b1ed42db43693fef8292 and c62c8fe5 for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection 3e5bad73dcf94558a795b1ed42db43693fef8292, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 3e5bad73dcf94558a795b1ed42db43693fef8292, SrcConnectionID: e412741d38ddfd84, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, Initial 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e412741d38ddfd84, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d448869dadc1154d4ecfb2fb8f39b922fed6012b, SrcConnectionID: 74b506831f27e638, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 Adding connection ID d9ffee95. 2025/04/30 08:47:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:47:18 Adding connection ID 706f83f3. 2025/04/30 08:47:18 Adding connection ID ee0b2795. 2025/04/30 08:47:18 Adding connection ID 0e274443. 2025/04/30 08:47:18 server -> Sending packet 1 (761 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 74b506831f27e638, SrcConnectionID: 22b7565c, PacketNumber: 1, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3e5bad73dcf94558a795b1ed42db43693fef8292 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: e412741d38ddfd84, SrcConnectionID: c62c8fe5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 373, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server -> Sending packet 2 (761 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: e412741d38ddfd84, SrcConnectionID: c62c8fe5, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 74b506831f27e638, SrcConnectionID: 22b7565c, PacketNumber: 2, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 08:47:18 server -> Sending packet 3 (48 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 74b506831f27e638, SrcConnectionID: 22b7565c, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server Short Header{DestConnectionID: e412741d38ddfd84, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0e274443, StatelessResetToken: 0x25da341afaf79d1585c9fcd0b9e90194} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee0b2795, StatelessResetToken: 0x94e602730da284ffec6c6a91931c3d70} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d9ffee95, StatelessResetToken: 0x10c6d166beb33a7e81649cffca38ff43} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 706f83f3, StatelessResetToken: 0x8eeded8d3f687ef5f3154a0e93d15b56} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/d024fc8a956f09574d4210c81a4bb178d36d30b5.sqlog 2025/04/30 08:47:18 server Changing connection ID to e07bba01. 2025/04/30 08:47:18 Adding connection IDs d024fc8a956f09574d4210c81a4bb178d36d30b5 and e07bba01 for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d024fc8a956f09574d4210c81a4bb178d36d30b5, SrcConnectionID: eaa2baeba887c3fb, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: eaa2baeba887c3fb, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 969f2d64. 2025/04/30 08:47:18 Adding connection ID 4b7a5351. 2025/04/30 08:47:18 Adding connection ID ca0835be. 2025/04/30 08:47:18 Adding connection ID 2b989aac. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: eaa2baeba887c3fb, SrcConnectionID: e07bba01, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 369, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: eaa2baeba887c3fb, SrcConnectionID: e07bba01, PacketNumber: 0, PacketNumberLen: 2, Length: 745, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 08:47:18 server Short Header{DestConnectionID: eaa2baeba887c3fb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2b989aac, StatelessResetToken: 0x4767af131bb816d546151580cd05deaf} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4b7a5351, StatelessResetToken: 0x0915d0a7de0e3ff4431fecccfa401b43} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 969f2d64, StatelessResetToken: 0xe61f17f3c04d13986974f0c118d4117a} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ca0835be, StatelessResetToken: 0x2356b460bc226c5746bcf2f0f7387ce2} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/e423d82739942fe35dc2809a2118f5ad6de58108.sqlog 2025/04/30 08:47:18 server Changing connection ID to eba23fb9. 2025/04/30 08:47:18 Adding connection IDs e423d82739942fe35dc2809a2118f5ad6de58108 and eba23fb9 for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection e423d82739942fe35dc2809a2118f5ad6de58108, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: e423d82739942fe35dc2809a2118f5ad6de58108, SrcConnectionID: 873d878f4038992c, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 873d878f4038992c, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 90783fcf. 2025/04/30 08:47:18 Adding connection ID 4f784d6d. 2025/04/30 08:47:18 Adding connection ID 9820448f. 2025/04/30 08:47:18 Adding connection ID b53360a1. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e423d82739942fe35dc2809a2118f5ad6de58108 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 873d878f4038992c, SrcConnectionID: eba23fb9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 368, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 873d878f4038992c, SrcConnectionID: eba23fb9, PacketNumber: 0, PacketNumberLen: 2, Length: 746, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 873d878f4038992c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9820448f, StatelessResetToken: 0xc8e43a6e20f5a2dcbf1dedecaf4886b1} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4f784d6d, StatelessResetToken: 0xf1d506c2572e1645fa79c0c5591331c9} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b53360a1, StatelessResetToken: 0x55d63f8e07d87d4ad1a46b8bf6f9e870} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 90783fcf, StatelessResetToken: 0x2a0e00bb3bd2cd6415dac0affd3b2133} 2025/04/30 08:47:18 server <- Reading packet 4 (1200 bytes) for connection 3e5bad73dcf94558a795b1ed42db43693fef8292, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 3e5bad73dcf94558a795b1ed42db43693fef8292, SrcConnectionID: e412741d38ddfd84, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection 3e5bad73dcf94558a795b1ed42db43693fef8292, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: e412741d38ddfd84, SrcConnectionID: c62c8fe5, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 4 (1200 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d024fc8a956f09574d4210c81a4bb178d36d30b5, SrcConnectionID: eaa2baeba887c3fb, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: eaa2baeba887c3fb, SrcConnectionID: e07bba01, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/7d24de3bbb90b216154850009985707532a7cb51.sqlog 2025/04/30 08:47:18 server Changing connection ID to 474dd458. 2025/04/30 08:47:18 Adding connection IDs 7d24de3bbb90b216154850009985707532a7cb51 and 474dd458 for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection 7d24de3bbb90b216154850009985707532a7cb51, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 7d24de3bbb90b216154850009985707532a7cb51, SrcConnectionID: da7eeb978e461407, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: da7eeb978e461407, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 41813b54. 2025/04/30 08:47:18 Adding connection ID 3d4d2219. 2025/04/30 08:47:18 Adding connection ID 8c633a44. 2025/04/30 08:47:18 Adding connection ID 7222b7cf. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7d24de3bbb90b216154850009985707532a7cb51 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: da7eeb978e461407, SrcConnectionID: 474dd458, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 375, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: da7eeb978e461407, SrcConnectionID: 474dd458, PacketNumber: 0, PacketNumberLen: 2, Length: 739, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 717, Offset + Data length: 717} 2025/04/30 08:47:18 server Short Header{DestConnectionID: da7eeb978e461407, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8c633a44, StatelessResetToken: 0xad2c072902b49f134b3dc954c14a3b90} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3d4d2219, StatelessResetToken: 0xd9b98b642909d5cf2a980f15f870f7a7} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7222b7cf, StatelessResetToken: 0xc266b809fc4424a097afa452da3f0070} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 41813b54, StatelessResetToken: 0x2fb20f195b46be2fa39853102fd2c027} 2025/04/30 08:47:18 server <- Reading packet 4 (1200 bytes) for connection 7d24de3bbb90b216154850009985707532a7cb51, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 7d24de3bbb90b216154850009985707532a7cb51, SrcConnectionID: da7eeb978e461407, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection 7d24de3bbb90b216154850009985707532a7cb51, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: da7eeb978e461407, SrcConnectionID: 474dd458, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/6d14d69f1d1ecc4bbb932ad5344aca47b39f891b.sqlog 2025/04/30 08:47:18 server Changing connection ID to d2b14b2e. 2025/04/30 08:47:18 Adding connection IDs 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b and d2b14b2e for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, SrcConnectionID: 6152f1adf0aa5d1c, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6152f1adf0aa5d1c, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID c368faa2. 2025/04/30 08:47:18 Adding connection ID e01e0939. 2025/04/30 08:47:18 Adding connection ID c72d1b4d. 2025/04/30 08:47:18 Adding connection ID 874e5f1f. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 6152f1adf0aa5d1c, SrcConnectionID: d2b14b2e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 366, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 6152f1adf0aa5d1c, SrcConnectionID: d2b14b2e, PacketNumber: 0, PacketNumberLen: 2, Length: 748, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 6152f1adf0aa5d1c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c368faa2, StatelessResetToken: 0x31c033cea9409ae5b9d7a74a2cf707cc} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 874e5f1f, StatelessResetToken: 0xfa741b144628c6cb9186f6f71680896c} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e01e0939, StatelessResetToken: 0x92644ca5185e43244a99ece8cbebb749} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c72d1b4d, StatelessResetToken: 0x93e17497ce2493ed918dc61c0e5487bb} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/d5648e9f9f814e4c97ffb027fb8813e58df3b15c.sqlog 2025/04/30 08:47:18 server Changing connection ID to 7f135b70. 2025/04/30 08:47:18 Adding connection IDs d5648e9f9f814e4c97ffb027fb8813e58df3b15c and 7f135b70 for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d5648e9f9f814e4c97ffb027fb8813e58df3b15c, SrcConnectionID: 4e1b6a25fa8eb7c2, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 4e1b6a25fa8eb7c2, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 7342eedc. 2025/04/30 08:47:18 Adding connection ID ea45d12d. 2025/04/30 08:47:18 Adding connection ID 1fb1154c. 2025/04/30 08:47:18 Adding connection ID f244aded. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 367, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 0, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 4e1b6a25fa8eb7c2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7342eedc, StatelessResetToken: 0x224bb76bd9338f1787c7122bef60bafb} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f244aded, StatelessResetToken: 0x7566957fcfd3163582ba578845d506a3} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea45d12d, StatelessResetToken: 0xc9fe186af529d1367bae9a77e2325116} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1fb1154c, StatelessResetToken: 0xd574fb2e63824891534fb4d54d636bb9} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/25ba55ad9bc0cd94397a58bcde17facd2954aaf1.sqlog 2025/04/30 08:47:18 server Changing connection ID to cb305a21. 2025/04/30 08:47:18 Adding connection IDs 25ba55ad9bc0cd94397a58bcde17facd2954aaf1 and cb305a21 for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, SrcConnectionID: 01f506e8a2591a47, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 01f506e8a2591a47, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID d16cbc29. 2025/04/30 08:47:18 Adding connection ID 8b6648b6. 2025/04/30 08:47:18 Adding connection ID 5e7d1f95. 2025/04/30 08:47:18 Adding connection ID 90ef9415. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 01f506e8a2591a47, SrcConnectionID: cb305a21, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 377, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 01f506e8a2591a47, SrcConnectionID: cb305a21, PacketNumber: 0, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 01f506e8a2591a47, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8b6648b6, StatelessResetToken: 0x03d6881ff51787d76139deb924ddea99} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d16cbc29, StatelessResetToken: 0x192d0afafc38ae86c817f0a12bc3654a} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 90ef9415, StatelessResetToken: 0xd7c5913f2a226bb8e9c0cd5d172746c9} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5e7d1f95, StatelessResetToken: 0x711c8aa375448e11edc2db8dd8278325} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/706fcef248206883f6699ac0b0370f0e47c41366.sqlog 2025/04/30 08:47:18 server Changing connection ID to 58c069ec. 2025/04/30 08:47:18 Adding connection IDs 706fcef248206883f6699ac0b0370f0e47c41366 and 58c069ec for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection 706fcef248206883f6699ac0b0370f0e47c41366, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 706fcef248206883f6699ac0b0370f0e47c41366, SrcConnectionID: f08411f7fb9fdf46, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f08411f7fb9fdf46, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 32781442. 2025/04/30 08:47:18 Adding connection ID e887dc3b. 2025/04/30 08:47:18 Adding connection ID e237daa6. 2025/04/30 08:47:18 Adding connection ID 642fb9d2. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 706fcef248206883f6699ac0b0370f0e47c41366 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: f08411f7fb9fdf46, SrcConnectionID: 58c069ec, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 372, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: f08411f7fb9fdf46, SrcConnectionID: 58c069ec, PacketNumber: 0, PacketNumberLen: 2, Length: 742, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 720, Offset + Data length: 720} 2025/04/30 08:47:18 server Short Header{DestConnectionID: f08411f7fb9fdf46, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 642fb9d2, StatelessResetToken: 0x1dccf0f3ab93a23c86612deed9f4539c} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e237daa6, StatelessResetToken: 0xc6c215816b4784428709bdb67f12486d} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e887dc3b, StatelessResetToken: 0xa883d6da66ae4f8184cb02fa53692e3b} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 32781442, StatelessResetToken: 0x553aea9e7c386a054903336d90146899} 2025/04/30 08:47:18 server <- Reading packet 4 (1200 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, SrcConnectionID: 01f506e8a2591a47, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 01f506e8a2591a47, SrcConnectionID: cb305a21, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/34dd4d31004c0ffaaf545d44c24fc42a304f6354.sqlog 2025/04/30 08:47:18 server Changing connection ID to 4d8fc445. 2025/04/30 08:47:18 Adding connection IDs 34dd4d31004c0ffaaf545d44c24fc42a304f6354 and 4d8fc445 for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection 34dd4d31004c0ffaaf545d44c24fc42a304f6354, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 34dd4d31004c0ffaaf545d44c24fc42a304f6354, SrcConnectionID: 2bdd48804348c07f, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 2bdd48804348c07f, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 98068e57. 2025/04/30 08:47:18 Adding connection ID b69a2dac. 2025/04/30 08:47:18 Adding connection ID 143902cf. 2025/04/30 08:47:18 Adding connection ID 313cef81. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 34dd4d31004c0ffaaf545d44c24fc42a304f6354 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 2bdd48804348c07f, SrcConnectionID: 4d8fc445, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 368, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 2bdd48804348c07f, SrcConnectionID: 4d8fc445, PacketNumber: 0, PacketNumberLen: 2, Length: 746, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2bdd48804348c07f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 313cef81, StatelessResetToken: 0x9143766a78bf397926fbd24833abc6fe} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 98068e57, StatelessResetToken: 0x43e5827601a1097fdfab4eaec5df3871} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b69a2dac, StatelessResetToken: 0x931534298240d0dc5f3a47dfbe91ad21} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 143902cf, StatelessResetToken: 0xd42b67e785da27fb3f3d8ae1e27cc597} 2025/04/30 08:47:18 server <- Reading packet 4 (1200 bytes) for connection 34dd4d31004c0ffaaf545d44c24fc42a304f6354, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 34dd4d31004c0ffaaf545d44c24fc42a304f6354, SrcConnectionID: 2bdd48804348c07f, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection 34dd4d31004c0ffaaf545d44c24fc42a304f6354, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 2bdd48804348c07f, SrcConnectionID: 4d8fc445, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/4e1dcb450283083b548d338c8660c1e4d239951e.sqlog 2025/04/30 08:47:18 server Changing connection ID to 784400f0. 2025/04/30 08:47:18 Adding connection IDs 4e1dcb450283083b548d338c8660c1e4d239951e and 784400f0 for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 4e1dcb450283083b548d338c8660c1e4d239951e, SrcConnectionID: a86dd29a373072f5, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a86dd29a373072f5, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID d8979373. 2025/04/30 08:47:18 Adding connection ID 15c52d43. 2025/04/30 08:47:18 Adding connection ID 3d92cd41. 2025/04/30 08:47:18 Adding connection ID 2e67a1ee. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: a86dd29a373072f5, SrcConnectionID: 784400f0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 377, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: a86dd29a373072f5, SrcConnectionID: 784400f0, PacketNumber: 0, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:18 server Short Header{DestConnectionID: a86dd29a373072f5, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2e67a1ee, StatelessResetToken: 0xa8aaec082b5f2cd1f8f967b31a7af158} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8979373, StatelessResetToken: 0xb8d83735bf5e2ba4baff23c26fe6ecd9} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 15c52d43, StatelessResetToken: 0xe99a816e5b67818c755e4190eee492e6} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3d92cd41, StatelessResetToken: 0xdbd4f918c4b8303516063b2ae4e008b9} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/0a28513b024783521009692e08d9b05078a813ef.sqlog 2025/04/30 08:47:18 server Changing connection ID to d90ab82b. 2025/04/30 08:47:18 Adding connection IDs 0a28513b024783521009692e08d9b05078a813ef and d90ab82b for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 0a28513b024783521009692e08d9b05078a813ef, SrcConnectionID: 683123422f640243, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 683123422f640243, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID ab1622ac. 2025/04/30 08:47:18 Adding connection ID fac75688. 2025/04/30 08:47:18 Adding connection ID d241f7d7. 2025/04/30 08:47:18 Adding connection ID 78df6e62. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 683123422f640243, SrcConnectionID: d90ab82b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 373, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 683123422f640243, SrcConnectionID: d90ab82b, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 683123422f640243, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: fac75688, StatelessResetToken: 0x1f5eaf3fc2f637b7c237ec208bcd2678} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d241f7d7, StatelessResetToken: 0xa3aeb6b4dd67e75768c751e9ec76c84c} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ab1622ac, StatelessResetToken: 0x619ebbec4e5edda383721e5a2fcebb13} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 78df6e62, StatelessResetToken: 0x542b105636551bccb905e77a1429a370} 2025/04/30 08:47:18 server <- Reading packet 4 (1200 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 4e1dcb450283083b548d338c8660c1e4d239951e, SrcConnectionID: a86dd29a373072f5, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: a86dd29a373072f5, SrcConnectionID: 784400f0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/a735e40a4ab49d1b78653b4da25125213c448294.sqlog 2025/04/30 08:47:18 server Changing connection ID to c35e73cf. 2025/04/30 08:47:18 Adding connection IDs a735e40a4ab49d1b78653b4da25125213c448294 and c35e73cf for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection a735e40a4ab49d1b78653b4da25125213c448294, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: a735e40a4ab49d1b78653b4da25125213c448294, SrcConnectionID: a34531801d28145a, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a34531801d28145a, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 9caa8570. 2025/04/30 08:47:18 Adding connection ID e93a9bab. 2025/04/30 08:47:18 Adding connection ID 026e977e. 2025/04/30 08:47:18 Adding connection ID 62fdc195. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a735e40a4ab49d1b78653b4da25125213c448294 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: a34531801d28145a, SrcConnectionID: c35e73cf, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 374, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: a34531801d28145a, SrcConnectionID: c35e73cf, PacketNumber: 0, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:47:18 server Short Header{DestConnectionID: a34531801d28145a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9caa8570, StatelessResetToken: 0x6d44e8ea1da67629b2895583b70231c2} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 62fdc195, StatelessResetToken: 0xbb4149587f30f9c62fff693fa3dbb9ed} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 026e977e, StatelessResetToken: 0x74b23c131f36ac30e33230523bf2031c} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e93a9bab, StatelessResetToken: 0xa157f4f1478a13b337184a4c0104cca9} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/1210baa30e1eb1485a378ab5586c9f9363f2e5b3.sqlog 2025/04/30 08:47:18 server Changing connection ID to 8c2dd730. 2025/04/30 08:47:18 Adding connection IDs 1210baa30e1eb1485a378ab5586c9f9363f2e5b3 and 8c2dd730 for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, SrcConnectionID: e6f7d3b8c043ba3f, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e6f7d3b8c043ba3f, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 6e5d6833. 2025/04/30 08:47:18 Adding connection ID 6c6e7a9c. 2025/04/30 08:47:18 Adding connection ID 9eb4f957. 2025/04/30 08:47:18 Adding connection ID 5d672102. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: e6f7d3b8c043ba3f, SrcConnectionID: 8c2dd730, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 376, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: e6f7d3b8c043ba3f, SrcConnectionID: 8c2dd730, PacketNumber: 0, PacketNumberLen: 2, Length: 738, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 08:47:18 server Short Header{DestConnectionID: e6f7d3b8c043ba3f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6c6e7a9c, StatelessResetToken: 0xd5a2a7bdeb617db922e9bab81204da82} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9eb4f957, StatelessResetToken: 0x2679e69ddd5ccde0655fb452d01ab895} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6e5d6833, StatelessResetToken: 0xcaa2f3b4313e95aa747a49f6f4bce00f} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5d672102, StatelessResetToken: 0x451791541f98c5c84fd06e2e9545c4da} 2025/04/30 08:47:18 server <- Reading packet 4 (1200 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 0a28513b024783521009692e08d9b05078a813ef, SrcConnectionID: 683123422f640243, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server -> Sending packet 1 (48 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 683123422f640243, SrcConnectionID: d90ab82b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Received Initial packet. 2025/04/30 08:47:18 Created qlog file: /logs/qlog/f2ab6f0af4280ef9c7cdbc6f861e8578facec70d.sqlog 2025/04/30 08:47:18 server Changing connection ID to e4d6489d. 2025/04/30 08:47:18 Adding connection IDs f2ab6f0af4280ef9c7cdbc6f861e8578facec70d and e4d6489d for a new connection. 2025/04/30 08:47:18 server <- Reading packet 3 (1200 bytes) for connection f2ab6f0af4280ef9c7cdbc6f861e8578facec70d, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: f2ab6f0af4280ef9c7cdbc6f861e8578facec70d, SrcConnectionID: b5cdcc5d8a4a3374, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: b5cdcc5d8a4a3374, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:18 Adding connection ID 7ac7e4d6. 2025/04/30 08:47:18 Adding connection ID 3132b838. 2025/04/30 08:47:18 Adding connection ID a31fd013. 2025/04/30 08:47:18 Adding connection ID dc786ff2. 