2025/04/30 08:42:21 Increased receive buffer size to 14336 kiB 2025/04/30 08:42:21 Increased send buffer size to 14336 kiB 2025/04/30 08:42:21 Setting DF for IPv4 and IPv6. 2025/04/30 08:42:21 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 08:42:21 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 08:42:21 server Listening for udp connections on [::]:443 2025/04/30 08:42:22 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 08:42:22 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 08:42:22 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 08:42:23 Tracking 0 connection IDs and 0 reset tokens. 2025/04/30 08:42:26 server <- Received Initial packet. 2025/04/30 08:42:26 Created qlog file: /logs/qlog/ce331d3b67f3ec5e65c452fb3494c1772ba92312.sqlog 2025/04/30 08:42:26 server Changing connection ID to 5bf536f6. 2025/04/30 08:42:26 Adding connection IDs ce331d3b67f3ec5e65c452fb3494c1772ba92312 and 5bf536f6 for a new connection. 2025/04/30 08:42:26 server <- Reading packet 0 (1200 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:26 server Long Header{Type: Initial, DestConnectionID: ce331d3b67f3ec5e65c452fb3494c1772ba92312, SrcConnectionID: cf58d43d860f72ab, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:42:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:42:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:42:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:42:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:42:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: cf58d43d860f72ab, InitialMaxStreamDataBidiLocal: 1250000, InitialMaxStreamDataBidiRemote: 1250000, InitialMaxStreamDataUni: 1250000, InitialMaxData: 4611686018427387903, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 30s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 5, MaxDatagramFrameSize: 65535} 2025/04/30 08:42:26 Adding connection ID 1386de4c. 2025/04/30 08:42:26 Adding connection ID 3383cd7e. 2025/04/30 08:42:26 Adding connection ID fe1d822f. 2025/04/30 08:42:26 Adding connection ID 62eaf55d. 2025/04/30 08:42:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312 2025/04/30 08:42:26 server Long Header{Type: Initial, DestConnectionID: cf58d43d860f72ab, SrcConnectionID: 5bf536f6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 371, Version: v1} 2025/04/30 08:42:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:42:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:42:26 server Long Header{Type: Handshake, DestConnectionID: cf58d43d860f72ab, SrcConnectionID: 5bf536f6, PacketNumber: 0, PacketNumberLen: 2, Length: 743, Version: v1} 2025/04/30 08:42:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 08:42:26 server Short Header{DestConnectionID: cf58d43d860f72ab, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:42:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 62eaf55d, StatelessResetToken: 0x8e2056ca0b89a2c6b993e3cfed1daea8} 2025/04/30 08:42:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fe1d822f, StatelessResetToken: 0x49969a07c4c8c929800c71b6d4aeaaa3} 2025/04/30 08:42:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1386de4c, StatelessResetToken: 0xc96017bc02cb6bb5432e1cb494fedaed} 2025/04/30 08:42:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3383cd7e, StatelessResetToken: 0xcad015be2f119269070822b4f695e8dc} 2025/04/30 08:42:26 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 08:42:26 server -> Sending packet 1 (1280 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:26 server Long Header{Type: Initial, DestConnectionID: cf58d43d860f72ab, SrcConnectionID: 5bf536f6, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:42:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:42:26 server -> Sending packet 2 (1280 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:26 server Long Header{Type: Initial, DestConnectionID: cf58d43d860f72ab, SrcConnectionID: 5bf536f6, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:42:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:42:26 server Canceling loss detection timer. 2025/04/30 08:42:26 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 08:42:26 server <- Reading packet 1 (1200 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:26 server Long Header{Type: Initial, DestConnectionID: ce331d3b67f3ec5e65c452fb3494c1772ba92312, SrcConnectionID: cf58d43d860f72ab, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:42:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:42:26 server -> Sending packet 3 (48 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:26 server Long Header{Type: Initial, DestConnectionID: cf58d43d860f72ab, SrcConnectionID: 5bf536f6, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:42:26 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:42:26 server <- Reading packet 2 (1200 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:26 server Long Header{Type: Initial, DestConnectionID: ce331d3b67f3ec5e65c452fb3494c1772ba92312, SrcConnectionID: cf58d43d860f72ab, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:42:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:42:26 server -> Sending packet 4 (48 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:26 server Long Header{Type: Initial, DestConnectionID: cf58d43d860f72ab, SrcConnectionID: 5bf536f6, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:42:26 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:42:26 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 08:42:26 server -> Sending packet 1 (764 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Handshake 2025/04/30 08:42:26 server Long Header{Type: Handshake, DestConnectionID: cf58d43d860f72ab, SrcConnectionID: 5bf536f6, PacketNumber: 1, PacketNumberLen: 2, Length: 743, Version: v1} 2025/04/30 08:42:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 08:42:26 server -> Sending packet 2 (764 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Handshake 2025/04/30 08:42:26 server Long Header{Type: Handshake, DestConnectionID: cf58d43d860f72ab, SrcConnectionID: 5bf536f6, PacketNumber: 2, PacketNumberLen: 2, Length: 743, Version: v1} 2025/04/30 08:42:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 721, Offset + Data length: 721} 2025/04/30 08:42:27 server <- Reading packet 3 (1200 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:27 server Long Header{Type: Initial, DestConnectionID: ce331d3b67f3ec5e65c452fb3494c1772ba92312, SrcConnectionID: cf58d43d860f72ab, Token: (empty), PacketNumber: 3, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:42:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:42:27 server -> Sending packet 5 (48 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:27 server Long Header{Type: Initial, DestConnectionID: cf58d43d860f72ab, SrcConnectionID: 5bf536f6, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:42:27 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, DelayTime: 0s, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:42:27 server <- Reading packet 4 (1200 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:27 server Long Header{Type: Initial, DestConnectionID: ce331d3b67f3ec5e65c452fb3494c1772ba92312, SrcConnectionID: cf58d43d860f72ab, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1162, Version: v1} 2025/04/30 08:42:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 286, Offset + Data length: 286} 2025/04/30 08:42:27 server -> Sending packet 6 (48 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:27 server Long Header{Type: Initial, DestConnectionID: cf58d43d860f72ab, SrcConnectionID: 5bf536f6, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 26, Version: v1} 2025/04/30 08:42:27 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, DelayTime: 0s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 08:42:27 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 08:42:27 server -> Sending packet 7 (1280 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:27 server Long Header{Type: Initial, DestConnectionID: cf58d43d860f72ab, SrcConnectionID: 5bf536f6, Token: (empty), PacketNumber: 7, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:42:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:42:27 server -> Sending packet 8 (1280 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, Initial 2025/04/30 08:42:27 server Long Header{Type: Initial, DestConnectionID: cf58d43d860f72ab, SrcConnectionID: 5bf536f6, Token: (empty), PacketNumber: 8, PacketNumberLen: 2, Length: 1258, Version: v1} 2025/04/30 08:42:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 90, Offset + Data length: 90} 2025/04/30 08:42:27 Tracking 6 connection IDs and 0 reset tokens. 2025/04/30 08:42:27 server Parsed a coalesced packet. Part 1: 44 bytes. Remaining: 1156 bytes. 2025/04/30 08:42:27 server <- Reading packet 5 (44 bytes) for connection 5bf536f6, Initial 2025/04/30 08:42:27 server Long Header{Type: Initial, DestConnectionID: 5bf536f6, SrcConnectionID: cf58d43d860f72ab, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 22, Version: v1} 2025/04/30 08:42:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 448µs} 2025/04/30 08:42:27 server Parsed a coalesced packet. Part 2: 1156 bytes. Remaining: 0 bytes. 2025/04/30 08:42:27 server <- Reading packet 0 (1156 bytes) for connection 5bf536f6, Handshake 2025/04/30 08:42:27 server Long Header{Type: Handshake, DestConnectionID: 5bf536f6, SrcConnectionID: cf58d43d860f72ab, PacketNumber: 0, PacketNumberLen: 1, Length: 1135, Version: v1} 2025/04/30 08:42:27 server Dropping Initial keys. 2025/04/30 08:42:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 448µs} 2025/04/30 08:42:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 08:42:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 08:42:27 Retiring connection ID ce331d3b67f3ec5e65c452fb3494c1772ba92312 in 5s. 2025/04/30 08:42:27 server Dropping Handshake keys. 2025/04/30 08:42:27 server <- Reading packet 0 (106 bytes) for connection 5bf536f6, 1-RTT 2025/04/30 08:42:27 server Short Header{DestConnectionID: 