2025/04/30 08:47:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f2ab6f0af4280ef9c7cdbc6f861e8578facec70d 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: b5cdcc5d8a4a3374, SrcConnectionID: e4d6489d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 367, Version: v1} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: b5cdcc5d8a4a3374, SrcConnectionID: e4d6489d, PacketNumber: 0, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:18 server Short Header{DestConnectionID: b5cdcc5d8a4a3374, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: a31fd013, StatelessResetToken: 0x5cec48b7baca536ce3a5b58e38f6873c} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3132b838, StatelessResetToken: 0x56be311786a2f19ef2f86247ac1be77e} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7ac7e4d6, StatelessResetToken: 0x4be9ab62f245e7487af378605000fab7} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: dc786ff2, StatelessResetToken: 0x73741dfdb2ea44d3c3a592e9f55fc36b} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 5 (44 bytes) for connection c62c8fe5, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: c62c8fe5, SrcConnectionID: e412741d38ddfd84, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 360µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 34.312984ms (σ: 17.156492ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection c62c8fe5, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: c62c8fe5, SrcConnectionID: e412741d38ddfd84, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 360µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 34.312ms (σ: 12.867ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 3e5bad73dcf94558a795b1ed42db43693fef8292 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection c62c8fe5, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: c62c8fe5, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 Received request: GET /mbnypsmgbk 2025/04/30 08:47:18 server -> Sending packet 1 (267 bytes) for connection 3e5bad73dcf94558a795b1ed42db43693fef8292, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e412741d38ddfd84, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 391.182µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xd8acead6c2f89769263d4fade4f6af51117899243f70a246e8982876b7a9314eb2d7c95a519b38f28fcf7f6846e560448a4e921e4f6283c817dc01236a786f0f786b2972c874d1521589598eb012927162029c674c3a} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> Sending packet 2 (1053 bytes) for connection 3e5bad73dcf94558a795b1ed42db43693fef8292, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: e412741d38ddfd84, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:18 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 5 (44 bytes) for connection eba23fb9, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: eba23fb9, SrcConnectionID: 873d878f4038992c, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 312µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 34.181638ms (σ: 17.090819ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection eba23fb9, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: eba23fb9, SrcConnectionID: 873d878f4038992c, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 312µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 34.181ms (σ: 12.817ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID e423d82739942fe35dc2809a2118f5ad6de58108 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection eba23fb9, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: eba23fb9, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 1 (267 bytes) for connection e423d82739942fe35dc2809a2118f5ad6de58108, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 873d878f4038992c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376.775µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x46ad681499f0811a70d77d3bd21bd821a0f426e4a0ffaf4de47962879ef5a607a91d5c433d0d3cd3b7bed275fcfbc298a19c60f5fa2156aaa8307bcd5bebba8f8f79280228d19fecede37908de6811d2660637761b7e} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection eba23fb9, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: eba23fb9, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 197ae3a5cd36874e, StatelessResetToken: 0xcdfb177ab3e6f0f555205a0c66cbe23e} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ed0ff98acf751265, StatelessResetToken: 0x2e018e79d4df4eabc4fc11aacd17108c} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 51ac9e50229e3a76, StatelessResetToken: 0x69a87d9fcca53a49054e76a32d346502} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server -> Sending packet 2 (37 bytes) for connection e423d82739942fe35dc2809a2118f5ad6de58108, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 197ae3a5cd36874e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 261.088µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 Received request: GET /dpisejliry 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection e423d82739942fe35dc2809a2118f5ad6de58108, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 197ae3a5cd36874e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 5 (44 bytes) for connection 474dd458, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 474dd458, SrcConnectionID: da7eeb978e461407, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 384µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection 474dd458, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 474dd458, SrcConnectionID: da7eeb978e461407, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 384µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.526524ms (σ: 16.763262ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 7d24de3bbb90b216154850009985707532a7cb51 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection 7d24de3bbb90b216154850009985707532a7cb51, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: da7eeb978e461407, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0xc0fd9fc06f120a25dd3db59c6f410b640a0a24c86570f6fec9d8f6e375aed9126de8dceeb79d8f62f40d405e59df7e6f70879b90dbc05d572a58a41767b63246ff51e9a7b0dce086557586fa4e8e42d9cadf192ee3f5} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 474dd458, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 474dd458, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection 474dd458, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 474dd458, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d9fa04f106b9629b, StatelessResetToken: 0x3feba353af9352f8d6c5532cff037d50} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d6bbeac3d8f37ac0, StatelessResetToken: 0x2c51dec05a6bba1de5721397ab3a24e8} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 2348008b4299e8ba, StatelessResetToken: 0x738a8be02949e628ba70e74aa847bc0d} 2025/04/30 08:47:18 server -> Sending packet 2 (37 bytes) for connection 7d24de3bbb90b216154850009985707532a7cb51, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: d9fa04f106b9629b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 290.012µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 Received request: GET /qdgigcqdgz 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection 7d24de3bbb90b216154850009985707532a7cb51, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: d9fa04f106b9629b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:18 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 5 (44 bytes) for connection 58c069ec, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 58c069ec, SrcConnectionID: f08411f7fb9fdf46, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 336µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.018892ms (σ: 16.509446ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection 58c069ec, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 58c069ec, SrcConnectionID: f08411f7fb9fdf46, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 336µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 33.018ms (σ: 12.381ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 706fcef248206883f6699ac0b0370f0e47c41366 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection 706fcef248206883f6699ac0b0370f0e47c41366, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:47:18 server Short Header{DestConnectionID: f08411f7fb9fdf46, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x0c019749b21d84723a809566c31b80ff235fbc1d7496ac0606fe219f3ad8be5403a148095870017876f025ee169c5f7d464c2ae5abf52ef68e0abb4720e2111683d9c6268ff082af69b0f1ba0f03a50106dcb9b1b169} 2025/04/30 08:47:18 server -> Sending packet 12 (355 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 43d768e07e42e906, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 950d0739, StatelessResetToken: 0xb071f3c37fcbd7d8117a324260317f94} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3cbd7faa, StatelessResetToken: 0x4c5ee3ab0aabc3620eae611abdd4bfbb} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec36d4cd, StatelessResetToken: 0xe0002595b6b173994a4054ba7d395881} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x5540aa0dd4bf28b8f9430f081b4490c99fc79355bcf8510080ddf34cc94da95d1d8fdf8e9704b3940aceab143ec889d386f89828bb3893415a1b35d08dda0fc914fbba6d8ffa3acbbe04716aa00a1ec77d2992ba99c7} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e4cff29, StatelessResetToken: 0x1184919153e0312df281ad89fc0ba0a4} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 58c069ec, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 58c069ec, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection 58c069ec, 1-RTT 2025/04/30 08:47:18 server -> Sending packet 13 (355 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 43d768e07e42e906, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec36d4cd, StatelessResetToken: 0xe0002595b6b173994a4054ba7d395881} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server Short Header{DestConnectionID: 58c069ec, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 950d0739, StatelessResetToken: 0xb071f3c37fcbd7d8117a324260317f94} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ca04b3dc1a0fae28, StatelessResetToken: 0x921c9df51e84b992c818f209f2af66d8} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d8924a814e380269, StatelessResetToken: 0xe980c0aa554b37ecd1b1a8afcb95bf15} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9e4cff29, StatelessResetToken: 0x1184919153e0312df281ad89fc0ba0a4} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: e179f45eef3f208b, StatelessResetToken: 0xd37a7d2abc530e62f8c970a5fab29099} 2025/04/30 08:47:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3cbd7faa, StatelessResetToken: 0x4c5ee3ab0aabc3620eae611abdd4bfbb} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x5540aa0dd4bf28b8f9430f081b4490c99fc79355bcf8510080ddf34cc94da95d1d8fdf8e9704b3940aceab143ec889d386f89828bb3893415a1b35d08dda0fc914fbba6d8ffa3acbbe04716aa00a1ec77d2992ba99c7} 2025/04/30 08:47:18 server -> Sending packet 2 (37 bytes) for connection 706fcef248206883f6699ac0b0370f0e47c41366, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server -> Sending packet 14 (1409 bytes) for connection 7329227b9d4d748545be0a9b080b58a5eb45daba, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 43d768e07e42e906, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.PingFrame{} 2025/04/30 08:47:18 server Short Header{DestConnectionID: ca04b3dc1a0fae28, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 468.309µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 Received request: GET /pshoboilck 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection 706fcef248206883f6699ac0b0370f0e47c41366, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: ca04b3dc1a0fae28, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 5 (44 bytes) for connection 4d8fc445, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: 4d8fc445, SrcConnectionID: 2bdd48804348c07f, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 352µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.918535ms (σ: 16.459267ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection 4d8fc445, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: 4d8fc445, SrcConnectionID: 2bdd48804348c07f, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 352µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.918ms (σ: 12.344ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 34dd4d31004c0ffaaf545d44c24fc42a304f6354 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection 4d8fc445, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 4d8fc445, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 1 (268 bytes) for connection 34dd4d31004c0ffaaf545d44c24fc42a304f6354, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 2bdd48804348c07f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 677.779µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x1a5b29fcb8f6d500e75f6a4e2f00ce83a79a98b282ac7c901b7e7d73aad14d0d715a274b2831792dc7ed5a08d8238306e52c03e5146e37568b7d7332640277d415344a46bd8261f4af0e6bc45ab49738bb2a79e7b97b} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection 4d8fc445, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 4d8fc445, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ac5640bb3fc5a292, StatelessResetToken: 0xf4da3f2df34951dd611dbd44ee3e97c3} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3172205f2b26c7a0, StatelessResetToken: 0xa4d6e9518074b29fa9ed048e7125079c} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 37a2f7dfc14e380a, StatelessResetToken: 0xef46a44d062251d68789d2f273d56488} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server -> Sending packet 2 (38 bytes) for connection 34dd4d31004c0ffaaf545d44c24fc42a304f6354, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: ac5640bb3fc5a292, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 715.081µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 Received request: GET /aftrlcankl 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection 34dd4d31004c0ffaaf545d44c24fc42a304f6354, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: ac5640bb3fc5a292, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 5 (44 bytes) for connection d90ab82b, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: d90ab82b, SrcConnectionID: 683123422f640243, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.832014ms (σ: 16.416007ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection d90ab82b, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: d90ab82b, SrcConnectionID: 683123422f640243, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 296µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.832ms (σ: 12.312ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID 0a28513b024783521009692e08d9b05078a813ef in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection d90ab82b, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: d90ab82b, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 1 (267 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 683123422f640243, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 293.099µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x57eb949de88f514a59c33f10c679f06e5122d9d98de79914386a796640ad657e68a058dac1e87bf1bc912055eed76ea839d01886bbe7b3a02fcfb986d4c092b0409fcdcaa16831993b3d07faa61c39b82a24673752bf} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server <- Reading packet 1 (106 bytes) for connection d90ab82b, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: d90ab82b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 Received request: GET /kcdrdjbpjl 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 83decccf789372ed, StatelessResetToken: 0xe2b6a9860a540e9d7f258468bc23d90e} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7d788638ae12602d, StatelessResetToken: 0xe0585983c69a1d55b9b282a1d0645c27} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ed18ce918cb4a5da, StatelessResetToken: 0xd2144e9ab386fa0ab156adeee5b72cd0} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server -> Sending packet 2 (37 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 83decccf789372ed, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 323.208µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: 83decccf789372ed, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 5 (44 bytes) for connection c35e73cf, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: c35e73cf, SrcConnectionID: a34531801d28145a, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 240µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.786405ms (σ: 16.393202ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection c35e73cf, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: c35e73cf, SrcConnectionID: a34531801d28145a, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 240µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.786ms (σ: 12.294ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID a735e40a4ab49d1b78653b4da25125213c448294 in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection a735e40a4ab49d1b78653b4da25125213c448294, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: a34531801d28145a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x1d59bb1200867004cb731bc6501d77678896105e9ee6595b2a0d9eaad614c099c264c57ce24f06142e00a5a00b1357421914c02b1765f87415230906cddd4bbfc0a6c004ec5496faaf906166e95b343e34a1f3ebac04} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:18 server <- Reading packet 5 (44 bytes) for connection e4d6489d, Initial 2025/04/30 08:47:18 server Long Header{Type: Initial, DestConnectionID: e4d6489d, SrcConnectionID: b5cdcc5d8a4a3374, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 240µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.78973ms (σ: 16.394865ms) 2025/04/30 08:47:18 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:18 server <- Reading packet 0 (1156 bytes) for connection e4d6489d, Handshake 2025/04/30 08:47:18 server Long Header{Type: Handshake, DestConnectionID: e4d6489d, SrcConnectionID: b5cdcc5d8a4a3374, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:18 server Dropping Initial keys. 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 240µs} 2025/04/30 08:47:18 server newly acked packets (1): [0] 2025/04/30 08:47:18 server updated RTT: 32.789ms (σ: 12.295ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:18 Retiring connection ID f2ab6f0af4280ef9c7cdbc6f861e8578facec70d in 5s. 2025/04/30 08:47:18 server Dropping Handshake keys. 2025/04/30 08:47:18 server -> Sending packet 1 (259 bytes) for connection f2ab6f0af4280ef9c7cdbc6f861e8578facec70d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: b5cdcc5d8a4a3374, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:18 server -> &wire.NewTokenFrame{Token: 0x0b066bd202a0f2d73ae157037a6554b00b3e26b300e59d8b187a92ecd5f0abe13da5bc240e22b9c26414459ead2e3c2de879712f56b878ca9d009e062b3fe54d492842016430db51d2329a74661fe5ae169dd1362b3b} 2025/04/30 08:47:18 server <- Reading packet 0 (42 bytes) for connection e4d6489d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e4d6489d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:18 server -> Sending packet 2 (35 bytes) for connection f2ab6f0af4280ef9c7cdbc6f861e8578facec70d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: b5cdcc5d8a4a3374, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 290.348µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 Received request: GET /tpattefwbl 2025/04/30 08:47:18 server -> Sending packet 3 (1053 bytes) for connection f2ab6f0af4280ef9c7cdbc6f861e8578facec70d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: b5cdcc5d8a4a3374, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:18 server <- Reading packet 4 (33 bytes) for connection eba23fb9, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: eba23fb9, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 112µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (4): [0 1 2 3] 2025/04/30 08:47:18 server updated RTT: 33.867ms (σ: 10.239ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [4f784d6d 9820448f b53360a1 eba23fb9 90783fcf] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection e423d82739942fe35dc2809a2118f5ad6de58108 closed. 2025/04/30 08:47:18 server <- Reading packet 3 (50 bytes) for connection 474dd458, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 474dd458, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: d75f7f9d8568caaa, StatelessResetToken: 0xbf46aeddbe0c83d6ebdaeaf9344ff2ab} 2025/04/30 08:47:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:18 server -> Sending packet 4 (37 bytes) for connection 7d24de3bbb90b216154850009985707532a7cb51, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: d9fa04f106b9629b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 113.482µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- Reading packet 4 (30 bytes) for connection 474dd458, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 474dd458, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 16µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (4): [0 1 2 3] 2025/04/30 08:47:18 server updated RTT: 33.258ms (σ: 13.108ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server Ignoring all packets below 2. 2025/04/30 08:47:18 server -> Sending packet 5 (30 bytes) for connection 7d24de3bbb90b216154850009985707532a7cb51, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: d9fa04f106b9629b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection 58c069ec, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 58c069ec, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 56µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 1] 2025/04/30 08:47:18 server updated RTT: 32.748ms (σ: 9.825ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server <- Reading packet 9 (40 bytes) for connection 8eb9e69f, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 8eb9e69f, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 351.808ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [8eb9e69f ec36d4cd 9e4cff29 3cbd7faa 950d0739] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 7329227b9d4d748545be0a9b080b58a5eb45daba closed. 2025/04/30 08:47:18 server <- Reading packet 4 (30 bytes) for connection 58c069ec, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 58c069ec, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 32µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [2 3] 2025/04/30 08:47:18 server updated RTT: 32.781ms (σ: 7.436ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server Ignoring all packets below 2. 2025/04/30 08:47:18 server -> Sending packet 4 (30 bytes) for connection 706fcef248206883f6699ac0b0370f0e47c41366, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:18 server Short Header{DestConnectionID: ca04b3dc1a0fae28, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:18 server <- Reading packet 5 (33 bytes) for connection 58c069ec, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 58c069ec, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 200µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [32781442 e887dc3b e237daa6 642fb9d2 58c069ec] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 706fcef248206883f6699ac0b0370f0e47c41366 closed. 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection 4d8fc445, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 4d8fc445, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (3): [0 1 2] 2025/04/30 08:47:18 server updated RTT: 32.658ms (σ: 9.777ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Ignoring all packets below 2. 2025/04/30 08:47:18 server <- Reading packet 3 (50 bytes) for connection 4d8fc445, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 4d8fc445, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 64c31624ab2fa32b, StatelessResetToken: 0x6801005541c6dcbaaeaa380ce1de7118} 2025/04/30 08:47:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:18 server <- Reading packet 4 (33 bytes) for connection 4d8fc445, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 4d8fc445, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 96µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (1): [3] 2025/04/30 08:47:18 server updated RTT: 32.513ms (σ: 7.621ms) 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [313cef81 4d8fc445 98068e57 b69a2dac 143902cf] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 34dd4d31004c0ffaaf545d44c24fc42a304f6354 closed. 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection d90ab82b, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: d90ab82b, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 1] 2025/04/30 08:47:18 server updated RTT: 32.595ms (σ: 9.707ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Ignoring all packets below 1. 2025/04/30 08:47:18 server <- Reading packet 2 (30 bytes) for connection c35e73cf, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: c35e73cf, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 1] 2025/04/30 08:47:18 server updated RTT: 32.533ms (σ: 9.726ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server Canceling loss detection timer. 2025/04/30 08:47:18 server <- Reading packet 3 (30 bytes) for connection e4d6489d, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: e4d6489d, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 40µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server newly acked packets (2): [0 1] 2025/04/30 08:47:18 server updated RTT: 32.556ms (σ: 9.686ms) 2025/04/30 08:47:18 server ECN capability confirmed. 2025/04/30 08:47:18 server <- Reading packet 6 (34 bytes) for connection 474dd458, 1-RTT 2025/04/30 08:47:18 server Short Header{DestConnectionID: 474dd458, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 30.008ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:18 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:18 Replacing connection for connection IDs [41813b54 3d4d2219 8c633a44 7222b7cf 474dd458] with a closed connection. 2025/04/30 08:47:18 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:18 server Connection 7d24de3bbb90b216154850009985707532a7cb51 closed. 2025/04/30 08:47:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:47:19 server -> Sending packet 10 (29 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: f079ae84ccbda7a7, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:19 server -> Sending packet 11 (29 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: f079ae84ccbda7a7, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 4 (123 bytes) for connection 3e5bad73dcf94558a795b1ed42db43693fef8292, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: e412741d38ddfd84, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d9ffee95, StatelessResetToken: 0x10c6d166beb33a7e81649cffca38ff43} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0e274443, StatelessResetToken: 0x25da341afaf79d1585c9fcd0b9e90194} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 706f83f3, StatelessResetToken: 0x8eeded8d3f687ef5f3154a0e93d15b56} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee0b2795, StatelessResetToken: 0x94e602730da284ffec6c6a91931c3d70} 2025/04/30 08:47:19 server Skipping packet number 3 2025/04/30 08:47:19 server -> Sending packet 5 (259 bytes) for connection 3e5bad73dcf94558a795b1ed42db43693fef8292, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: e412741d38ddfd84, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:19 server -> &wire.NewTokenFrame{Token: 0xd8acead6c2f89769263d4fade4f6af51117899243f70a246e8982876b7a9314eb2d7c95a519b38f28fcf7f6846e560448a4e921e4f6283c817dc01236a786f0f786b2972c874d1521589598eb012927162029c674c3a} 2025/04/30 08:47:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 5 (29 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 83decccf789372ed, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:19 server Skipping packet number 4 2025/04/30 08:47:19 server -> Sending packet 6 (1053 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 83decccf789372ed, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 5 (1053 bytes) for connection f2ab6f0af4280ef9c7cdbc6f861e8578facec70d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: b5cdcc5d8a4a3374, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:19 server -> Sending packet 6 (1053 bytes) for connection f2ab6f0af4280ef9c7cdbc6f861e8578facec70d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: b5cdcc5d8a4a3374, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:19 server <- Reading packet 7 (38 bytes) for connection b0fe6155, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: b0fe6155, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server <- Reading packet 10 (26 bytes) for connection e4ee6a80, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: e4ee6a80, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.PingFrame{} 2025/04/30 08:47:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:19 server -> Sending packet 9 (1409 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: cc86b6dc0840ab6f, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.PingFrame{} 2025/04/30 08:47:19 server <- Reading packet 3 (32 bytes) for connection d90ab82b, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: d90ab82b, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- Reading packet 11 (26 bytes) for connection e4ee6a80, 1-RTT 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 40µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server Short Header{DestConnectionID: e4ee6a80, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server newly acked packets (1): [5] 2025/04/30 08:47:19 server <- &wire.PingFrame{} 2025/04/30 08:47:19 server updated RTT: 32.428ms (σ: 7.613ms) 2025/04/30 08:47:19 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 08:47:19 server <- Reading packet 4 (50 bytes) for connection d90ab82b, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: d90ab82b, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 88496ca05b88c74b, StatelessResetToken: 0x6bd619873777d076301655fac30d6d3f} 2025/04/30 08:47:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:19 server -> Sending packet 10 (39 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: cc86b6dc0840ab6f, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 3, AckRanges: {{Largest: 11, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 96.839µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server <- Reading packet 4 (32 bytes) for connection e4d6489d, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: e4d6489d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 40µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server <- Reading packet 5 (35 bytes) for connection e4d6489d, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: e4d6489d, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 232µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:19 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:19 Replacing connection for connection IDs [3132b838 a31fd013 dc786ff2 e4d6489d 7ac7e4d6] with a closed connection. 2025/04/30 08:47:19 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:19 server Connection f2ab6f0af4280ef9c7cdbc6f861e8578facec70d closed. 2025/04/30 08:47:19 server <- Reading packet 8 (39 bytes) for connection b0fe6155, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: b0fe6155, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 26.096ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server newly acked packets (1): [11] 2025/04/30 08:47:19 server updated RTT: 31.395ms (σ: 11.976ms) 2025/04/30 08:47:19 server lost packet 4 (time threshold) 2025/04/30 08:47:19 server Canceling loss detection timer. 2025/04/30 08:47:19 server -> Sending packet 12 (1323 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: f079ae84ccbda7a7, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.PingFrame{} 2025/04/30 08:47:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 2 (1280 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: eaa2baeba887c3fb, SrcConnectionID: e07bba01, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server -> Sending packet 3 (1280 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: eaa2baeba887c3fb, SrcConnectionID: e07bba01, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server Sending ACK because the ACK timer expired. 2025/04/30 08:47:19 server -> Sending packet 7 (36 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 83decccf789372ed, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, DelayTime: 25.817725ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 1 (1280 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, Initial 2025/04/30 08:47:19 server -> Sending packet 1 (1280 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server -> Sending packet 2 (1280 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 6152f1adf0aa5d1c, SrcConnectionID: d2b14b2e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server -> Sending packet 2 (1280 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 6152f1adf0aa5d1c, SrcConnectionID: d2b14b2e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server Canceling loss detection timer. 2025/04/30 08:47:19 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:47:19 server Canceling loss detection timer. 2025/04/30 08:47:19 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:47:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 2 (1280 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 01f506e8a2591a47, SrcConnectionID: cb305a21, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server -> Sending packet 3 (1280 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 01f506e8a2591a47, SrcConnectionID: cb305a21, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 2 (1280 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: a86dd29a373072f5, SrcConnectionID: 784400f0, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server -> Sending packet 3 (1280 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: a86dd29a373072f5, SrcConnectionID: 784400f0, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 1 (1280 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: e6f7d3b8c043ba3f, SrcConnectionID: 8c2dd730, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server -> Sending packet 2 (1280 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: e6f7d3b8c043ba3f, SrcConnectionID: 8c2dd730, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server Canceling loss detection timer. 2025/04/30 08:47:19 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:47:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 9 (1053 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 83decccf789372ed, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:19 server -> Sending packet 10 (1053 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 83decccf789372ed, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:19 server -> Sending packet 11 (1366 bytes) for connection 0a28513b024783521009692e08d9b05078a813ef, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 83decccf789372ed, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.PingFrame{} 2025/04/30 08:47:19 server <- Reading packet 5 (1200 bytes) for connection 7f135b70, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 7f135b70, SrcConnectionID: 4e1b6a25fa8eb7c2, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 200µs} 2025/04/30 08:47:19 server <- Reading packet 5 (1200 bytes) for connection d2b14b2e, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: d2b14b2e, SrcConnectionID: 6152f1adf0aa5d1c, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 168µs} 2025/04/30 08:47:19 server <- Reading packet 6 (1200 bytes) for connection d2b14b2e, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: d2b14b2e, SrcConnectionID: 6152f1adf0aa5d1c, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 48µs} 2025/04/30 08:47:19 server newly acked packets (1): [2] 2025/04/30 08:47:19 server updated RTT: 34.717589ms (σ: 17.358794ms) 2025/04/30 08:47:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 1 (769 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 6152f1adf0aa5d1c, SrcConnectionID: d2b14b2e, PacketNumber: 1, PacketNumberLen: 2, Length: 748, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 08:47:19 server -> Sending packet 2 (769 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 6152f1adf0aa5d1c, SrcConnectionID: d2b14b2e, PacketNumber: 2, PacketNumberLen: 2, Length: 748, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 08:47:19 server <- Reading packet 6 (1200 bytes) for connection 7f135b70, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 7f135b70, SrcConnectionID: 4e1b6a25fa8eb7c2, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 48µs} 2025/04/30 08:47:19 server newly acked packets (1): [2] 2025/04/30 08:47:19 server updated RTT: 35.713644ms (σ: 17.856822ms) 2025/04/30 08:47:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 1 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 1, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:19 server -> Sending packet 2 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 2, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:19 server <- Reading packet 9 (39 bytes) for connection b0fe6155, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: b0fe6155, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 26.136ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server newly acked packets (1): [12] 2025/04/30 08:47:19 server updated RTT: 31.581ms (σ: 9.355ms) 2025/04/30 08:47:19 server <- Reading packet 5 (1200 bytes) for connection 8c2dd730, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 8c2dd730, SrcConnectionID: e6f7d3b8c043ba3f, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 200µs} 2025/04/30 08:47:19 server <- Reading packet 6 (1200 bytes) for connection 8c2dd730, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 8c2dd730, SrcConnectionID: e6f7d3b8c043ba3f, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 48µs} 2025/04/30 08:47:19 server newly acked packets (1): [2] 2025/04/30 08:47:19 server updated RTT: 33.764836ms (σ: 16.882418ms) 2025/04/30 08:47:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 1 (759 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: e6f7d3b8c043ba3f, SrcConnectionID: 8c2dd730, PacketNumber: 1, PacketNumberLen: 2, Length: 738, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 08:47:19 server -> Sending packet 2 (759 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: e6f7d3b8c043ba3f, SrcConnectionID: 8c2dd730, PacketNumber: 2, PacketNumberLen: 2, Length: 738, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 716, Offset + Data length: 716} 2025/04/30 08:47:19 server <- Reading packet 9 (36 bytes) for connection d90ab82b, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: d90ab82b, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 90.68ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:19 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:19 Replacing connection for connection IDs [d90ab82b ab1622ac fac75688 d241f7d7 78df6e62] with a closed connection. 2025/04/30 08:47:19 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:19 server Connection 0a28513b024783521009692e08d9b05078a813ef closed. 2025/04/30 08:47:19 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:19 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:19 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:19 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:19 server <- Reading packet 0 (82 bytes) for connection 8c2dd730, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 8c2dd730, SrcConnectionID: e6f7d3b8c043ba3f, PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 08:47:19 server Dropping Initial keys. 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 208µs} 2025/04/30 08:47:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:19 Retiring connection ID 1210baa30e1eb1485a378ab5586c9f9363f2e5b3 in 5s. 2025/04/30 08:47:19 server Dropping Handshake keys. 2025/04/30 08:47:19 server <- Reading packet 0 (42 bytes) for connection 8c2dd730, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 8c2dd730, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 2 (363 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: e6f7d3b8c043ba3f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 305.502µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6c6e7a9c, StatelessResetToken: 0xd5a2a7bdeb617db922e9bab81204da82} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6e5d6833, StatelessResetToken: 0xcaa2f3b4313e95aa747a49f6f4bce00f} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5d672102, StatelessResetToken: 0x451791541f98c5c84fd06e2e9545c4da} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:19 server -> &wire.NewTokenFrame{Token: 0x66025b0336738fff6b29c2e9cd3affbf6c27577c12795ab66fb1326dc22af0bfd6c2daf422aec54996b2e34c37a45a853de732ca6921aa938394eff87993e9c33a8e917baae8ed65700c3e691e7331c468cc0e468733} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9eb4f957, StatelessResetToken: 0x2679e69ddd5ccde0655fb452d01ab895} 2025/04/30 08:47:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:19 Received request: GET /hruezunhtz 2025/04/30 08:47:19 server -> Sending packet 3 (355 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: e6f7d3b8c043ba3f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6c6e7a9c, StatelessResetToken: 0xd5a2a7bdeb617db922e9bab81204da82} 2025/04/30 08:47:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6e5d6833, StatelessResetToken: 0xcaa2f3b4313e95aa747a49f6f4bce00f} 2025/04/30 08:47:19 server -> &wire.NewTokenFrame{Token: 0x66025b0336738fff6b29c2e9cd3affbf6c27577c12795ab66fb1326dc22af0bfd6c2daf422aec54996b2e34c37a45a853de732ca6921aa938394eff87993e9c33a8e917baae8ed65700c3e691e7331c468cc0e468733} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9eb4f957, StatelessResetToken: 0x2679e69ddd5ccde0655fb452d01ab895} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 5d672102, StatelessResetToken: 0x451791541f98c5c84fd06e2e9545c4da} 2025/04/30 08:47:19 server -> Sending packet 4 (1053 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: e6f7d3b8c043ba3f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:19 server <- Reading packet 1 (106 bytes) for connection 8c2dd730, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 8c2dd730, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 891610e97d12b359, StatelessResetToken: 0x308b50e7f3e7ec3e5b5262447a19909e} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 46cdb702a1cd3f80, StatelessResetToken: 0x6d82de1d3a7705de7c4919a3d2814be0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1ec2185cbd5c2980, StatelessResetToken: 0x0b7c1610452b728004af4862713b0ee9} 2025/04/30 08:47:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:19 server -> Sending packet 5 (38 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 891610e97d12b359, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 538.319µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:19 server <- Reading packet 2 (30 bytes) for connection 8c2dd730, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 8c2dd730, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 96µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server <- Reading packet 3 (32 bytes) for connection 8c2dd730, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 8c2dd730, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server newly acked packets (2): [3 5] 2025/04/30 08:47:19 server updated RTT: 33.522ms (σ: 13.143ms) 2025/04/30 08:47:19 server ECN capability confirmed. 2025/04/30 08:47:19 server setting loss timer for packet 4 (1-RTT) to 37.71225ms (in 2025-04-30 08:47:19.193745157 +0000 UTC m=+5.242607822) 2025/04/30 08:47:19 server Ignoring all packets below 2. 2025/04/30 08:47:19 server <- Reading packet 4 (50 bytes) for connection 8c2dd730, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 8c2dd730, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8d4ea7c981b7388a, StatelessResetToken: 0x346c0d21a0951efb9c52709d85ee0219} 2025/04/30 08:47:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:19 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 08:47:19.193745157 +0000 UTC m=+5.242607822 2025/04/30 08:47:19 server lost packet 4 (time threshold) 2025/04/30 08:47:19 server Canceling loss detection timer. 2025/04/30 08:47:19 server -> Sending packet 6 (1062 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 891610e97d12b359, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 6.14728ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:19 server <- Reading packet 10 (50 bytes) for connection b0fe6155, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: b0fe6155, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8d3933dd337a681a, StatelessResetToken: 0xc914249d09366860703dcc618469e174} 2025/04/30 08:47:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:19 server <- Reading packet 11 (50 bytes) for connection b0fe6155, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: b0fe6155, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8d3933dd337a681a, StatelessResetToken: 0xc914249d09366860703dcc618469e174} 2025/04/30 08:47:19 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 08:47:19 server -> Sending packet 13 (37 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: f079ae84ccbda7a7, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 7}, {Largest: 2, Smallest: 1}}, DelayTime: 113.873µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:47:19 server -> Sending packet 7 (1053 bytes) for connection 3e5bad73dcf94558a795b1ed42db43693fef8292, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: e412741d38ddfd84, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:19 server Skipping packet number 6 2025/04/30 08:47:19 server -> Sending packet 8 (123 bytes) for connection 3e5bad73dcf94558a795b1ed42db43693fef8292, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: e412741d38ddfd84, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ee0b2795, StatelessResetToken: 0x94e602730da284ffec6c6a91931c3d70} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0e274443, StatelessResetToken: 0x25da341afaf79d1585c9fcd0b9e90194} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 706f83f3, StatelessResetToken: 0x8eeded8d3f687ef5f3154a0e93d15b56} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d9ffee95, StatelessResetToken: 0x10c6d166beb33a7e81649cffca38ff43} 2025/04/30 08:47:19 server -> Sending packet 9 (1366 bytes) for connection 3e5bad73dcf94558a795b1ed42db43693fef8292, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: e412741d38ddfd84, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.PingFrame{} 2025/04/30 08:47:19 server Parsed a coalesced packet. Part 1: 53 bytes. Remaining: 35 bytes. 2025/04/30 08:47:19 server Dropping %!s(logging.PacketType=1) packet (53 bytes) because we already dropped the keys. 2025/04/30 08:47:19 server <- Reading packet 3 (35 bytes) for connection c62c8fe5, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: c62c8fe5, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 0, Smallest: 0}}, DelayTime: 368µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server newly acked packets (2): [7 8] 2025/04/30 08:47:19 server updated RTT: 34.064ms (σ: 10.144ms) 2025/04/30 08:47:19 server ECN capability confirmed. 2025/04/30 08:47:19 server lost packet 5 (time threshold) 2025/04/30 08:47:19 server Canceling loss detection timer. 2025/04/30 08:47:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:19 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:19 Replacing connection for connection IDs [c62c8fe5 d9ffee95 706f83f3 ee0b2795 0e274443] with a closed connection. 2025/04/30 08:47:19 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:19 server Connection 3e5bad73dcf94558a795b1ed42db43693fef8292 closed. 2025/04/30 08:47:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:47:19 server -> Sending packet 1 (766 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: eaa2baeba887c3fb, SrcConnectionID: e07bba01, PacketNumber: 1, PacketNumberLen: 2, Length: 745, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 08:47:19 server -> Sending packet 2 (766 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: eaa2baeba887c3fb, SrcConnectionID: e07bba01, PacketNumber: 2, PacketNumberLen: 2, Length: 745, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 08:47:19 server <- Reading packet 6 (1200 bytes) for connection 22b7565c, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 22b7565c, SrcConnectionID: 74b506831f27e638, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:19 server -> Sending packet 4 (50 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 74b506831f27e638, SrcConnectionID: 22b7565c, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 3, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 08:47:19 server -> Sending packet 5 (1280 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 74b506831f27e638, SrcConnectionID: 22b7565c, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server -> Sending packet 6 (1280 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 74b506831f27e638, SrcConnectionID: 22b7565c, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:47:19 server -> Sending packet 1 (758 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 01f506e8a2591a47, SrcConnectionID: cb305a21, PacketNumber: 1, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:19 server -> Sending packet 2 (758 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 01f506e8a2591a47, SrcConnectionID: cb305a21, PacketNumber: 2, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:47:19 server -> Sending packet 1 (758 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: a86dd29a373072f5, SrcConnectionID: 784400f0, PacketNumber: 1, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:19 server -> Sending packet 2 (758 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: a86dd29a373072f5, SrcConnectionID: 784400f0, PacketNumber: 2, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:19 server <- Reading packet 1 (43 bytes) for connection e07bba01, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: e07bba01, SrcConnectionID: eaa2baeba887c3fb, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:19 server Dropping Initial keys. 