5bf536f6, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:42:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 057bb4a0753f8cbe, StatelessResetToken: 0x6c836a3077c4b59b6df3434a80491f93} 2025/04/30 08:42:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4cb4e0e02e9518b4, StatelessResetToken: 0x1be7f3ad3833d7263a044f5c864571b1} 2025/04/30 08:42:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: c2e7cb6ae410d142, StatelessResetToken: 0x03382df4e08c19ffa79730f2868b7517} 2025/04/30 08:42:27 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 08:42:27 server <- Reading packet 1 (42 bytes) for connection 5bf536f6, 1-RTT 2025/04/30 08:42:27 server Short Header{DestConnectionID: 5bf536f6, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:42:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 08:42:27 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 08:42:27 server -> Sending packet 2 (362 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, 1-RTT (ECN: ECT(0)) 2025/04/30 08:42:27 Received request: GET /agrxoqgosi 2025/04/30 08:42:27 server Short Header{DestConnectionID: 057bb4a0753f8cbe, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:42:27 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 372.438µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 08:42:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1386de4c, StatelessResetToken: 0xc96017bc02cb6bb5432e1cb494fedaed} 2025/04/30 08:42:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:42:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fe1d822f, StatelessResetToken: 0x49969a07c4c8c929800c71b6d4aeaaa3} 2025/04/30 08:42:27 server -> &wire.NewTokenFrame{Token: 0x17bc16e72ce408542f7a4986bf4620403a03429a6730fe8982f6bd3f59bae175d1dc82a9f0e9e797c4f27b83346fa3122cc87a248512d5a9179e4364f711bf902d9a5ace32107b6af4ec69823761d0ea421b9a2eb424} 2025/04/30 08:42:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3383cd7e, StatelessResetToken: 0xcad015be2f119269070822b4f695e8dc} 2025/04/30 08:42:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 62eaf55d, StatelessResetToken: 0x8e2056ca0b89a2c6b993e3cfed1daea8} 2025/04/30 08:42:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:42:27 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:42:27 server -> Sending packet 3 (354 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, 1-RTT (ECN: ECT(0)) 2025/04/30 08:42:27 server Short Header{DestConnectionID: 057bb4a0753f8cbe, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:42:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3383cd7e, StatelessResetToken: 0xcad015be2f119269070822b4f695e8dc} 2025/04/30 08:42:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1386de4c, StatelessResetToken: 0xc96017bc02cb6bb5432e1cb494fedaed} 2025/04/30 08:42:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:42:27 server -> &wire.NewTokenFrame{Token: 0x17bc16e72ce408542f7a4986bf4620403a03429a6730fe8982f6bd3f59bae175d1dc82a9f0e9e797c4f27b83346fa3122cc87a248512d5a9179e4364f711bf902d9a5ace32107b6af4ec69823761d0ea421b9a2eb424} 2025/04/30 08:42:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fe1d822f, StatelessResetToken: 0x49969a07c4c8c929800c71b6d4aeaaa3} 2025/04/30 08:42:27 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:42:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 62eaf55d, StatelessResetToken: 0x8e2056ca0b89a2c6b993e3cfed1daea8} 2025/04/30 08:42:27 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:42:27 server -> Sending packet 4 (1366 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, 1-RTT (ECN: ECT(0)) 2025/04/30 08:42:27 server Short Header{DestConnectionID: 057bb4a0753f8cbe, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:42:27 server -> &wire.PingFrame{} 2025/04/30 08:42:27 server -> Sending packet 5 (1053 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, 1-RTT (ECN: ECT(0)) 2025/04/30 08:42:27 server Short Header{DestConnectionID: 057bb4a0753f8cbe, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:42:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:42:28 server Dropping %!s(logging.PacketType=1) packet (43 bytes) because we already dropped the keys. 2025/04/30 08:42:28 server Dropping %!s(logging.PacketType=1) packet (43 bytes) because we already dropped the keys. 2025/04/30 08:42:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 08:42:28 server -> Sending packet 7 (354 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, 1-RTT (ECN: ECT(0)) 2025/04/30 08:42:28 server Short Header{DestConnectionID: 057bb4a0753f8cbe, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:42:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:42:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fe1d822f, StatelessResetToken: 0x49969a07c4c8c929800c71b6d4aeaaa3} 2025/04/30 08:42:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 62eaf55d, StatelessResetToken: 0x8e2056ca0b89a2c6b993e3cfed1daea8} 2025/04/30 08:42:28 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:42:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:42:28 server -> &wire.NewTokenFrame{Token: 