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 56µs} 2025/04/30 08:47:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 8 (1053 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 891610e97d12b359, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:19 server -> Sending packet 9 (1053 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 891610e97d12b359, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:19 server <- Reading packet 7 (1200 bytes) for connection 22b7565c, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 22b7565c, SrcConnectionID: 74b506831f27e638, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 216µs} 2025/04/30 08:47:19 server <- Reading packet 8 (1200 bytes) for connection 22b7565c, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 22b7565c, SrcConnectionID: 74b506831f27e638, Token: (empty), PacketNumber: 8, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 48µs} 2025/04/30 08:47:19 server newly acked packets (1): [6] 2025/04/30 08:47:19 server updated RTT: 33.832293ms (σ: 16.916146ms) 2025/04/30 08:47:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 3 (761 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 74b506831f27e638, SrcConnectionID: 22b7565c, PacketNumber: 3, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:47:19 server -> Sending packet 4 (761 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 74b506831f27e638, SrcConnectionID: 22b7565c, PacketNumber: 4, PacketNumberLen: 2, Length: 740, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 718, Offset + Data length: 718} 2025/04/30 08:47:19 server <- Reading packet 1 (43 bytes) for connection cb305a21, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: cb305a21, SrcConnectionID: 01f506e8a2591a47, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:19 server Dropping Initial keys. 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 24µs} 2025/04/30 08:47:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:47:19 server -> Sending packet 3 (769 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 6152f1adf0aa5d1c, SrcConnectionID: d2b14b2e, PacketNumber: 3, PacketNumberLen: 2, Length: 748, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 08:47:19 server -> Sending packet 4 (769 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 6152f1adf0aa5d1c, SrcConnectionID: d2b14b2e, PacketNumber: 4, PacketNumberLen: 2, Length: 748, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 726, Offset + Data length: 726} 2025/04/30 08:47:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:47:19 server -> Sending packet 3 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 3, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:19 server -> Sending packet 4 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 4, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:19 server <- Reading packet 3 (77 bytes) for connection e07bba01, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: e07bba01, SrcConnectionID: eaa2baeba887c3fb, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:19 Retiring connection ID d024fc8a956f09574d4210c81a4bb178d36d30b5 in 5s. 2025/04/30 08:47:19 server Dropping Handshake keys. 2025/04/30 08:47:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 2 (352 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: eaa2baeba887c3fb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ca0835be, StatelessResetToken: 0x2356b460bc226c5746bcf2f0f7387ce2} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4b7a5351, StatelessResetToken: 0x0915d0a7de0e3ff4431fecccfa401b43} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 969f2d64, StatelessResetToken: 0xe61f17f3c04d13986974f0c118d4117a} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:19 server -> &wire.NewTokenFrame{Token: 0x5af594c9696491c6b52b79a7936abc92291887873abfacd2d67d3eab356dc9f92651721cb1994b078a9c93bb3b276b3a77c940db5ff3874b4288bf1a4525dc43878c73aaec56c4f9eb3c14907bedfaae4d67383f7ba6} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2b989aac, StatelessResetToken: 0x4767af131bb816d546151580cd05deaf} 2025/04/30 08:47:19 server -> Sending packet 3 (352 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: eaa2baeba887c3fb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.NewTokenFrame{Token: 0x5af594c9696491c6b52b79a7936abc92291887873abfacd2d67d3eab356dc9f92651721cb1994b078a9c93bb3b276b3a77c940db5ff3874b4288bf1a4525dc43878c73aaec56c4f9eb3c14907bedfaae4d67383f7ba6} 2025/04/30 08:47:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4b7a5351, StatelessResetToken: 0x0915d0a7de0e3ff4431fecccfa401b43} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ca0835be, StatelessResetToken: 0x2356b460bc226c5746bcf2f0f7387ce2} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 969f2d64, StatelessResetToken: 0xe61f17f3c04d13986974f0c118d4117a} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2b989aac, StatelessResetToken: 0x4767af131bb816d546151580cd05deaf} 2025/04/30 08:47:19 server -> Sending packet 4 (1366 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: eaa2baeba887c3fb, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.PingFrame{} 2025/04/30 08:47:19 server <- Reading packet 0 (42 bytes) for connection e07bba01, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: e07bba01, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:19 server <- Reading packet 1 (106 bytes) for connection e07bba01, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: e07bba01, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ebbb1ac32c691c1b, StatelessResetToken: 0x3b751d5458ebd5bd400fb6db8d95db19} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0d43ea7eec74fcba, StatelessResetToken: 0x2929dfee7dbee16c8cdb15c410b6c6a5} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 66cacf644f6a52cd, StatelessResetToken: 0x8058b2ba158052db2b96f31072712f9a} 2025/04/30 08:47:19 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 08:47:19 Received request: GET /jzqkxrlqzf 2025/04/30 08:47:19 server -> Sending packet 5 (40 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: ebbb1ac32c691c1b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 434.57357ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:19 server -> Sending packet 6 (1053 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: ebbb1ac32c691c1b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:19 server <- Reading packet 7 (34 bytes) for connection 8c2dd730, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 8c2dd730, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 80µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server -> Sending packet 10 (1366 bytes) for connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 891610e97d12b359, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.PingFrame{} 2025/04/30 08:47:19 server <- Reading packet 8 (37 bytes) for connection 8c2dd730, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 8c2dd730, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 264µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:19 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:19 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:19 Replacing connection for connection IDs [8c2dd730 6e5d6833 6c6e7a9c 9eb4f957 5d672102] with a closed connection. 2025/04/30 08:47:19 server Connection 1210baa30e1eb1485a378ab5586c9f9363f2e5b3 closed. 2025/04/30 08:47:19 server <- Reading packet 0 (82 bytes) for connection 22b7565c, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 22b7565c, SrcConnectionID: 74b506831f27e638, PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 08:47:19 server Dropping Initial keys. 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 240µs} 2025/04/30 08:47:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:19 Retiring connection ID d448869dadc1154d4ecfb2fb8f39b922fed6012b in 5s. 2025/04/30 08:47:19 server Dropping Handshake keys. 2025/04/30 08:47:19 server <- Reading packet 0 (42 bytes) for connection 22b7565c, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 22b7565c, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 2 (363 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 Received request: GET /jbkxrjxoyb 2025/04/30 08:47:19 server Short Header{DestConnectionID: 74b506831f27e638, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 436.888µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:19 server -> &wire.NewTokenFrame{Token: 0x7dcdcdae5494f38d0d38feefa1a6cbe6409c7a62f82e81a39d810acd752eb6ecad01c041e0e03e8168c4d7b40c1e0b5d81d5363308dda3dd27381ef9d7ed8386ffe49cfc87eaebe2698d6ea9cb9d05bfa0638c985045} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4063e067, StatelessResetToken: 0x4678d30c2edcbef92401d88d6d902af0} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1d314e3c, StatelessResetToken: 0xc2e50da98bbd1303d27c87ca8e1c7c60} 2025/04/30 08:47:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6168f11e, StatelessResetToken: 0x3f6d08ca530c7a4685f77a6c28d98c91} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6971f609, StatelessResetToken: 0x40d6e818e786c717deb5b7123b2df8ee} 2025/04/30 08:47:19 server -> Sending packet 3 (1280 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 74b506831f27e638, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6971f609, StatelessResetToken: 0x40d6e818e786c717deb5b7123b2df8ee} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 1d314e3c, StatelessResetToken: 0xc2e50da98bbd1303d27c87ca8e1c7c60} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 6168f11e, StatelessResetToken: 0x3f6d08ca530c7a4685f77a6c28d98c91} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4063e067, StatelessResetToken: 0x4678d30c2edcbef92401d88d6d902af0} 2025/04/30 08:47:19 server -> &wire.NewTokenFrame{Token: 0x7dcdcdae5494f38d0d38feefa1a6cbe6409c7a62f82e81a39d810acd752eb6ecad01c041e0e03e8168c4d7b40c1e0b5d81d5363308dda3dd27381ef9d7ed8386ffe49cfc87eaebe2698d6ea9cb9d05bfa0638c985045} 2025/04/30 08:47:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 923, Offset + Data length: 923} 2025/04/30 08:47:19 server -> Sending packet 4 (132 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 74b506831f27e638, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 923, Data length: 101, Offset + Data length: 1024} 2025/04/30 08:47:19 server <- Reading packet 1 (106 bytes) for connection 22b7565c, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 22b7565c, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 79eefdd749304210, StatelessResetToken: 0xe07802b37c655c006c465087aca11101} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: db3db81a3778d607, StatelessResetToken: 0x9badc812c463cae481f3874ef7aa1a90} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 783548774ae27965, StatelessResetToken: 0xffe5088023df169974fd4e7fc82114af} 2025/04/30 08:47:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:19 server -> Sending packet 5 (38 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 79eefdd749304210, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 663.246µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:19 server <- Reading packet 1 (43 bytes) for connection d2b14b2e, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: d2b14b2e, SrcConnectionID: 6152f1adf0aa5d1c, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:19 server Dropping Initial keys. 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 48µs} 2025/04/30 08:47:19 server <- Reading packet 2 (43 bytes) for connection d2b14b2e, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: d2b14b2e, SrcConnectionID: 6152f1adf0aa5d1c, PacketNumber: 2, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 24µs} 2025/04/30 08:47:19 server newly acked packets (1): [4] 2025/04/30 08:47:19 server updated RTT: 34.384ms (σ: 13.682ms) 2025/04/30 08:47:19 server Canceling loss detection timer. 2025/04/30 08:47:19 server <- Reading packet 2 (32 bytes) for connection e07bba01, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: e07bba01, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 96µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server <- Reading packet 4 (50 bytes) for connection e07bba01, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: e07bba01, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7d9dffabb8c1754f, StatelessResetToken: 0x7dc386fcd1f726c2b447dced9e4c9586} 2025/04/30 08:47:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:19 server -> Sending packet 7 (37 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: ebbb1ac32c691c1b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 71.615µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server <- Reading packet 2 (30 bytes) for connection 22b7565c, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 22b7565c, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 88µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server <- Reading packet 3 (30 bytes) for connection 22b7565c, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 22b7565c, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 24µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server newly acked packets (2): [3 4] 2025/04/30 08:47:19 server updated RTT: 33.661ms (σ: 13.028ms) 2025/04/30 08:47:19 server ECN capability confirmed. 2025/04/30 08:47:19 server <- Reading packet 4 (50 bytes) for connection 22b7565c, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 22b7565c, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 986f8fdf402fe967, StatelessResetToken: 0x56ac6b13924fe948838ee571b057a10c} 2025/04/30 08:47:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:19 server -> Sending packet 6 (38 bytes) for connection d448869dadc1154d4ecfb2fb8f39b922fed6012b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 79eefdd749304210, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 227.656µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:19 server <- Reading packet 5 (33 bytes) for connection 22b7565c, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: 22b7565c, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, DelayTime: 128µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server newly acked packets (1): [5] 2025/04/30 08:47:19 server updated RTT: 33.479ms (σ: 10.134ms) 2025/04/30 08:47:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:19 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:19 Replacing connection for connection IDs [22b7565c 6971f609 4063e067 6168f11e 1d314e3c] with a closed connection. 2025/04/30 08:47:19 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:19 server Connection d448869dadc1154d4ecfb2fb8f39b922fed6012b closed. 2025/04/30 08:47:19 server <- Reading packet 3 (77 bytes) for connection cb305a21, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: cb305a21, SrcConnectionID: 01f506e8a2591a47, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:19 Retiring connection ID 25ba55ad9bc0cd94397a58bcde17facd2954aaf1 in 5s. 2025/04/30 08:47:19 server Dropping Handshake keys. 2025/04/30 08:47:19 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 08:47:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 2 (352 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 01f506e8a2591a47, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d16cbc29, StatelessResetToken: 0x192d0afafc38ae86c817f0a12bc3654a} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8b6648b6, StatelessResetToken: 0x03d6881ff51787d76139deb924ddea99} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 90ef9415, StatelessResetToken: 0xd7c5913f2a226bb8e9c0cd5d172746c9} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5e7d1f95, StatelessResetToken: 0x711c8aa375448e11edc2db8dd8278325} 2025/04/30 08:47:19 server -> &wire.NewTokenFrame{Token: 0x265b28b85c872619cd820b0774fad7e35216e3aba3cd8bd285d964c9bace4a9937b9efcfd293fd67d81cc57b5e101755ef14ac26af35a4c84006aac2444022e20d6ae45adc73536339588a75bcce8e53a8ba5d96c497} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:19 server -> Sending packet 3 (352 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 01f506e8a2591a47, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5e7d1f95, StatelessResetToken: 0x711c8aa375448e11edc2db8dd8278325} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8b6648b6, StatelessResetToken: 0x03d6881ff51787d76139deb924ddea99} 2025/04/30 08:47:19 server -> &wire.NewTokenFrame{Token: 0x265b28b85c872619cd820b0774fad7e35216e3aba3cd8bd285d964c9bace4a9937b9efcfd293fd67d81cc57b5e101755ef14ac26af35a4c84006aac2444022e20d6ae45adc73536339588a75bcce8e53a8ba5d96c497} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 90ef9415, StatelessResetToken: 0xd7c5913f2a226bb8e9c0cd5d172746c9} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d16cbc29, StatelessResetToken: 0x192d0afafc38ae86c817f0a12bc3654a} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:19 server -> Sending packet 4 (1366 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 01f506e8a2591a47, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.PingFrame{} 2025/04/30 08:47:19 server <- Reading packet 0 (42 bytes) for connection cb305a21, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: cb305a21, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:19 server <- Reading packet 1 (106 bytes) for connection cb305a21, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: cb305a21, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9d536dec79af441d, StatelessResetToken: 0xc60f20202b0174ba5492c19ece3b5a68} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 083e15587c036e4a, StatelessResetToken: 0x7ffccfb2885e7ff3e16b9593738648f5} 2025/04/30 08:47:19 Received request: GET /bbjilhyszx 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 314094055ae31023, StatelessResetToken: 0x04b2abb9ea18f5723268f5729e72627a} 2025/04/30 08:47:19 server -> Sending packet 5 (40 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 9d536dec79af441d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 549.814813ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:19 server -> Sending packet 6 (1053 bytes) for connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: 9d536dec79af441d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:19 server <- Reading packet 2 (32 bytes) for connection cb305a21, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: cb305a21, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 88µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server <- Reading packet 3 (34 bytes) for connection cb305a21, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: cb305a21, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 56µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server newly acked packets (1): [5] 2025/04/30 08:47:19 server updated RTT: 31.912055ms (σ: 15.956027ms) 2025/04/30 08:47:19 server ECN capability confirmed. 2025/04/30 08:47:19 server setting loss timer for packet 3 (1-RTT) to 35.901061ms (in 2025-04-30 08:47:19.496336981 +0000 UTC m=+5.545199645) 2025/04/30 08:47:19 server Ignoring all packets below 2. 2025/04/30 08:47:19 server <- Reading packet 5 (37 bytes) for connection cb305a21, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: cb305a21, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 168µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:19 server newly acked packets (1): [6] 2025/04/30 08:47:19 server updated RTT: 32.015ms (σ: 12.174ms) 2025/04/30 08:47:19 server lost packet 3 (reordering threshold) 2025/04/30 08:47:19 server setting loss timer for packet 4 (1-RTT) to 36.83524ms (in 2025-04-30 08:47:19.49727116 +0000 UTC m=+5.546133824) 2025/04/30 08:47:19 server Canceling loss detection timer. 2025/04/30 08:47:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:19 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:19 Replacing connection for connection IDs [cb305a21 d16cbc29 8b6648b6 5e7d1f95 90ef9415] with a closed connection. 2025/04/30 08:47:19 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:19 server Connection 25ba55ad9bc0cd94397a58bcde17facd2954aaf1 closed. 2025/04/30 08:47:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:47:19 server -> Sending packet 9 (352 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: ebbb1ac32c691c1b, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2b989aac, StatelessResetToken: 0x4767af131bb816d546151580cd05deaf} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 969f2d64, StatelessResetToken: 0xe61f17f3c04d13986974f0c118d4117a} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ca0835be, StatelessResetToken: 0x2356b460bc226c5746bcf2f0f7387ce2} 2025/04/30 08:47:19 server -> &wire.NewTokenFrame{Token: 0x5af594c9696491c6b52b79a7936abc92291887873abfacd2d67d3eab356dc9f92651721cb1994b078a9c93bb3b276b3a77c940db5ff3874b4288bf1a4525dc43878c73aaec56c4f9eb3c14907bedfaae4d67383f7ba6} 2025/04/30 08:47:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4b7a5351, StatelessResetToken: 0x0915d0a7de0e3ff4431fecccfa401b43} 2025/04/30 08:47:19 server Skipping packet number 8 2025/04/30 08:47:19 server -> Sending packet 10 (29 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: ebbb1ac32c691c1b, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 08:47:19 server -> Sending packet 5 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 5, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:19 server -> Sending packet 6 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 6, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:19 server <- Reading packet 1 (45 bytes) for connection 7f135b70, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 7f135b70, SrcConnectionID: 4e1b6a25fa8eb7c2, PacketNumber: 1, PacketNumberLen: 1, Length: 24, Version: v1} 2025/04/30 08:47:19 server Dropping Initial keys. 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 48µs} 2025/04/30 08:47:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 7 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 7, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:19 server -> Sending packet 8 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 8, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 08:47:19 server -> Sending packet 4 (1280 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: a86dd29a373072f5, SrcConnectionID: 784400f0, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server -> Sending packet 5 (1280 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: a86dd29a373072f5, SrcConnectionID: 784400f0, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:19 server Canceling loss detection timer. 2025/04/30 08:47:19 server Amplification window limited. Received 2400 bytes, already sent out 7964 bytes 2025/04/30 08:47:19 server <- Reading packet 5 (1200 bytes) for connection 784400f0, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 784400f0, SrcConnectionID: a86dd29a373072f5, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 216µs} 2025/04/30 08:47:19 server <- Reading packet 6 (1200 bytes) for connection 784400f0, Initial 2025/04/30 08:47:19 server Long Header{Type: Initial, DestConnectionID: 784400f0, SrcConnectionID: a86dd29a373072f5, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 32µs} 2025/04/30 08:47:19 server newly acked packets (1): [5] 2025/04/30 08:47:19 server updated RTT: 33.990475ms (σ: 16.995237ms) 2025/04/30 08:47:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 08:47:19 server -> Sending packet 3 (758 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: a86dd29a373072f5, SrcConnectionID: 784400f0, PacketNumber: 3, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:19 server -> Sending packet 4 (758 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: a86dd29a373072f5, SrcConnectionID: 784400f0, PacketNumber: 4, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:19 server <- Reading packet 7 (50 bytes) for connection e07bba01, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: e07bba01, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7d9dffabb8c1754f, StatelessResetToken: 0x7dc386fcd1f726c2b447dced9e4c9586} 2025/04/30 08:47:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:19 server <- Reading packet 8 (50 bytes) for connection e07bba01, 1-RTT 2025/04/30 08:47:19 server Short Header{DestConnectionID: e07bba01, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7d9dffabb8c1754f, StatelessResetToken: 0x7dc386fcd1f726c2b447dced9e4c9586} 2025/04/30 08:47:19 server -> Sending packet 11 (39 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:19 server Short Header{DestConnectionID: ebbb1ac32c691c1b, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:19 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 131.065µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 08:47:19 Tracking 264 connection IDs and 3 reset tokens. 2025/04/30 08:47:19 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:19 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:19 server <- Reading packet 1 (43 bytes) for connection 784400f0, Handshake 2025/04/30 08:47:19 server Long Header{Type: Handshake, DestConnectionID: 784400f0, SrcConnectionID: a86dd29a373072f5, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:19 server Dropping Initial keys. 2025/04/30 08:47:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 24µs} 2025/04/30 08:47:19 server newly acked packets (1): [4] 2025/04/30 08:47:19 server updated RTT: 33.723ms (σ: 13.279ms) 2025/04/30 08:47:19 server Canceling loss detection timer. 2025/04/30 08:47:20 server <- Received Initial packet. 2025/04/30 08:47:20 Created qlog file: /logs/qlog/692c9d9cc1d91233db96f50fdee69d79a618aa5c.sqlog 2025/04/30 08:47:20 server Changing connection ID to b2ed529a. 2025/04/30 08:47:20 Adding connection IDs 692c9d9cc1d91233db96f50fdee69d79a618aa5c and b2ed529a for a new connection. 2025/04/30 08:47:20 server <- Reading packet 5 (1200 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 692c9d9cc1d91233db96f50fdee69d79a618aa5c, SrcConnectionID: c76422ccd2dfceba, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c76422ccd2dfceba, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:20 Adding connection ID 8971fe93. 2025/04/30 08:47:20 Adding connection ID 73ea8999. 2025/04/30 08:47:20 Adding connection ID c6d99169. 2025/04/30 08:47:20 Adding connection ID 7bd036d4. 2025/04/30 08:47:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: c76422ccd2dfceba, SrcConnectionID: b2ed529a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 369, Version: v1} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: c76422ccd2dfceba, SrcConnectionID: b2ed529a, PacketNumber: 0, PacketNumberLen: 2, Length: 745, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 08:47:20 server Short Header{DestConnectionID: c76422ccd2dfceba, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6d99169, StatelessResetToken: 0xe21f92f46b8f5944c307e5b44c43deaf} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8971fe93, StatelessResetToken: 0x8ef1b0f20bf5bd470f6d52b5954fce84} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 73ea8999, StatelessResetToken: 0x2c6f257d070c5b1eaedab67905b82f4a} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7bd036d4, StatelessResetToken: 0x98376271290dd5b8bbc63603ebc80e9c} 2025/04/30 08:47:20 server <- Reading packet 6 (1200 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 692c9d9cc1d91233db96f50fdee69d79a618aa5c, SrcConnectionID: c76422ccd2dfceba, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:20 server -> Sending packet 1 (48 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: c76422ccd2dfceba, SrcConnectionID: b2ed529a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server <- Received Initial packet. 2025/04/30 08:47:20 Created qlog file: /logs/qlog/fde5971df75bf02b5aa1ab0c74b787e40eeb65b4.sqlog 2025/04/30 08:47:20 server Changing connection ID to bffc6df7. 2025/04/30 08:47:20 Adding connection IDs fde5971df75bf02b5aa1ab0c74b787e40eeb65b4 and bffc6df7 for a new connection. 2025/04/30 08:47:20 server <- Reading packet 6 (1200 bytes) for connection fde5971df75bf02b5aa1ab0c74b787e40eeb65b4, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: fde5971df75bf02b5aa1ab0c74b787e40eeb65b4, SrcConnectionID: 21f23dbc90484ab8, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 21f23dbc90484ab8, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:20 Adding connection ID ea42630d. 2025/04/30 08:47:20 Adding connection ID bfd94b69. 2025/04/30 08:47:20 Adding connection ID c2574e72. 2025/04/30 08:47:20 Adding connection ID 97955ae6. 2025/04/30 08:47:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection fde5971df75bf02b5aa1ab0c74b787e40eeb65b4 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 21f23dbc90484ab8, SrcConnectionID: bffc6df7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 371, Version: v1} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: 21f23dbc90484ab8, SrcConnectionID: bffc6df7, PacketNumber: 0, PacketNumberLen: 2, Length: 743, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 08:47:20 server Short Header{DestConnectionID: 21f23dbc90484ab8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 97955ae6, StatelessResetToken: 0xd899072e10a6daec6146a69110cb6502} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bfd94b69, StatelessResetToken: 0x341e783be854cfe1629d77af87d671cf} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ea42630d, StatelessResetToken: 0x2e7c5da16a77db37da37fa40e2454be0} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c2574e72, StatelessResetToken: 0x1a1fd69427b5cda880ef388e4430e62c} 2025/04/30 08:47:20 server <- Received Initial packet. 2025/04/30 08:47:20 Created qlog file: /logs/qlog/7218fd8c3bc602a55cf95322ae110329f076c43b.sqlog 2025/04/30 08:47:20 server Changing connection ID to d7ad8259. 2025/04/30 08:47:20 Adding connection IDs 7218fd8c3bc602a55cf95322ae110329f076c43b and d7ad8259 for a new connection. 2025/04/30 08:47:20 server <- Reading packet 6 (1200 bytes) for connection 7218fd8c3bc602a55cf95322ae110329f076c43b, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 7218fd8c3bc602a55cf95322ae110329f076c43b, SrcConnectionID: 96aaf09d6a76acd6, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 96aaf09d6a76acd6, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:20 Adding connection ID 2edad74e. 2025/04/30 08:47:20 Adding connection ID 02ea0e19. 2025/04/30 08:47:20 Adding connection ID 25c05599. 2025/04/30 08:47:20 Adding connection ID 31db0540. 2025/04/30 08:47:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7218fd8c3bc602a55cf95322ae110329f076c43b 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 96aaf09d6a76acd6, SrcConnectionID: d7ad8259, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 381, Version: v1} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: 96aaf09d6a76acd6, SrcConnectionID: d7ad8259, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 08:47:20 server Short Header{DestConnectionID: 96aaf09d6a76acd6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 25c05599, StatelessResetToken: 0x158363c091995ec308e676c04748744d} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2edad74e, StatelessResetToken: 0x277a4ada014736de71f00dc8936db4d6} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 31db0540, StatelessResetToken: 0xe29e7d12aa978472acc2ed6134782ec3} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 02ea0e19, StatelessResetToken: 0x1e7f31bdcf4de63d50e53e64c2cc71ba} 2025/04/30 08:47:20 server <- Received Initial packet. 2025/04/30 08:47:20 Created qlog file: /logs/qlog/88382e68c2759be5020a2a4e2dd18ff834208517.sqlog 2025/04/30 08:47:20 server Changing connection ID to 7d95f323. 2025/04/30 08:47:20 Adding connection IDs 88382e68c2759be5020a2a4e2dd18ff834208517 and 7d95f323 for a new connection. 2025/04/30 08:47:20 server <- Reading packet 5 (1200 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 88382e68c2759be5020a2a4e2dd18ff834208517, SrcConnectionID: 7e03fd75520dd053, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7e03fd75520dd053, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:20 Adding connection ID 21000d13. 2025/04/30 08:47:20 Adding connection ID 3f300da2. 2025/04/30 08:47:20 Adding connection ID b344a33d. 2025/04/30 08:47:20 Adding connection ID 675f20d9. 2025/04/30 08:47:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 7e03fd75520dd053, SrcConnectionID: 7d95f323, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 368, Version: v1} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: 7e03fd75520dd053, SrcConnectionID: 7d95f323, PacketNumber: 0, PacketNumberLen: 2, Length: 746, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 724, Offset + Data length: 724} 2025/04/30 08:47:20 server Short Header{DestConnectionID: 7e03fd75520dd053, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3f300da2, StatelessResetToken: 0x7dfd5614d01421c936f1c526a92c2b98} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 21000d13, StatelessResetToken: 0x4179ca8cf0a22483099b6e1096986088} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 675f20d9, StatelessResetToken: 0x06a2db443a4426c242f1d8abdd389142} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: b344a33d, StatelessResetToken: 0x78111174fd82940a5f9496727179f3e9} 2025/04/30 08:47:20 server <- Received Initial packet. 2025/04/30 08:47:20 Created qlog file: /logs/qlog/6f053b5d33f2bd5692b0e19161e0d119a5315500.sqlog 2025/04/30 08:47:20 server Changing connection ID to 76f17952. 2025/04/30 08:47:20 Adding connection IDs 6f053b5d33f2bd5692b0e19161e0d119a5315500 and 76f17952 for a new connection. 2025/04/30 08:47:20 server <- Reading packet 5 (1200 bytes) for connection 6f053b5d33f2bd5692b0e19161e0d119a5315500, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 6f053b5d33f2bd5692b0e19161e0d119a5315500, SrcConnectionID: 9edfe166ddd991ef, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 9edfe166ddd991ef, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:20 Adding connection ID f66357b9. 2025/04/30 08:47:20 Adding connection ID 66b485d2. 2025/04/30 08:47:20 Adding connection ID 8df6119f. 2025/04/30 08:47:20 Adding connection ID 2e6f3ae7. 2025/04/30 08:47:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6f053b5d33f2bd5692b0e19161e0d119a5315500 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 9edfe166ddd991ef, SrcConnectionID: 76f17952, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 377, Version: v1} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: 9edfe166ddd991ef, SrcConnectionID: 76f17952, PacketNumber: 0, PacketNumberLen: 2, Length: 737, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 715, Offset + Data length: 715} 2025/04/30 08:47:20 server Short Header{DestConnectionID: 9edfe166ddd991ef, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8df6119f, StatelessResetToken: 0x0baff24df8e34c507c217dacfc7ea756} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 66b485d2, StatelessResetToken: 0xd6edc4a38914653cd96210a7aaadb5d3} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f66357b9, StatelessResetToken: 0x369f1344f33553a0eabe0121714eeaab} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2e6f3ae7, StatelessResetToken: 0x3e02d3b4157ab0a0bb5baaa03b1ab833} 2025/04/30 08:47:20 server <- Reading packet 6 (1200 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 88382e68c2759be5020a2a4e2dd18ff834208517, SrcConnectionID: 7e03fd75520dd053, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:20 server -> Sending packet 1 (48 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 7e03fd75520dd053, SrcConnectionID: 7d95f323, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server <- Received Initial packet. 2025/04/30 08:47:20 Created qlog file: /logs/qlog/553f9619cb2f4ad38a44b412e46c594a642fb95c.sqlog 2025/04/30 08:47:20 server Changing connection ID to 09be36e7. 2025/04/30 08:47:20 Adding connection IDs 553f9619cb2f4ad38a44b412e46c594a642fb95c and 09be36e7 for a new connection. 2025/04/30 08:47:20 server <- Reading packet 6 (1200 bytes) for connection 553f9619cb2f4ad38a44b412e46c594a642fb95c, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 553f9619cb2f4ad38a44b412e46c594a642fb95c, SrcConnectionID: d83d70687aa3d41b, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d83d70687aa3d41b, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:47:20 Adding connection ID 48ead9c9. 2025/04/30 08:47:20 Adding connection ID cb49c95d. 2025/04/30 08:47:20 Adding connection ID 1aefeb6f. 2025/04/30 08:47:20 Adding connection ID b8ab1219. 2025/04/30 08:47:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 553f9619cb2f4ad38a44b412e46c594a642fb95c 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: d83d70687aa3d41b, SrcConnectionID: 09be36e7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 373, Version: v1} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: d83d70687aa3d41b, SrcConnectionID: 09be36e7, PacketNumber: 0, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 08:47:20 server Short Header{DestConnectionID: d83d70687aa3d41b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cb49c95d, StatelessResetToken: 0x80d4d5251e9dd247507d824cf8c06184} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1aefeb6f, StatelessResetToken: 0x7d5df96fbe944ed2686ab5a7c5d1ce4f} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 48ead9c9, StatelessResetToken: 0x20f96b507d2e6475a8d080e2d206f967} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b8ab1219, StatelessResetToken: 0x72c096e247ea65ba6b1d3d13fd6af680} 2025/04/30 08:47:20 server <- Reading packet 6 (1200 bytes) for connection 6f053b5d33f2bd5692b0e19161e0d119a5315500, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 6f053b5d33f2bd5692b0e19161e0d119a5315500, SrcConnectionID: 9edfe166ddd991ef, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:47:20 server -> Sending packet 1 (48 bytes) for connection 6f053b5d33f2bd5692b0e19161e0d119a5315500, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 9edfe166ddd991ef, SrcConnectionID: 76f17952, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:47:20 server -> Sending packet 9 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 9, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:20 server -> Sending packet 10 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 10, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:20 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:20 server <- Reading packet 7 (44 bytes) for connection bffc6df7, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: bffc6df7, SrcConnectionID: 21f23dbc90484ab8, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 08:47:20 server newly acked packets (1): [0] 2025/04/30 08:47:20 server updated RTT: 33.146823ms (σ: 16.573411ms) 2025/04/30 08:47:20 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:20 server <- Reading packet 0 (1156 bytes) for connection bffc6df7, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: bffc6df7, SrcConnectionID: 21f23dbc90484ab8, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:20 server Dropping Initial keys. 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 376µs} 2025/04/30 08:47:20 server newly acked packets (1): [0] 2025/04/30 08:47:20 server updated RTT: 33.146ms (σ: 12.429ms) 2025/04/30 08:47:20 server Canceling loss detection timer. 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 Retiring connection ID fde5971df75bf02b5aa1ab0c74b787e40eeb65b4 in 5s. 2025/04/30 08:47:20 server Dropping Handshake keys. 2025/04/30 08:47:20 server -> Sending packet 1 (259 bytes) for connection fde5971df75bf02b5aa1ab0c74b787e40eeb65b4, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 21f23dbc90484ab8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:20 server -> &wire.NewTokenFrame{Token: 0x0fce06a0af71a9124962a2e4e3bcb9e62f31c5416ac64af69a1393e87c4f43a41a53e27148f2d14bb5d8b32e5a6218c7610ca0a3ca19eeecaa1f8af15ca03aeba4b4888223ac718d345badf765829f3453fa3ced0e45} 2025/04/30 08:47:20 server <- Reading packet 1 (106 bytes) for connection bffc6df7, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: bffc6df7, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 343137696aecf23d, StatelessResetToken: 0xe7d802996d59162efbbb529f7f7e9978} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8660fc12d9da2590, StatelessResetToken: 0xcf6e5953a4eeed2f4e124e2b9c2e3c79} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 5ce2b0bbb6776a8b, StatelessResetToken: 0xe031a089f686609e3200e6f264d70fad} 2025/04/30 08:47:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:20 server -> Sending packet 2 (37 bytes) for connection fde5971df75bf02b5aa1ab0c74b787e40eeb65b4, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 343137696aecf23d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 433.584µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:20 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:20 server <- Reading packet 7 (44 bytes) for connection d7ad8259, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: d7ad8259, SrcConnectionID: 96aaf09d6a76acd6, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 248µs} 2025/04/30 08:47:20 server newly acked packets (1): [0] 2025/04/30 08:47:20 server updated RTT: 33.26259ms (σ: 16.631295ms) 2025/04/30 08:47:20 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:20 server <- Reading packet 0 (1156 bytes) for connection d7ad8259, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: d7ad8259, SrcConnectionID: 96aaf09d6a76acd6, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:20 server Dropping Initial keys. 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 248µs} 2025/04/30 08:47:20 server newly acked packets (1): [0] 2025/04/30 08:47:20 server updated RTT: 33.262ms (σ: 12.473ms) 2025/04/30 08:47:20 server Canceling loss detection timer. 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 Retiring connection ID 7218fd8c3bc602a55cf95322ae110329f076c43b in 5s. 2025/04/30 08:47:20 server Dropping Handshake keys. 2025/04/30 08:47:20 server -> Sending packet 1 (259 bytes) for connection 7218fd8c3bc602a55cf95322ae110329f076c43b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 96aaf09d6a76acd6, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:20 server -> &wire.NewTokenFrame{Token: 0xea5b2765d875786afeba46a69b1e1d1f48b37a0a90988b992fa1ae3a63a66afa5e047ffad19e4b2b050b0a4c033fa264260c13ee6d10087f1a77fab28ea3f3f8889f828f24f8332a47ac21d527563c01ffe0358fc999} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:20 server <- Reading packet 2 (106 bytes) for connection d7ad8259, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: d7ad8259, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: adb9bd6f8aa3922f, StatelessResetToken: 0xed08ea5738ec3b02643d5955adf95a3a} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: faa1685805103193, StatelessResetToken: 0xe2fa25b62f4edc8ed23f1b1851ddc9b7} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 8346b4903015b548, StatelessResetToken: 0x9f7ec0c1f0f7d6bfbc2c07199321fe0d} 2025/04/30 08:47:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:20 server -> Sending packet 2 (37 bytes) for connection 7218fd8c3bc602a55cf95322ae110329f076c43b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: adb9bd6f8aa3922f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 229.19µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:20 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:20 server <- Reading packet 7 (44 bytes) for connection 7d95f323, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 7d95f323, SrcConnectionID: 7e03fd75520dd053, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 248µs} 2025/04/30 08:47:20 server newly acked packets (1): [0] 2025/04/30 08:47:20 server updated RTT: 33.435438ms (σ: 16.717719ms) 2025/04/30 08:47:20 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:20 server <- Reading packet 0 (1156 bytes) for connection 7d95f323, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: 7d95f323, SrcConnectionID: 7e03fd75520dd053, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:20 server Dropping Initial keys. 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 248µs} 2025/04/30 08:47:20 server newly acked packets (1): [0] 2025/04/30 08:47:20 server updated RTT: 33.435ms (σ: 12.537ms) 2025/04/30 08:47:20 server Canceling loss detection timer. 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 Retiring connection ID 88382e68c2759be5020a2a4e2dd18ff834208517 in 5s. 2025/04/30 08:47:20 server Dropping Handshake keys. 2025/04/30 08:47:20 server -> Sending packet 1 (259 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 7e03fd75520dd053, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:20 server -> &wire.NewTokenFrame{Token: 0x88015c92c9d06a6f34201b62f680c63a943d2f053d5670d58c06987c9017cd5569d94b02fba536906de9d2b40238031dbcf0a887811a307a9b4fb84b7dd57d61ecfb6b23d8cbd15b9817364ab0ad1c6ba6c5decd26da} 2025/04/30 08:47:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:20 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:47:20 server <- Reading packet 7 (44 bytes) for connection 76f17952, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: 76f17952, SrcConnectionID: 9edfe166ddd991ef, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 272µs} 2025/04/30 08:47:20 server newly acked packets (1): [0] 2025/04/30 08:47:20 server updated RTT: 33.654493ms (σ: 16.827246ms) 2025/04/30 08:47:20 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:47:20 server <- Reading packet 0 (1156 bytes) for connection 76f17952, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: 76f17952, SrcConnectionID: 9edfe166ddd991ef, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:47:20 server Dropping Initial keys. 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 272µs} 2025/04/30 08:47:20 server newly acked packets (1): [0] 2025/04/30 08:47:20 server updated RTT: 33.654ms (σ: 12.62ms) 2025/04/30 08:47:20 server Canceling loss detection timer. 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 Retiring connection ID 6f053b5d33f2bd5692b0e19161e0d119a5315500 in 5s. 2025/04/30 08:47:20 server Dropping Handshake keys. 2025/04/30 08:47:20 server -> Sending packet 1 (259 bytes) for connection 6f053b5d33f2bd5692b0e19161e0d119a5315500, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 9edfe166ddd991ef, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:20 server -> &wire.NewTokenFrame{Token: 0xd8e658184936b5130f43b9aff4c141eae912246d06a4964b825984b22e8fcb351fa6872737c7f23f248fa87ebf764127dc6f55deb9aeb2ae558dc1e2ca74c695f210ce19cd8672c07b2e49f4409f2df03b97d91ec666} 2025/04/30 08:47:20 server <- Reading packet 0 (42 bytes) for connection 76f17952, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: 76f17952, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:20 server <- Reading packet 1 (106 bytes) for connection 76f17952, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: 76f17952, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8a919233c8c8a7e8, StatelessResetToken: 0x9208912ab8d444ac3cf2267cb91246a1} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 08d65f09258e6e4f, StatelessResetToken: 0x39dca18b87d145537d92aa0f2a39bc53} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 348d3c1251b8c129, StatelessResetToken: 0x8515a55c6d0370135d2056d78a816cb6} 2025/04/30 08:47:20 Received request: GET /tbqhaeolix 2025/04/30 08:47:20 server -> Sending packet 2 (38 bytes) for connection 6f053b5d33f2bd5692b0e19161e0d119a5315500, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 8a919233c8c8a7e8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 716.219µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:20 server -> Sending packet 3 (1053 bytes) for connection 6f053b5d33f2bd5692b0e19161e0d119a5315500, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 8a919233c8c8a7e8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:20 server Queueing packet (42 bytes) for later decryption 2025/04/30 08:47:20 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:20 server <- Reading packet 3 (47 bytes) for connection 7f135b70, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: 7f135b70, SrcConnectionID: 4e1b6a25fa8eb7c2, PacketNumber: 3, PacketNumberLen: 1, Length: 26, Version: v1} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 1, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 16µs} 2025/04/30 08:47:20 server <- Reading packet 2 (32 bytes) for connection bffc6df7, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: bffc6df7, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (2): [0 2] 2025/04/30 08:47:20 server updated RTT: 32.894ms (σ: 9.824ms) 2025/04/30 08:47:20 server ECN capability confirmed. 2025/04/30 08:47:20 server setting loss timer for packet 1 (1-RTT) to 37.00575ms (in 2025-04-30 08:47:20.141024001 +0000 UTC m=+6.189886665) 2025/04/30 08:47:20 server Ignoring all packets below 2. 2025/04/30 08:47:20 server <- Reading packet 3 (50 bytes) for connection bffc6df7, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: bffc6df7, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 6058104e7867f811, StatelessResetToken: 0xc8eb3563737c947671ac3f1ab21051a8} 2025/04/30 08:47:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:20 server <- Reading packet 3 (30 bytes) for connection d7ad8259, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: d7ad8259, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 48µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (2): [0 1] 2025/04/30 08:47:20 server updated RTT: 32.964ms (σ: 9.95ms) 2025/04/30 08:47:20 server ECN capability confirmed. 2025/04/30 08:47:20 server <- Reading packet 4 (50 bytes) for connection d7ad8259, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: d7ad8259, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: a8e8bd9d340310ee, StatelessResetToken: 0xb45e2e06bbef894085c138f726437cab} 2025/04/30 08:47:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:20 server <- Reading packet 2 (30 bytes) for connection 7d95f323, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: 7d95f323, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (2): [0 1] 2025/04/30 08:47:20 server updated RTT: 33.103ms (σ: 10.066ms) 2025/04/30 08:47:20 server ECN capability confirmed. 2025/04/30 08:47:20 server Canceling loss detection timer. 2025/04/30 08:47:20 server <- Reading packet 2 (30 bytes) for connection 76f17952, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: 76f17952, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 32µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (2): [0 1] 2025/04/30 08:47:20 server updated RTT: 33.306ms (σ: 10.16ms) 2025/04/30 08:47:20 server ECN capability confirmed. 2025/04/30 08:47:20 server <- Reading packet 3 (32 bytes) for connection 76f17952, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: 76f17952, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 32µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (1): [3] 2025/04/30 08:47:20 server updated RTT: 33.067ms (σ: 8.096ms) 2025/04/30 08:47:20 server setting loss timer for packet 2 (1-RTT) to 37.200375ms (in 2025-04-30 08:47:20.144939599 +0000 UTC m=+6.193802252) 2025/04/30 08:47:20 server -> Sending packet 4 (30 bytes) for connection 6f053b5d33f2bd5692b0e19161e0d119a5315500, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 8a919233c8c8a7e8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:20 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 08:47:20.141024001 +0000 UTC m=+6.189886665 2025/04/30 08:47:20 server lost packet 1 (time threshold) 2025/04/30 08:47:20 server Canceling loss detection timer. 