0x17bc16e72ce408542f7a4986bf4620403a03429a6730fe8982f6bd3f59bae175d1dc82a9f0e9e797c4f27b83346fa3122cc87a248512d5a9179e4364f711bf902d9a5ace32107b6af4ec69823761d0ea421b9a2eb424} 2025/04/30 08:42:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3383cd7e, StatelessResetToken: 0xcad015be2f119269070822b4f695e8dc} 2025/04/30 08:42:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1386de4c, StatelessResetToken: 0xc96017bc02cb6bb5432e1cb494fedaed} 2025/04/30 08:42:28 server Skipping packet number 6 2025/04/30 08:42:28 server -> Sending packet 8 (1053 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, 1-RTT (ECN: ECT(0)) 2025/04/30 08:42:28 server Short Header{DestConnectionID: 057bb4a0753f8cbe, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:42:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:42:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 08:42:29 server -> Sending packet 10 (354 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, 1-RTT (ECN: ECT(0)) 2025/04/30 08:42:29 server Short Header{DestConnectionID: 057bb4a0753f8cbe, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:42:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3383cd7e, StatelessResetToken: 0xcad015be2f119269070822b4f695e8dc} 2025/04/30 08:42:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1386de4c, StatelessResetToken: 0xc96017bc02cb6bb5432e1cb494fedaed} 2025/04/30 08:42:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 08:42:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 0, ConnectionID: fe1d822f, StatelessResetToken: 0x49969a07c4c8c929800c71b6d4aeaaa3} 2025/04/30 08:42:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 62eaf55d, StatelessResetToken: 0x8e2056ca0b89a2c6b993e3cfed1daea8} 2025/04/30 08:42:29 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 08:42:29 server -> &wire.NewTokenFrame{Token: 0x17bc16e72ce408542f7a4986bf4620403a03429a6730fe8982f6bd3f59bae175d1dc82a9f0e9e797c4f27b83346fa3122cc87a248512d5a9179e4364f711bf902d9a5ace32107b6af4ec69823761d0ea421b9a2eb424} 2025/04/30 08:42:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 08:42:29 server Skipping packet number 9 2025/04/30 08:42:29 server -> Sending packet 11 (1053 bytes) for connection ce331d3b67f3ec5e65c452fb3494c1772ba92312, 1-RTT (ECN: ECT(0)) 2025/04/30 08:42:29 server Short Header{DestConnectionID: 057bb4a0753f8cbe, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 08:42:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 08:42:29 server <- Reading packet 2 (32 bytes) for connection 5bf536f6, 1-RTT 2025/04/30 08:42:29 server Short Header{DestConnectionID: 5bf536f6, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:42:29 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 80µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 08:42:29 server <- Reading packet 3 (50 bytes) for connection 5bf536f6, 1-RTT 2025/04/30 08:42:29 server Short Header{DestConnectionID: 5bf536f6, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:42:29 server <- &wire.NewConnectionIDFrame{SequenceNumber: 4, RetirePriorTo: 0, ConnectionID: 4e81eb51583e3627, StatelessResetToken: 0x4e0f5b5791db89e7bb5a95b24066a995} 2025/04/30 08:42:29 server Setting ACK timer to max ack delay: 25ms 2025/04/30 08:42:29 server <- Reading packet 4 (32 bytes) for connection 5bf536f6, 1-RTT 2025/04/30 08:42:29 server Short Header{DestConnectionID: 5bf536f6, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:42:29 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 40µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 08:42:29 server newly acked packets (1): [4] 2025/04/30 08:42:29 server updated RTT: 1.502495514s (σ: 751.247757ms) 2025/04/30 08:42:29 server ECN capability confirmed. 2025/04/30 08:42:29 server <- Reading packet 5 (35 bytes) for connection 5bf536f6, 1-RTT 2025/04/30 08:42:29 server Short Header{DestConnectionID: 5bf536f6, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 08:42:29 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 144µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 08:42:29 server <- &wire.ConnectionCloseFrame{IsApplicationError:true, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 08:42:29 server Closing connection with error: Application error 0x0 (remote) 2025/04/30 08:42:29 Replacing connection for connection IDs [5bf536f6 1386de4c 3383cd7e fe1d822f 62eaf55d] with a closed connection. 2025/04/30 08:42:29 Error accepting stream: Application error 0x0 (remote) 2025/04/30 08:42:29 server Connection ce331d3b67f3ec5e65c452fb3494c1772ba92312 closed. 2025/04/30 08:42:29 Tracking 6 connection IDs and 0 reset tokens. 2025/04/30 08:42:31 Tracking 6 connection IDs and 0 reset tokens. 2025/04/30 08:42:32 Removing connection ID ce331d3b67f3ec5e65c452fb3494c1772ba92312 after it has been retired. 2025/04/30 08:42:33 Tracking 5 connection IDs and 0 reset tokens. 2025/04/30 08:42:34 Removing connection IDs [5bf536f6 1386de4c 3383cd7e fe1d822f 62eaf55d] for a closed connection after it has been retired. 2025/04/30 08:42:35 Tracking 0 connection IDs and 0 reset tokens.