2025/04/30 08:47:20 server -> Sending packet 3 (268 bytes) for connection fde5971df75bf02b5aa1ab0c74b787e40eeb65b4, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 343137696aecf23d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 6.362142ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:20 server -> &wire.NewTokenFrame{Token: 0x0fce06a0af71a9124962a2e4e3bcb9e62f31c5416ac64af69a1393e87c4f43a41a53e27148f2d14bb5d8b32e5a6218c7610ca0a3ca19eeecaa1f8af15ca03aeba4b4888223ac718d345badf765829f3453fa3ced0e45} 2025/04/30 08:47:20 server <- Reading packet 4 (42 bytes) for connection bffc6df7, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: bffc6df7, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:20 Received request: GET /tyioyoawfi 2025/04/30 08:47:20 server -> Sending packet 4 (1061 bytes) for connection fde5971df75bf02b5aa1ab0c74b787e40eeb65b4, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 343137696aecf23d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 254.588µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:20 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 08:47:20.144939599 +0000 UTC m=+6.193802252 2025/04/30 08:47:20 server lost packet 2 (time threshold) 2025/04/30 08:47:20 server -> Sending packet 5 (29 bytes) for connection 6f053b5d33f2bd5692b0e19161e0d119a5315500, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 8a919233c8c8a7e8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:20 server Sending ACK because the ACK timer expired. 2025/04/30 08:47:20 server -> Sending packet 3 (36 bytes) for connection 7218fd8c3bc602a55cf95322ae110329f076c43b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: adb9bd6f8aa3922f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 25.535373ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server <- Reading packet 12 (50 bytes) for connection b0fe6155, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: b0fe6155, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8d3933dd337a681a, StatelessResetToken: 0xc914249d09366860703dcc618469e174} 2025/04/30 08:47:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:20 server -> Sending packet 14 (1387 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: f079ae84ccbda7a7, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.PingFrame{} 2025/04/30 08:47:20 server <- Reading packet 13 (50 bytes) for connection b0fe6155, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: b0fe6155, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 8d3933dd337a681a, StatelessResetToken: 0xc914249d09366860703dcc618469e174} 2025/04/30 08:47:20 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 08:47:20 server -> Sending packet 15 (37 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: f079ae84ccbda7a7, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 1, AckRanges: {{Largest: 13, Smallest: 7}, {Largest: 2, Smallest: 1}}, DelayTime: 137.825µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server <- Reading packet 5 (36 bytes) for connection 76f17952, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: 76f17952, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 37.208ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:20 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:20 Replacing connection for connection IDs [8df6119f 2e6f3ae7 76f17952 f66357b9 66b485d2] with a closed connection. 2025/04/30 08:47:20 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:20 server Connection 6f053b5d33f2bd5692b0e19161e0d119a5315500 closed. 2025/04/30 08:47:20 server <- Reading packet 6 (33 bytes) for connection bffc6df7, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: bffc6df7, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 304µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (2): [3 4] 2025/04/30 08:47:20 server updated RTT: 32.722ms (σ: 7.71ms) 2025/04/30 08:47:20 server Canceling loss detection timer. 2025/04/30 08:47:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:20 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:20 Replacing connection for connection IDs [bffc6df7 ea42630d bfd94b69 c2574e72 97955ae6] with a closed connection. 2025/04/30 08:47:20 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:20 server Connection fde5971df75bf02b5aa1ab0c74b787e40eeb65b4 closed. 2025/04/30 08:47:20 server <- Reading packet 14 (40 bytes) for connection b0fe6155, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: b0fe6155, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 0, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (1): [14] 2025/04/30 08:47:20 server updated RTT: 31.638ms (σ: 7.131ms) 2025/04/30 08:47:20 server <- Reading packet 15 (42 bytes) for connection b0fe6155, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: b0fe6155, PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:20 Received request: GET /ihlmqtiiaq 2025/04/30 08:47:20 server -> Sending packet 5 (29 bytes) for connection 7218fd8c3bc602a55cf95322ae110329f076c43b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: adb9bd6f8aa3922f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:20 server -> Sending packet 6 (29 bytes) for connection 7218fd8c3bc602a55cf95322ae110329f076c43b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: adb9bd6f8aa3922f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:20 server -> Sending packet 16 (1063 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: f079ae84ccbda7a7, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 1, AckRanges: {{Largest: 15, Smallest: 7}, {Largest: 2, Smallest: 1}}, DelayTime: 374.07µs, ECT0: 11, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:20 server <- Reading packet 8 (33 bytes) for connection d7ad8259, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: d7ad8259, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 26.136ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (1): [6] 2025/04/30 08:47:20 server updated RTT: 32.954ms (σ: 7.48ms) 2025/04/30 08:47:20 server Canceling loss detection timer. 2025/04/30 08:47:20 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:20 server -> Sending packet 2 (1280 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: c76422ccd2dfceba, SrcConnectionID: b2ed529a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:20 server -> Sending packet 3 (1280 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: c76422ccd2dfceba, SrcConnectionID: b2ed529a, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:20 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:47:20 server -> Sending packet 1 (1280 bytes) for connection 553f9619cb2f4ad38a44b412e46c594a642fb95c, Initial 2025/04/30 08:47:20 server <- Reading packet 9 (26 bytes) for connection d7ad8259, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: d7ad8259, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.PingFrame{} 2025/04/30 08:47:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:20 server -> Sending packet 7 (1366 bytes) for connection 7218fd8c3bc602a55cf95322ae110329f076c43b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: adb9bd6f8aa3922f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.PingFrame{} 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: d83d70687aa3d41b, SrcConnectionID: 09be36e7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:20 server -> Sending packet 2 (1280 bytes) for connection 553f9619cb2f4ad38a44b412e46c594a642fb95c, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: d83d70687aa3d41b, SrcConnectionID: 09be36e7, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:47:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:20 server -> Sending packet 18 (1053 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: f079ae84ccbda7a7, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:20 server -> Sending packet 19 (1053 bytes) for connection 56c584c98fc991d7b87083eb794dc848a0d60e9e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: f079ae84ccbda7a7, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:20 server <- Reading packet 7 (1200 bytes) for connection b2ed529a, Initial 2025/04/30 08:47:20 server Long Header{Type: Initial, DestConnectionID: b2ed529a, SrcConnectionID: c76422ccd2dfceba, Token: (empty), PacketNumber: 7, PacketNumberLen: 1, Length: 1178, Version: v1} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 240µs} 2025/04/30 08:47:20 server Sending ACK because the ACK timer expired. 2025/04/30 08:47:20 server -> Sending packet 8 (38 bytes) for connection 7218fd8c3bc602a55cf95322ae110329f076c43b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: adb9bd6f8aa3922f, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 4, Smallest: 2}}, DelayTime: 25.278136ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server <- Reading packet 17 (35 bytes) for connection b0fe6155, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: b0fe6155, PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 19, LowestAcked: 14, AckRanges: {{Largest: 19, Smallest: 19}, {Largest: 15, Smallest: 14}}, DelayTime: 360µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (1): [19] 2025/04/30 08:47:20 server updated RTT: 31.754ms (σ: 5.58ms) 2025/04/30 08:47:20 server Canceling loss detection timer. 2025/04/30 08:47:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:20 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:20 Replacing connection for connection IDs [2cdfeddf b0fe6155 f41609d7 3260094f 8802608c] with a closed connection. 2025/04/30 08:47:20 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:20 server Connection 56c584c98fc991d7b87083eb794dc848a0d60e9e closed. 2025/04/30 08:47:20 server <- Reading packet 11 (42 bytes) for connection d7ad8259, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: d7ad8259, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:20 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:20 server -> Sending packet 9 (39 bytes) for connection 7218fd8c3bc602a55cf95322ae110329f076c43b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: adb9bd6f8aa3922f, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 8}, {Largest: 4, Smallest: 2}}, DelayTime: 118.481µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 08:47:20 Received request: GET /abwxfktnug 2025/04/30 08:47:20 server -> Sending packet 10 (1053 bytes) for connection 7218fd8c3bc602a55cf95322ae110329f076c43b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: adb9bd6f8aa3922f, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:20 server <- Reading packet 3 (77 bytes) for connection d2b14b2e, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: d2b14b2e, SrcConnectionID: 6152f1adf0aa5d1c, PacketNumber: 3, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 Retiring connection ID 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b in 5s. 2025/04/30 08:47:20 server Dropping Handshake keys. 2025/04/30 08:47:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:20 server -> Sending packet 2 (355 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 6152f1adf0aa5d1c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 874e5f1f, StatelessResetToken: 0xfa741b144628c6cb9186f6f71680896c} 2025/04/30 08:47:20 server -> &wire.NewTokenFrame{Token: 0x408f6bb0362e2ee29d0594429fb5e452053e96a6d3834c7b117b0f2c68f504838179a4f860983716dfa09c7bfd312cbe929516657a038c82dcec9587641b3a326f3218a9bd2a96631d902dd8f1c26e589a09e2a7e185} 2025/04/30 08:47:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c72d1b4d, StatelessResetToken: 0x93e17497ce2493ed918dc61c0e5487bb} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c368faa2, StatelessResetToken: 0x31c033cea9409ae5b9d7a74a2cf707cc} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e01e0939, StatelessResetToken: 0x92644ca5185e43244a99ece8cbebb749} 2025/04/30 08:47:20 server -> Sending packet 3 (355 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 6152f1adf0aa5d1c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.NewTokenFrame{Token: 0x408f6bb0362e2ee29d0594429fb5e452053e96a6d3834c7b117b0f2c68f504838179a4f860983716dfa09c7bfd312cbe929516657a038c82dcec9587641b3a326f3218a9bd2a96631d902dd8f1c26e589a09e2a7e185} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 874e5f1f, StatelessResetToken: 0xfa741b144628c6cb9186f6f71680896c} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c72d1b4d, StatelessResetToken: 0x93e17497ce2493ed918dc61c0e5487bb} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e01e0939, StatelessResetToken: 0x92644ca5185e43244a99ece8cbebb749} 2025/04/30 08:47:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c368faa2, StatelessResetToken: 0x31c033cea9409ae5b9d7a74a2cf707cc} 2025/04/30 08:47:20 server <- Reading packet 0 (42 bytes) for connection d2b14b2e, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: d2b14b2e, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:20 server <- Reading packet 1 (106 bytes) for connection d2b14b2e, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: d2b14b2e, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 905ad30696c981ca, StatelessResetToken: 0xf372dc060cefb9506c53a66c394472e1} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a4710ab86e9a4cf9, StatelessResetToken: 0x07dc59b1e473db95acb25d6dc1bbf70f} 2025/04/30 08:47:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9d2d274c53b0f780, StatelessResetToken: 0xbcfe83d847b49ec7c7d157b9f6dc526f} 2025/04/30 08:47:20 server -> Sending packet 4 (40 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 Received request: GET /bfcxnqoelz 2025/04/30 08:47:20 server Short Header{DestConnectionID: 905ad30696c981ca, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.201579433s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:20 server -> Sending packet 5 (1053 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 905ad30696c981ca, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:20 server <- Reading packet 12 (26 bytes) for connection e4ee6a80, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: e4ee6a80, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.PingFrame{} 2025/04/30 08:47:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:20 server <- Reading packet 13 (26 bytes) for connection e4ee6a80, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: e4ee6a80, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.PingFrame{} 2025/04/30 08:47:20 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 08:47:20 server -> Sending packet 11 (39 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: cc86b6dc0840ab6f, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 3, AckRanges: {{Largest: 13, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 66.668µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server <- Reading packet 12 (30 bytes) for connection d7ad8259, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: d7ad8259, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 8, DelayTime: 24µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (1): [10] 2025/04/30 08:47:20 server updated RTT: 32.77ms (σ: 5.977ms) 2025/04/30 08:47:20 server lost packet 7 (time threshold) 2025/04/30 08:47:20 server Canceling loss detection timer. 2025/04/30 08:47:20 server -> Sending packet 11 (30 bytes) for connection 7218fd8c3bc602a55cf95322ae110329f076c43b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: adb9bd6f8aa3922f, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:20 server <- Reading packet 2 (30 bytes) for connection d2b14b2e, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: d2b14b2e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 48µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (1): [5] 2025/04/30 08:47:20 server updated RTT: 34.071ms (σ: 10.885ms) 2025/04/30 08:47:20 server ECN capability confirmed. 2025/04/30 08:47:20 server setting loss timer for packet 3 (1-RTT) to 38.329875ms (in 2025-04-30 08:47:20.381790189 +0000 UTC m=+6.430652843) 2025/04/30 08:47:20 server -> Sending packet 6 (30 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 905ad30696c981ca, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 08:47:20 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 08:47:20.381790189 +0000 UTC m=+6.430652843 2025/04/30 08:47:20 server lost packet 3 (time threshold) 2025/04/30 08:47:20 server lost packet 4 (time threshold) 2025/04/30 08:47:20 server -> Sending packet 7 (357 bytes) for connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: 905ad30696c981ca, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e01e0939, StatelessResetToken: 0x92644ca5185e43244a99ece8cbebb749} 2025/04/30 08:47:20 server -> &wire.NewTokenFrame{Token: 0x408f6bb0362e2ee29d0594429fb5e452053e96a6d3834c7b117b0f2c68f504838179a4f860983716dfa09c7bfd312cbe929516657a038c82dcec9587641b3a326f3218a9bd2a96631d902dd8f1c26e589a09e2a7e185} 2025/04/30 08:47:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 874e5f1f, StatelessResetToken: 0xfa741b144628c6cb9186f6f71680896c} 2025/04/30 08:47:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c368faa2, StatelessResetToken: 0x31c033cea9409ae5b9d7a74a2cf707cc} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c72d1b4d, StatelessResetToken: 0x93e17497ce2493ed918dc61c0e5487bb} 2025/04/30 08:47:20 server <- Reading packet 14 (42 bytes) for connection e4ee6a80, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: e4ee6a80, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:20 Received request: GET /sxtffmhawy 2025/04/30 08:47:20 server -> Sending packet 12 (1065 bytes) for connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: cc86b6dc0840ab6f, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 3, AckRanges: {{Largest: 14, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 3, Smallest: 3}}, DelayTime: 229.538µs, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:20 server <- Reading packet 14 (34 bytes) for connection d7ad8259, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: d7ad8259, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 8, DelayTime: 30.896ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:20 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:20 Replacing connection for connection IDs [25c05599 31db0540 d7ad8259 2edad74e 02ea0e19] with a closed connection. 2025/04/30 08:47:20 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:20 server Connection 7218fd8c3bc602a55cf95322ae110329f076c43b closed. 2025/04/30 08:47:20 server Parsed a coalesced packet. Part 1: 53 bytes. Remaining: 34 bytes. 2025/04/30 08:47:20 server Dropping %!s(logging.PacketType=1) packet (53 bytes) because we already dropped the keys. 2025/04/30 08:47:20 server <- Reading packet 4 (34 bytes) for connection d2b14b2e, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: d2b14b2e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 31.056ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:20 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:20 Replacing connection for connection IDs [874e5f1f d2b14b2e c368faa2 e01e0939 c72d1b4d] with a closed connection. 2025/04/30 08:47:20 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:20 server Connection 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b closed. 2025/04/30 08:47:20 server <- Reading packet 15 (30 bytes) for connection e4ee6a80, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: e4ee6a80, PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 11, DelayTime: 56µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (1): [12] 2025/04/30 08:47:20 server updated RTT: 38.867ms (σ: 14.654ms) 2025/04/30 08:47:20 server lost packet 9 (time threshold) 2025/04/30 08:47:20 server Canceling loss detection timer. 2025/04/30 08:47:20 server Ignoring all packets below 15. 2025/04/30 08:47:20 server <- Reading packet 16 (33 bytes) for connection e4ee6a80, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: e4ee6a80, PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 11, DelayTime: 216µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:20 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:20 Replacing connection for connection IDs [d3fa2405 3fbeb11a e4ee6a80 76d94cef ce26594a] with a closed connection. 2025/04/30 08:47:20 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:20 server Connection b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d closed. 2025/04/30 08:47:20 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:47:20 server -> Sending packet 1 (766 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: c76422ccd2dfceba, SrcConnectionID: b2ed529a, PacketNumber: 1, PacketNumberLen: 2, Length: 745, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 08:47:20 server -> Sending packet 2 (766 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: c76422ccd2dfceba, SrcConnectionID: b2ed529a, PacketNumber: 2, PacketNumberLen: 2, Length: 745, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 723, Offset + Data length: 723} 2025/04/30 08:47:20 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:47:20 server -> Sending packet 1 (762 bytes) for connection 553f9619cb2f4ad38a44b412e46c594a642fb95c, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: d83d70687aa3d41b, SrcConnectionID: 09be36e7, PacketNumber: 1, PacketNumberLen: 2, Length: 741, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 719, Offset + Data length: 719} 2025/04/30 08:47:20 server Canceling loss detection timer. 2025/04/30 08:47:20 server Amplification window limited. Received 1348 bytes, already sent out 4602 bytes 2025/04/30 08:47:20 server <- Reading packet 0 (82 bytes) for connection b2ed529a, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: b2ed529a, SrcConnectionID: c76422ccd2dfceba, PacketNumber: 0, PacketNumberLen: 1, Length: 61, Version: v1} 2025/04/30 08:47:20 server Dropping Initial keys. 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 296µs} 2025/04/30 08:47:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:20 Retiring connection ID 692c9d9cc1d91233db96f50fdee69d79a618aa5c in 5s. 2025/04/30 08:47:20 server Dropping Handshake keys. 2025/04/30 08:47:20 server <- Reading packet 0 (42 bytes) for connection b2ed529a, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: b2ed529a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:20 Received request: GET /nceruqdgne 2025/04/30 08:47:20 server -> Sending packet 2 (360 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: c76422ccd2dfceba, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 330.219µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7bd036d4, StatelessResetToken: 0x98376271290dd5b8bbc63603ebc80e9c} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6d99169, StatelessResetToken: 0xe21f92f46b8f5944c307e5b44c43deaf} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 73ea8999, StatelessResetToken: 0x2c6f257d070c5b1eaedab67905b82f4a} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8971fe93, StatelessResetToken: 0x8ef1b0f20bf5bd470f6d52b5954fce84} 2025/04/30 08:47:20 server -> &wire.NewTokenFrame{Token: 0x7b9eaab01c16bcf99a9de78a8d79797d18e2512f562f7fcdd8c8839534549d12dd079b416c1c1c8b2f03e4ea5408907d57a937ae8210b0503f7a996e7dbb10efc1fbae7d810a58f4ef57187c97a8b76082cb3f8d7ddc} 2025/04/30 08:47:20 server -> Sending packet 3 (1280 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: c76422ccd2dfceba, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 7bd036d4, StatelessResetToken: 0x98376271290dd5b8bbc63603ebc80e9c} 2025/04/30 08:47:20 server -> &wire.NewTokenFrame{Token: 0x7b9eaab01c16bcf99a9de78a8d79797d18e2512f562f7fcdd8c8839534549d12dd079b416c1c1c8b2f03e4ea5408907d57a937ae8210b0503f7a996e7dbb10efc1fbae7d810a58f4ef57187c97a8b76082cb3f8d7ddc} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8971fe93, StatelessResetToken: 0x8ef1b0f20bf5bd470f6d52b5954fce84} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 73ea8999, StatelessResetToken: 0x2c6f257d070c5b1eaedab67905b82f4a} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c6d99169, StatelessResetToken: 0xe21f92f46b8f5944c307e5b44c43deaf} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 926, Offset + Data length: 926} 2025/04/30 08:47:20 server -> Sending packet 4 (1366 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: c76422ccd2dfceba, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.PingFrame{} 2025/04/30 08:47:20 server -> Sending packet 5 (129 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: c76422ccd2dfceba, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 926, Data length: 98, Offset + Data length: 1024} 2025/04/30 08:47:20 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 08:47:20 server -> Sending packet 11 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 11, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:20 server -> Sending packet 12 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 12, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:20 server <- Reading packet 1 (43 bytes) for connection 09be36e7, Handshake 2025/04/30 08:47:20 server Long Header{Type: Handshake, DestConnectionID: 09be36e7, SrcConnectionID: d83d70687aa3d41b, PacketNumber: 1, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:47:20 server Dropping Initial keys. 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 56µs} 2025/04/30 08:47:20 server newly acked packets (1): [1] 2025/04/30 08:47:20 server updated RTT: 31.484573ms (σ: 15.742286ms) 2025/04/30 08:47:20 server <- Reading packet 2 (30 bytes) for connection b2ed529a, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: b2ed529a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 104µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (1): [3] 2025/04/30 08:47:20 server updated RTT: 32.490852ms (σ: 16.245426ms) 2025/04/30 08:47:20 server ECN capability confirmed. 2025/04/30 08:47:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 08:47:20 server -> Sending packet 13 (1053 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: ebbb1ac32c691c1b, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:20 server Skipping packet number 12 2025/04/30 08:47:20 server -> Sending packet 14 (352 bytes) for connection d024fc8a956f09574d4210c81a4bb178d36d30b5, 1-RTT (ECN: Not-ECT) 2025/04/30 08:47:20 server Short Header{DestConnectionID: ebbb1ac32c691c1b, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.NewTokenFrame{Token: 0x5af594c9696491c6b52b79a7936abc92291887873abfacd2d67d3eab356dc9f92651721cb1994b078a9c93bb3b276b3a77c940db5ff3874b4288bf1a4525dc43878c73aaec56c4f9eb3c14907bedfaae4d67383f7ba6} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 969f2d64, StatelessResetToken: 0xe61f17f3c04d13986974f0c118d4117a} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4b7a5351, StatelessResetToken: 0x0915d0a7de0e3ff4431fecccfa401b43} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2b989aac, StatelessResetToken: 0x4767af131bb816d546151580cd05deaf} 2025/04/30 08:47:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:47:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: ca0835be, StatelessResetToken: 0x2356b460bc226c5746bcf2f0f7387ce2} 2025/04/30 08:47:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:20 server <- Reading packet 3 (31 bytes) for connection b2ed529a, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: b2ed529a, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 26.16ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (1): [4] 2025/04/30 08:47:20 server updated RTT: 32.748ms (σ: 12.699ms) 2025/04/30 08:47:20 server <- Reading packet 9 (38 bytes) for connection e07bba01, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: e07bba01, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 10, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 48µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server newly acked packets (3): [4 10 13] 2025/04/30 08:47:20 server updated RTT: 31.859097ms (σ: 15.929548ms) 2025/04/30 08:47:20 server ECN capability confirmed. 2025/04/30 08:47:20 server <- Reading packet 10 (41 bytes) for connection e07bba01, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: e07bba01, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 10, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 256µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:20 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:20 Replacing connection for connection IDs [e07bba01 969f2d64 4b7a5351 ca0835be 2b989aac] with a closed connection. 2025/04/30 08:47:20 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:20 server Connection d024fc8a956f09574d4210c81a4bb178d36d30b5 closed. 2025/04/30 08:47:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:20 server -> Sending packet 7 (129 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: c76422ccd2dfceba, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 926, Data length: 98, Offset + Data length: 1024} 2025/04/30 08:47:20 server -> Sending packet 8 (129 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: c76422ccd2dfceba, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 926, Data length: 98, Offset + Data length: 1024} 2025/04/30 08:47:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:47:20 server -> Sending packet 10 (129 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: c76422ccd2dfceba, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 926, Data length: 98, Offset + Data length: 1024} 2025/04/30 08:47:20 server -> Sending packet 11 (129 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: c76422ccd2dfceba, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 926, Data length: 98, Offset + Data length: 1024} 2025/04/30 08:47:20 server -> Sending packet 12 (1409 bytes) for connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:20 server Short Header{DestConnectionID: c76422ccd2dfceba, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:20 server -> &wire.PingFrame{} 2025/04/30 08:47:20 server <- Reading packet 5 (35 bytes) for connection b2ed529a, 1-RTT 2025/04/30 08:47:20 server Short Header{DestConnectionID: b2ed529a, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:20 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 3, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 4, Smallest: 3}}, DelayTime: 232µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:20 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:20 Replacing connection for connection IDs [8971fe93 73ea8999 c6d99169 7bd036d4 b2ed529a] with a closed connection. 2025/04/30 08:47:20 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:20 server Connection 692c9d9cc1d91233db96f50fdee69d79a618aa5c closed. 2025/04/30 08:47:21 server <- Reading packet 2 (77 bytes) for connection 09be36e7, Handshake 2025/04/30 08:47:21 server Long Header{Type: Handshake, DestConnectionID: 09be36e7, SrcConnectionID: d83d70687aa3d41b, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:21 Retiring connection ID 553f9619cb2f4ad38a44b412e46c594a642fb95c in 5s. 2025/04/30 08:47:21 server Dropping Handshake keys. 2025/04/30 08:47:21 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 08:47:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:21 server -> Sending packet 2 (355 bytes) for connection 553f9619cb2f4ad38a44b412e46c594a642fb95c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: d83d70687aa3d41b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cb49c95d, StatelessResetToken: 0x80d4d5251e9dd247507d824cf8c06184} 2025/04/30 08:47:21 server -> &wire.NewTokenFrame{Token: 0x06ff7f79bd25440dce1db46cb636a6f1e2333fd09f7cd335424265b0180ad6dc9dd00c5726b0065978c6f29d8f91d352496230be9d88fde0cd285dca47b8a96e28f18f06e9df615910f2b493b728816805789c37293b} 2025/04/30 08:47:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 48ead9c9, StatelessResetToken: 0x20f96b507d2e6475a8d080e2d206f967} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b8ab1219, StatelessResetToken: 0x72c096e247ea65ba6b1d3d13fd6af680} 2025/04/30 08:47:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1aefeb6f, StatelessResetToken: 0x7d5df96fbe944ed2686ab5a7c5d1ce4f} 2025/04/30 08:47:21 server -> Sending packet 3 (355 bytes) for connection 553f9619cb2f4ad38a44b412e46c594a642fb95c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: d83d70687aa3d41b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1aefeb6f, StatelessResetToken: 0x7d5df96fbe944ed2686ab5a7c5d1ce4f} 2025/04/30 08:47:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: b8ab1219, StatelessResetToken: 0x72c096e247ea65ba6b1d3d13fd6af680} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 48ead9c9, StatelessResetToken: 0x20f96b507d2e6475a8d080e2d206f967} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cb49c95d, StatelessResetToken: 0x80d4d5251e9dd247507d824cf8c06184} 2025/04/30 08:47:21 server -> &wire.NewTokenFrame{Token: 0x06ff7f79bd25440dce1db46cb636a6f1e2333fd09f7cd335424265b0180ad6dc9dd00c5726b0065978c6f29d8f91d352496230be9d88fde0cd285dca47b8a96e28f18f06e9df615910f2b493b728816805789c37293b} 2025/04/30 08:47:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:21 server <- Reading packet 0 (42 bytes) for connection 09be36e7, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 09be36e7, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:21 server <- Reading packet 1 (106 bytes) for connection 09be36e7, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 09be36e7, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e438dff82ff3c870, StatelessResetToken: 0x7a98d367c5ed4740cc8b33a017366eec} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 799d06f827dde4a5, StatelessResetToken: 0x6342a251221dd3721f740415d9820b5d} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 9f8109e11948ab53, StatelessResetToken: 0x3be0e05542ed0c0eaeaefe2daac62957} 2025/04/30 08:47:21 server -> Sending packet 4 (40 bytes) for connection 553f9619cb2f4ad38a44b412e46c594a642fb95c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: e438dff82ff3c870, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 Received request: GET /btdlxlvuea 2025/04/30 08:47:21 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.001472297s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:21 server -> Sending packet 5 (1053 bytes) for connection 553f9619cb2f4ad38a44b412e46c594a642fb95c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: e438dff82ff3c870, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:21 server -> Sending packet 6 (31 bytes) for connection 553f9619cb2f4ad38a44b412e46c594a642fb95c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: e438dff82ff3c870, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 08:47:21 server <- Reading packet 4 (32 bytes) for connection 09be36e7, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 09be36e7, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 16µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server newly acked packets (4): [3 4 5 6] 2025/04/30 08:47:21 server updated RTT: 31.544ms (σ: 11.926ms) 2025/04/30 08:47:21 server ECN capability confirmed. 2025/04/30 08:47:21 server Canceling loss detection timer. 2025/04/30 08:47:21 server Ignoring all packets below 2. 2025/04/30 08:47:21 server <- Reading packet 5 (35 bytes) for connection 09be36e7, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 09be36e7, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 104µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:21 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:21 Replacing connection for connection IDs [cb49c95d 1aefeb6f b8ab1219 09be36e7 48ead9c9] with a closed connection. 2025/04/30 08:47:21 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:21 server Connection 553f9619cb2f4ad38a44b412e46c594a642fb95c closed. 2025/04/30 08:47:21 server <- Reading packet 2 (77 bytes) for connection 784400f0, Handshake 2025/04/30 08:47:21 server Long Header{Type: Handshake, DestConnectionID: 784400f0, SrcConnectionID: a86dd29a373072f5, PacketNumber: 2, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:21 Retiring connection ID 4e1dcb450283083b548d338c8660c1e4d239951e in 5s. 2025/04/30 08:47:21 server Dropping Handshake keys. 2025/04/30 08:47:21 server Dropping %!s(logging.PacketType=1) packet (77 bytes) because we already dropped the keys. 2025/04/30 08:47:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:21 server -> Sending packet 2 (355 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: a86dd29a373072f5, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.NewTokenFrame{Token: 0x40314b2463d88866fbf8c5c73a5ab42f2347bdc8831c23d27ef976dc1455887a4efc43867aca0028964db1abf134f9007f6ff8f5d88400fa2163955fea43fb5248b3be70198d903014027aee55399fc9377e32481e5a} 2025/04/30 08:47:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 15c52d43, StatelessResetToken: 0xe99a816e5b67818c755e4190eee492e6} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3d92cd41, StatelessResetToken: 0xdbd4f918c4b8303516063b2ae4e008b9} 2025/04/30 08:47:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2e67a1ee, StatelessResetToken: 0xa8aaec082b5f2cd1f8f967b31a7af158} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8979373, StatelessResetToken: 0xb8d83735bf5e2ba4baff23c26fe6ecd9} 2025/04/30 08:47:21 server -> Sending packet 3 (355 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: a86dd29a373072f5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2e67a1ee, StatelessResetToken: 0xa8aaec082b5f2cd1f8f967b31a7af158} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8979373, StatelessResetToken: 0xb8d83735bf5e2ba4baff23c26fe6ecd9} 2025/04/30 08:47:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 15c52d43, StatelessResetToken: 0xe99a816e5b67818c755e4190eee492e6} 2025/04/30 08:47:21 server -> &wire.NewTokenFrame{Token: 0x40314b2463d88866fbf8c5c73a5ab42f2347bdc8831c23d27ef976dc1455887a4efc43867aca0028964db1abf134f9007f6ff8f5d88400fa2163955fea43fb5248b3be70198d903014027aee55399fc9377e32481e5a} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3d92cd41, StatelessResetToken: 0xdbd4f918c4b8303516063b2ae4e008b9} 2025/04/30 08:47:21 server <- Reading packet 0 (42 bytes) for connection 784400f0, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 784400f0, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:21 server <- Reading packet 1 (106 bytes) for connection 784400f0, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 784400f0, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0d5273cabade2b69, StatelessResetToken: 0x640aa6b42fd2c81188b99aef35f8fec7} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 75d0e902575c6a06, StatelessResetToken: 0x54e3d9d5475ad34702b13323ce16fb7d} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: d845449192b577f9, StatelessResetToken: 0xbfeb80ac836b4b8b468687a2e28e2492} 2025/04/30 08:47:21 Received request: GET /nicudfymte 2025/04/30 08:47:21 server -> Sending packet 4 (40 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: 0d5273cabade2b69, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.201571087s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:21 server -> Sending packet 5 (1053 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: 0d5273cabade2b69, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:21 server <- Reading packet 2 (30 bytes) for connection 784400f0, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 784400f0, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 96µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server <- Reading packet 3 (32 bytes) for connection 784400f0, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 784400f0, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 32µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server newly acked packets (1): [4] 2025/04/30 08:47:21 server updated RTT: 33.407ms (σ: 10.589ms) 2025/04/30 08:47:21 server ECN capability confirmed. 2025/04/30 08:47:21 server setting loss timer for packet 3 (1-RTT) to 37.582875ms (in 2025-04-30 08:47:21.192038604 +0000 UTC m=+7.240901268) 2025/04/30 08:47:21 server Ignoring all packets below 2. 2025/04/30 08:47:21 server <- Reading packet 4 (50 bytes) for connection 784400f0, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 784400f0, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 0d238c43a18a0a1f, StatelessResetToken: 0x552febfee143afeb8ea4d656ad05c8c0} 2025/04/30 08:47:21 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:21 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 08:47:21.192038604 +0000 UTC m=+7.240901268 2025/04/30 08:47:21 server lost packet 3 (time threshold) 2025/04/30 08:47:21 server -> Sending packet 6 (364 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: 0d5273cabade2b69, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 6.284686ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2e67a1ee, StatelessResetToken: 0xa8aaec082b5f2cd1f8f967b31a7af158} 2025/04/30 08:47:21 server -> &wire.NewTokenFrame{Token: 0x40314b2463d88866fbf8c5c73a5ab42f2347bdc8831c23d27ef976dc1455887a4efc43867aca0028964db1abf134f9007f6ff8f5d88400fa2163955fea43fb5248b3be70198d903014027aee55399fc9377e32481e5a} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8979373, StatelessResetToken: 0xb8d83735bf5e2ba4baff23c26fe6ecd9} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 15c52d43, StatelessResetToken: 0xe99a816e5b67818c755e4190eee492e6} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3d92cd41, StatelessResetToken: 0xdbd4f918c4b8303516063b2ae4e008b9} 2025/04/30 08:47:21 server <- Reading packet 3 (106 bytes) for connection 7d95f323, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 7d95f323, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 84e06dd71e095510, StatelessResetToken: 0xc19949bdaabec64917ec02d2afc46923} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7a5b0f21fed26e0b, StatelessResetToken: 0x32ebacc9d9d96d2d4dd8ac1877c89d96} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a01cf5e3bf7f0dec, StatelessResetToken: 0x032f08ebb94c19a0740f9653c81cd704} 2025/04/30 08:47:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:21 server <- Reading packet 4 (106 bytes) for connection 7d95f323, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 7d95f323, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a01cf5e3bf7f0dec, StatelessResetToken: 0x032f08ebb94c19a0740f9653c81cd704} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7a5b0f21fed26e0b, StatelessResetToken: 0x32ebacc9d9d96d2d4dd8ac1877c89d96} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 84e06dd71e095510, StatelessResetToken: 0xc19949bdaabec64917ec02d2afc46923} 2025/04/30 08:47:21 server -> Sending packet 2 (1366 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: a01cf5e3bf7f0dec, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.PingFrame{} 2025/04/30 08:47:21 server -> Sending packet 3 (37 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: a01cf5e3bf7f0dec, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 239.248µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:21 server <- Reading packet 6 (106 bytes) for connection c35e73cf, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: c35e73cf, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76f0625519d9a9d3, StatelessResetToken: 0x12c71b2d1d436804484a213ab23edac2} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d0ba53a515c32b68, StatelessResetToken: 0x9a165aec0de24e9ba3fcf6f412048ac1} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 644b4b638c6d87c4, StatelessResetToken: 0xc7ac352cf3a991b90149f49125768ed9} 2025/04/30 08:47:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:21 server -> Sending packet 2 (1366 bytes) for connection a735e40a4ab49d1b78653b4da25125213c448294, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: 76f0625519d9a9d3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.PingFrame{} 2025/04/30 08:47:21 server -> Sending packet 3 (39 bytes) for connection a735e40a4ab49d1b78653b4da25125213c448294, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: 76f0625519d9a9d3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 136.426µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:21 server <- Reading packet 6 (50 bytes) for connection 7d95f323, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 7d95f323, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4ecac93c3e69adeb, StatelessResetToken: 0x69bd1c61d2db11c8a4bb113d9cacd57e} 2025/04/30 08:47:21 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:21 server -> Sending packet 4 (37 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: a01cf5e3bf7f0dec, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 127.689µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:21 server -> Sending packet 8 (1053 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: 0d5273cabade2b69, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:21 server Skipping packet number 7 2025/04/30 08:47:21 server -> Sending packet 9 (355 bytes) for connection 4e1dcb450283083b548d338c8660c1e4d239951e, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: 0d5273cabade2b69, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8979373, StatelessResetToken: 0xb8d83735bf5e2ba4baff23c26fe6ecd9} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 3d92cd41, StatelessResetToken: 0xdbd4f918c4b8303516063b2ae4e008b9} 2025/04/30 08:47:21 server -> &wire.NewTokenFrame{Token: 0x40314b2463d88866fbf8c5c73a5ab42f2347bdc8831c23d27ef976dc1455887a4efc43867aca0028964db1abf134f9007f6ff8f5d88400fa2163955fea43fb5248b3be70198d903014027aee55399fc9377e32481e5a} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 15c52d43, StatelessResetToken: 0xe99a816e5b67818c755e4190eee492e6} 2025/04/30 08:47:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 2e67a1ee, StatelessResetToken: 0xa8aaec082b5f2cd1f8f967b31a7af158} 2025/04/30 08:47:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:21 server <- Reading packet 6 (38 bytes) for connection 784400f0, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 784400f0, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 138.248ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:21 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:21 Replacing connection for connection IDs [784400f0 d8979373 15c52d43 3d92cd41 2e67a1ee] with a closed connection. 2025/04/30 08:47:21 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:21 server Connection 4e1dcb450283083b548d338c8660c1e4d239951e closed. 2025/04/30 08:47:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:21 server -> Sending packet 6 (29 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: a01cf5e3bf7f0dec, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:21 server -> Sending packet 7 (29 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: a01cf5e3bf7f0dec, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:21 server -> Sending packet 5 (29 bytes) for connection a735e40a4ab49d1b78653b4da25125213c448294, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: 76f0625519d9a9d3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:21 server -> Sending packet 6 (29 bytes) for connection a735e40a4ab49d1b78653b4da25125213c448294, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: 76f0625519d9a9d3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:21 server <- Reading packet 7 (32 bytes) for connection 7d95f323, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 7d95f323, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 2}}, DelayTime: 48µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server newly acked packets (2): [2 7] 2025/04/30 08:47:21 server updated RTT: 32.827ms (σ: 8.101ms) 2025/04/30 08:47:21 server Canceling loss detection timer. 2025/04/30 08:47:21 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/04/30 08:47:21 server -> Sending packet 13 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:21 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 13, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:21 server -> Sending packet 14 (768 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, Handshake 2025/04/30 08:47:21 server Long Header{Type: Handshake, DestConnectionID: 4e1b6a25fa8eb7c2, SrcConnectionID: 7f135b70, PacketNumber: 14, PacketNumberLen: 2, Length: 747, Version: v1} 2025/04/30 08:47:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 725, Offset + Data length: 725} 2025/04/30 08:47:21 server <- Reading packet 9 (33 bytes) for connection c35e73cf, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: c35e73cf, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 1, Smallest: 0}}, DelayTime: 26.12ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server newly acked packets (1): [6] 2025/04/30 08:47:21 server updated RTT: 32.45ms (σ: 7.459ms) 2025/04/30 08:47:21 server lost packet 2 (time threshold) 2025/04/30 08:47:21 server Canceling loss detection timer. 2025/04/30 08:47:21 server <- Reading packet 9 (50 bytes) for connection 7d95f323, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 7d95f323, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4ecac93c3e69adeb, StatelessResetToken: 0x69bd1c61d2db11c8a4bb113d9cacd57e} 2025/04/30 08:47:21 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:21 server -> Sending packet 8 (39 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: a01cf5e3bf7f0dec, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 63.228µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server <- Reading packet 7 (49 bytes) for connection 7f135b70, Handshake 2025/04/30 08:47:21 server Long Header{Type: Handshake, DestConnectionID: 7f135b70, SrcConnectionID: 4e1b6a25fa8eb7c2, PacketNumber: 7, PacketNumberLen: 1, Length: 28, Version: v1} 2025/04/30 08:47:21 server <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 1, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 10, Smallest: 8}, {Largest: 5, Smallest: 5}, {Largest: 1, Smallest: 1}}, DelayTime: 64µs} 2025/04/30 08:47:21 server newly acked packets (1): [14] 2025/04/30 08:47:21 server updated RTT: 35.26ms (σ: 14.297ms) 2025/04/30 08:47:21 server Canceling loss detection timer. 2025/04/30 08:47:21 server <- Reading packet 10 (42 bytes) for connection 7d95f323, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 7d95f323, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:21 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:21 server -> Sending packet 9 (1409 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: a01cf5e3bf7f0dec, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.PingFrame{} 2025/04/30 08:47:21 Received request: GET /xdcujeigkk 2025/04/30 08:47:21 server -> Sending packet 10 (1065 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: a01cf5e3bf7f0dec, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 341.452µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:21 server -> Sending packet 12 (1053 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: a01cf5e3bf7f0dec, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:21 server -> Sending packet 13 (1053 bytes) for connection 88382e68c2759be5020a2a4e2dd18ff834208517, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:21 server Short Header{DestConnectionID: a01cf5e3bf7f0dec, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:21 server <- Reading packet 13 (34 bytes) for connection 7d95f323, 1-RTT 2025/04/30 08:47:21 server Short Header{DestConnectionID: 7d95f323, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:21 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 8, DelayTime: 89.92ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 08:47:21 server newly acked packets (1): [9] 2025/04/30 08:47:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:21 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:21 Replacing connection for connection IDs [7d95f323 21000d13 3f300da2 b344a33d 675f20d9] with a closed connection. 2025/04/30 08:47:21 server Connection 88382e68c2759be5020a2a4e2dd18ff834208517 closed. 2025/04/30 08:47:21 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:21 server Queueing packet (106 bytes) for later decryption 2025/04/30 08:47:21 Tracking 300 connection IDs and 1 reset tokens. 2025/04/30 08:47:23 Removing connection ID bbc1b7a7dd18a3143c01c23bd3201481efcb3c6f after it has been retired. 2025/04/30 08:47:23 Removing connection ID 736fb346ea9580e7163d4c4855d6801ff24cb272 after it has been retired. 2025/04/30 08:47:23 Removing connection ID 378814dfd105ad8ca1cca2afc939c0f1883bbe5b after it has been retired. 2025/04/30 08:47:23 Removing connection ID 30e24ea0b1cd58b7b7ce4b683ca4f9ba96783db5 after it has been retired. 2025/04/30 08:47:23 Removing connection ID b7ae701d7781baebae33d7afb275340dd00b4630 after it has been retired. 2025/04/30 08:47:23 Removing connection ID 7607862b08b9bb2b8386c230b538fc65a46759b8 after it has been retired. 2025/04/30 08:47:23 Removing connection ID b5f20376880df2d54a0ce2b0a06bfd2f2c9ac94d after it has been retired. 2025/04/30 08:47:23 Removing connection ID be8f423c0130ed857a74b261fc7d81a3374497e6 after it has been retired. 2025/04/30 08:47:23 Removing connection ID 6694a6888146584732754f15cbc04e75afe55fd6 after it has been retired. 2025/04/30 08:47:23 Removing connection ID f1fc49469a2086fad8a63d2d68be4da6bc7c84f1 after it has been retired. 2025/04/30 08:47:23 Removing connection ID 1d751f10caeadbe902b2900a04e7cf7f3d15a091 after it has been retired. 2025/04/30 08:47:23 Removing connection ID 0bd87786881766c193d99efb9e2921c9b71c8220 after it has been retired. 2025/04/30 08:47:23 Removing connection ID 5fc64f8e771c7a8e5ef216c1bff525356c79cad6 after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [deb262ba 17417ecd 43b219b4 175ada83 85c49817] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [f55135ef 61ba8ef8 1875fe28 58b0c3c6 2b3ae016] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [94a02ca1 6eb95b34 376cf7ea 792161f9 e720c98b] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [5208c285 bb238c35 5ef1b92a 9ccf1fa1 751fe480] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [5fae7cea 3c6556da e028da1f 1bd7cced 89c8f60f] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [c79d0663 66e37a5c 999ed5a2 9b3928c2 3459d1ae] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [f48129df d8220fba 27b467f6 d313d84c 61d2de55] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection ID 99bc43191affa976f1141ec53dff877ac901264a after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [c91c4fa8 e920562f a268f42d e0d12886 cd4ff4bb] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [5504d811 a8a59ea5 e10e7849 aac4bb1b 21f3eeb1] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection ID f5c02efb89d7759854e5c0ff1e192769804c3188 after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [93dc0457 5f20abd7 020b527c cfe9e6b3 6e4f42df] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection ID 9bed0558ce980257d716c844f4252149f62d9f6e after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [7ba35e5c 3dc93bd3 948213c2 864b4d1d 39759913] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [c0735468 14865c3b c3863aa4 34f32fdf 53b2b7ea] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [13c00006 7d196aa3 86075866 a31e33f2 7433fc2d] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection ID 6f0677b21ad653a9ffcd00e35b249672cb7af0e9 after it has been retired. 2025/04/30 08:47:23 Removing connection ID ea295db2678a6867fafcf23237c262b1219820c9 after it has been retired. 2025/04/30 08:47:23 Removing connection ID 965b418001180a1245e873a4e1bb31bc1ccd464b after it has been retired. 2025/04/30 08:47:23 Removing connection ID 28dcc31725c6f8e5ac4687be705d0a5c754bcbfd after it has been retired. 2025/04/30 08:47:23 Removing connection ID be52bed8febad4d092c40a485d678500a360ab0e after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [495c27c4 3464739d b1bae7aa cd9bd4d3 26854805] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [dc9a4c27 bad56f1b 11b3487d 2e97015b cc12d488] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [d2b38c8c 1188e3cd 4d137b6b a39867b6 9b150454] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [9ce6c9c5 67f78247 a650d647 e64181a7 b9077bb5] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [e47b7dde e545a12d 3224d13e 3005628f a6a57aa4] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [dccdfe1f 733ab39b 5be5858b ee80133d da1d6f60] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection ID 11d6a67a6d19a2798e062289be7c7c6feebd64e2 after it has been retired. 2025/04/30 08:47:23 Removing connection ID d62f069f618bc48e026b9dfaaaa8932c9e8525bb after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [4c773218 3d178c06 28b04c6d 2c22109b a5c4e64c] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection ID 7329227b9d4d748545be0a9b080b58a5eb45daba after it has been retired. 2025/04/30 08:47:23 Removing connection ID 76343757d25a11b33d160df68b12aec1dfb0da11 after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [550b3933 0e9c3490 941aa410 f371bb17 f114175b] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection ID aaef47c08c1d8816b4ee6443adf964e5c5cd3a93 after it has been retired. 2025/04/30 08:47:23 Removing connection ID 56c584c98fc991d7b87083eb794dc848a0d60e9e after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [2002d3dc 8490bff6 ab6ae2bb 29334ab7 10fad7a8] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection ID 43352d89fac45a686e7b8d8eabdb0e2c19551927 after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [61c52980 7675c1b1 d821da6e 5a92c65b 07743ac3] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection ID 5f751bf0b3ac9cfd4e550071dcb5adaa343d487f after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [81b8be28 619c4a08 7b48cd42 7d87a711 8756a586] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [182ff44f 9eb65c2e 4f752051 63938bc5 bc6360fa] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [2d9975c5 f4782141 2143617d 2e05c16a 7f72d2a8] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection ID 3e5bad73dcf94558a795b1ed42db43693fef8292 after it has been retired. 2025/04/30 08:47:23 Removing connection ID e423d82739942fe35dc2809a2118f5ad6de58108 after it has been retired. 2025/04/30 08:47:23 Removing connection ID 7d24de3bbb90b216154850009985707532a7cb51 after it has been retired. 2025/04/30 08:47:23 Removing connection ID 706fcef248206883f6699ac0b0370f0e47c41366 after it has been retired. 2025/04/30 08:47:23 Removing connection ID 34dd4d31004c0ffaaf545d44c24fc42a304f6354 after it has been retired. 2025/04/30 08:47:23 Removing connection ID 0a28513b024783521009692e08d9b05078a813ef after it has been retired. 2025/04/30 08:47:23 Removing connection ID a735e40a4ab49d1b78653b4da25125213c448294 after it has been retired. 2025/04/30 08:47:23 Removing connection ID f2ab6f0af4280ef9c7cdbc6f861e8578facec70d after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [4f784d6d 9820448f b53360a1 eba23fb9 90783fcf] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [8eb9e69f ec36d4cd 9e4cff29 3cbd7faa 950d0739] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [32781442 e887dc3b e237daa6 642fb9d2 58c069ec] for a closed connection after it has been retired. 2025/04/30 08:47:23 Removing connection IDs [313cef81 4d8fc445 98068e57 b69a2dac 143902cf] for a closed connection after it has been retired. 2025/04/30 08:47:23 Tracking 113 connection IDs and 1 reset tokens. 2025/04/30 08:47:23 Removing connection IDs [41813b54 3d4d2219 8c633a44 7222b7cf 474dd458] for a closed connection after it has been retired. 2025/04/30 08:47:24 Removing connection IDs [3132b838 a31fd013 dc786ff2 e4d6489d 7ac7e4d6] for a closed connection after it has been retired. 2025/04/30 08:47:24 Removing connection IDs [d90ab82b ab1622ac fac75688 d241f7d7 78df6e62] for a closed connection after it has been retired. 2025/04/30 08:47:24 Removing connection ID 1210baa30e1eb1485a378ab5586c9f9363f2e5b3 after it has been retired. 2025/04/30 08:47:24 Removing connection IDs [c62c8fe5 d9ffee95 706f83f3 ee0b2795 0e274443] for a closed connection after it has been retired. 2025/04/30 08:47:24 Removing connection ID d024fc8a956f09574d4210c81a4bb178d36d30b5 after it has been retired. 2025/04/30 08:47:24 Removing connection IDs [8c2dd730 6e5d6833 6c6e7a9c 9eb4f957 5d672102] for a closed connection after it has been retired. 2025/04/30 08:47:24 Removing connection ID d448869dadc1154d4ecfb2fb8f39b922fed6012b after it has been retired. 2025/04/30 08:47:24 Removing connection IDs [22b7565c 6971f609 4063e067 6168f11e 1d314e3c] for a closed connection after it has been retired. 2025/04/30 08:47:24 server <- Reading packet 10 (106 bytes) for connection c35e73cf, 1-RTT 2025/04/30 08:47:24 server Short Header{DestConnectionID: c35e73cf, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 644b4b638c6d87c4, StatelessResetToken: 0xc7ac352cf3a991b90149f49125768ed9} 2025/04/30 08:47:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d0ba53a515c32b68, StatelessResetToken: 0x9a165aec0de24e9ba3fcf6f412048ac1} 2025/04/30 08:47:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 76f0625519d9a9d3, StatelessResetToken: 0x12c71b2d1d436804484a213ab23edac2} 2025/04/30 08:47:24 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:24 server <- Reading packet 11 (50 bytes) for connection c35e73cf, 1-RTT 2025/04/30 08:47:24 server Short Header{DestConnectionID: c35e73cf, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:24 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 61ba30428c5cd301, StatelessResetToken: 0x4177925a9b44c872fd0812f035a48e01} 2025/04/30 08:47:24 server Queueing ACK because packet 2 packets were received after the last ACK (using initial threshold: 2). 2025/04/30 08:47:24 server -> Sending packet 7 (1323 bytes) for connection a735e40a4ab49d1b78653b4da25125213c448294, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:24 server Short Header{DestConnectionID: 76f0625519d9a9d3, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:24 server -> &wire.PingFrame{} 2025/04/30 08:47:24 server -> Sending packet 8 (39 bytes) for connection a735e40a4ab49d1b78653b4da25125213c448294, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:24 server Short Header{DestConnectionID: 76f0625519d9a9d3, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:24 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 194.845µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:47:24 Removing connection ID 25ba55ad9bc0cd94397a58bcde17facd2954aaf1 after it has been retired. 2025/04/30 08:47:24 server <- Reading packet 12 (42 bytes) for connection c35e73cf, 1-RTT 2025/04/30 08:47:24 server Short Header{DestConnectionID: c35e73cf, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:24 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:24 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:47:24 Received request: GET /camhxfshxq 2025/04/30 08:47:24 server -> Sending packet 9 (1065 bytes) for connection a735e40a4ab49d1b78653b4da25125213c448294, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:24 server Short Header{DestConnectionID: 76f0625519d9a9d3, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:24 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 9}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 264.924µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 08:47:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:24 Removing connection IDs [cb305a21 d16cbc29 8b6648b6 5e7d1f95 90ef9415] for a closed connection after it has been retired. 2025/04/30 08:47:24 server <- Reading packet 13 (31 bytes) for connection c35e73cf, 1-RTT 2025/04/30 08:47:24 server Short Header{DestConnectionID: c35e73cf, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:24 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 7, DelayTime: 25.632ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:47:24 server newly acked packets (1): [7] 2025/04/30 08:47:24 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:24 server -> Sending packet 11 (1053 bytes) for connection a735e40a4ab49d1b78653b4da25125213c448294, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:24 server Short Header{DestConnectionID: 76f0625519d9a9d3, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:24 server -> Sending packet 12 (1053 bytes) for connection a735e40a4ab49d1b78653b4da25125213c448294, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:24 server Short Header{DestConnectionID: 76f0625519d9a9d3, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:24 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:24 server <- Reading packet 14 (32 bytes) for connection c35e73cf, 1-RTT 2025/04/30 08:47:24 server Short Header{DestConnectionID: c35e73cf, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:24 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 7, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 7}}, DelayTime: 56µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 08:47:24 server <- Reading packet 15 (35 bytes) for connection c35e73cf, 1-RTT 2025/04/30 08:47:24 server Short Header{DestConnectionID: c35e73cf, PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:24 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 7, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 7}}, DelayTime: 264µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 08:47:24 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:24 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:24 Replacing connection for connection IDs [e93a9bab 026e977e 62fdc195 c35e73cf 9caa8570] with a closed connection. 2025/04/30 08:47:24 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:24 server Connection a735e40a4ab49d1b78653b4da25125213c448294 closed. 2025/04/30 08:47:25 Removing connection ID fde5971df75bf02b5aa1ab0c74b787e40eeb65b4 after it has been retired. 2025/04/30 08:47:25 Removing connection ID 7218fd8c3bc602a55cf95322ae110329f076c43b after it has been retired. 2025/04/30 08:47:25 Removing connection ID 88382e68c2759be5020a2a4e2dd18ff834208517 after it has been retired. 2025/04/30 08:47:25 Removing connection ID 6f053b5d33f2bd5692b0e19161e0d119a5315500 after it has been retired. 2025/04/30 08:47:25 server <- Reading packet 9 (77 bytes) for connection 7f135b70, Handshake 2025/04/30 08:47:25 server Long Header{Type: Handshake, DestConnectionID: 7f135b70, SrcConnectionID: 4e1b6a25fa8eb7c2, PacketNumber: 9, PacketNumberLen: 1, Length: 56, Version: v1} 2025/04/30 08:47:25 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:47:25 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:47:25 Retiring connection ID d5648e9f9f814e4c97ffb027fb8813e58df3b15c in 5s. 2025/04/30 08:47:25 server Dropping Handshake keys. 2025/04/30 08:47:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:47:25 server -> Sending packet 2 (355 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:25 server Short Header{DestConnectionID: 4e1b6a25fa8eb7c2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1fb1154c, StatelessResetToken: 0xd574fb2e63824891534fb4d54d636bb9} 2025/04/30 08:47:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f244aded, StatelessResetToken: 0x7566957fcfd3163582ba578845d506a3} 2025/04/30 08:47:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7342eedc, StatelessResetToken: 0x224bb76bd9338f1787c7122bef60bafb} 2025/04/30 08:47:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea45d12d, StatelessResetToken: 0xc9fe186af529d1367bae9a77e2325116} 2025/04/30 08:47:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:25 server -> &wire.NewTokenFrame{Token: 0x22b1f0b49a1b566e7d4a38a2c7227095be95ae35e786c7304eeaa78d837ab91882fdaf0d6a511ff36ba42251b266137b0ce12a6cfda9554b6dfb99917b2a469ffbef568cf08cd7d3a62f978fe19587df5ea2b3727af2} 2025/04/30 08:47:25 server -> Sending packet 3 (355 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:25 server Short Header{DestConnectionID: 4e1b6a25fa8eb7c2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:25 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 08:47:25 server -> &wire.NewTokenFrame{Token: 0x22b1f0b49a1b566e7d4a38a2c7227095be95ae35e786c7304eeaa78d837ab91882fdaf0d6a511ff36ba42251b266137b0ce12a6cfda9554b6dfb99917b2a469ffbef568cf08cd7d3a62f978fe19587df5ea2b3727af2} 2025/04/30 08:47:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea45d12d, StatelessResetToken: 0xc9fe186af529d1367bae9a77e2325116} 2025/04/30 08:47:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: f244aded, StatelessResetToken: 0x7566957fcfd3163582ba578845d506a3} 2025/04/30 08:47:25 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:47:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 1fb1154c, StatelessResetToken: 0xd574fb2e63824891534fb4d54d636bb9} 2025/04/30 08:47:25 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 7342eedc, StatelessResetToken: 0x224bb76bd9338f1787c7122bef60bafb} 2025/04/30 08:47:25 server <- Reading packet 0 (42 bytes) for connection 7f135b70, 1-RTT 2025/04/30 08:47:25 server Short Header{DestConnectionID: 7f135b70, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:25 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:47:25 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:47:25 server <- Reading packet 1 (106 bytes) for connection 7f135b70, 1-RTT 2025/04/30 08:47:25 server Short Header{DestConnectionID: 7f135b70, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 25bfe6d77146f40b, StatelessResetToken: 0xb4522e5601d6ba3f34f582c57c57d9b5} 2025/04/30 08:47:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: def7536a13fda0c2, StatelessResetToken: 0xe7c4cd4c710f72a7a2fd78107192b647} 2025/04/30 08:47:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4ca3896d8f101b50, StatelessResetToken: 0xf0898bcbe992162e404bae3994133a42} 2025/04/30 08:47:25 server <- Reading packet 2 (106 bytes) for connection 7f135b70, 1-RTT 2025/04/30 08:47:25 server Short Header{DestConnectionID: 7f135b70, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: 4ca3896d8f101b50, StatelessResetToken: 0xf0898bcbe992162e404bae3994133a42} 2025/04/30 08:47:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: def7536a13fda0c2, StatelessResetToken: 0xe7c4cd4c710f72a7a2fd78107192b647} 2025/04/30 08:47:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 25bfe6d77146f40b, StatelessResetToken: 0xb4522e5601d6ba3f34f582c57c57d9b5} 2025/04/30 08:47:25 Received request: GET /ggsimfcbnj 2025/04/30 08:47:25 server -> Sending packet 4 (40 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:25 server Short Header{DestConnectionID: 25bfe6d77146f40b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:25 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 3.393818501s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:47:25 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:47:25 server -> Sending packet 5 (1053 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:25 server Short Header{DestConnectionID: 25bfe6d77146f40b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:47:25 Removing connection IDs [8df6119f 2e6f3ae7 76f17952 f66357b9 66b485d2] for a closed connection after it has been retired. 2025/04/30 08:47:25 Removing connection IDs [bffc6df7 ea42630d bfd94b69 c2574e72 97955ae6] for a closed connection after it has been retired. 2025/04/30 08:47:25 server <- Reading packet 5 (50 bytes) for connection 7f135b70, 1-RTT 2025/04/30 08:47:25 server Short Header{DestConnectionID: 7f135b70, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:25 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: fc9db6b868bb6e76, StatelessResetToken: 0x590a2cb4d3997ead6b6bdf6bf9c9635b} 2025/04/30 08:47:25 server Queuing ACK because there's a new missing packet to report. 2025/04/30 08:47:25 server -> Sending packet 6 (37 bytes) for connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c, 1-RTT (ECN: ECT(0)) 2025/04/30 08:47:25 server Short Header{DestConnectionID: 25bfe6d77146f40b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:47:25 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 0}}, DelayTime: 70.753µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:47:25 server Parsed a coalesced packet. Part 1: 59 bytes. Remaining: 33 bytes. 2025/04/30 08:47:25 server Dropping %!s(logging.PacketType=1) packet (59 bytes) because we already dropped the keys. 2025/04/30 08:47:25 server <- Reading packet 6 (33 bytes) for connection 7f135b70, 1-RTT 2025/04/30 08:47:25 server Short Header{DestConnectionID: 7f135b70, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:47:25 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 152µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:47:25 server newly acked packets (2): [4 5] 2025/04/30 08:47:25 server updated RTT: 34.846ms (σ: 11.549ms) 2025/04/30 08:47:25 server ECN capability confirmed. 2025/04/30 08:47:25 server setting loss timer for packet 3 (1-RTT) to 39.20175ms (in 2025-04-30 08:47:25.185310828 +0000 UTC m=+11.234173492) 2025/04/30 08:47:25 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:47:25 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:47:25 Replacing connection for connection IDs [ea45d12d 1fb1154c f244aded 7f135b70 7342eedc] with a closed connection. 2025/04/30 08:47:25 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:47:25 server Connection d5648e9f9f814e4c97ffb027fb8813e58df3b15c closed. 2025/04/30 08:47:25 Removing connection IDs [2cdfeddf b0fe6155 f41609d7 3260094f 8802608c] for a closed connection after it has been retired. 2025/04/30 08:47:25 Removing connection ID 6d14d69f1d1ecc4bbb932ad5344aca47b39f891b after it has been retired. 2025/04/30 08:47:25 Removing connection IDs [25c05599 31db0540 d7ad8259 2edad74e 02ea0e19] for a closed connection after it has been retired. 2025/04/30 08:47:25 Removing connection IDs [874e5f1f d2b14b2e c368faa2 e01e0939 c72d1b4d] for a closed connection after it has been retired. 2025/04/30 08:47:25 Removing connection IDs [d3fa2405 3fbeb11a e4ee6a80 76d94cef ce26594a] for a closed connection after it has been retired. 2025/04/30 08:47:25 Removing connection ID 692c9d9cc1d91233db96f50fdee69d79a618aa5c after it has been retired. 2025/04/30 08:47:25 Removing connection IDs [e07bba01 969f2d64 4b7a5351 ca0835be 2b989aac] for a closed connection after it has been retired. 2025/04/30 08:47:25 Removing connection IDs [8971fe93 73ea8999 c6d99169 7bd036d4 b2ed529a] for a closed connection after it has been retired. 2025/04/30 08:47:25 Tracking 28 connection IDs and 0 reset tokens. 2025/04/30 08:47:26 Removing connection ID 553f9619cb2f4ad38a44b412e46c594a642fb95c after it has been retired. 2025/04/30 08:47:26 Removing connection IDs [cb49c95d 1aefeb6f b8ab1219 09be36e7 48ead9c9] for a closed connection after it has been retired. 2025/04/30 08:47:26 Removing connection ID 4e1dcb450283083b548d338c8660c1e4d239951e after it has been retired. 2025/04/30 08:47:26 Removing connection IDs [784400f0 d8979373 15c52d43 3d92cd41 2e67a1ee] for a closed connection after it has been retired. 2025/04/30 08:47:26 Removing connection IDs [7d95f323 21000d13 3f300da2 b344a33d 675f20d9] for a closed connection after it has been retired. 2025/04/30 08:47:27 Tracking 11 connection IDs and 0 reset tokens. 2025/04/30 08:47:29 Removing connection IDs [e93a9bab 026e977e 62fdc195 c35e73cf 9caa8570] for a closed connection after it has been retired. 2025/04/30 08:47:29 Tracking 6 connection IDs and 0 reset tokens. 2025/04/30 08:47:30 Removing connection ID d5648e9f9f814e4c97ffb027fb8813e58df3b15c after it has been retired. 2025/04/30 08:47:30 Removing connection IDs [ea45d12d 1fb1154c f244aded 7f135b70 7342eedc] for a closed connection after it has been retired. 2025/04/30 08:47:31 Tracking 0 connection IDs and 0 reset tokens.