2025/12/13 08:46:25 Increased receive buffer size to 14336 kiB 2025/12/13 08:46:25 Increased send buffer size to 14336 kiB 2025/12/13 08:46:25 Setting DF for IPv4 and IPv6. 2025/12/13 08:46:25 Activating reading of ECN bits for IPv4 and IPv6. 2025/12/13 08:46:25 Activating reading of packet info for IPv4 and IPv6. 2025/12/13 08:46:25 server Listening for udp connections on [::]:443 2025/12/13 08:46:26 server Client offered version 0x57414954, sending Version Negotiation 2025/12/13 08:46:26 server <- Received Initial packet. 2025/12/13 08:46:26 Created qlog file: /logs/qlog/148553150f480015.sqlog 2025/12/13 08:46:26 server Changing connection ID to 72b1da04. 2025/12/13 08:46:26 Adding connection IDs 148553150f480015 and 72b1da04 for a new connection. 2025/12/13 08:46:26 server <- Reading packet 0 (1252 bytes) for connection 148553150f480015, Initial 2025/12/13 08:46:26 server Long Header{Type: Initial, DestConnectionID: 148553150f480015, SrcConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1218, Version: v1} 2025/12/13 08:46:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/12/13 08:46:26 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 08:46:26 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 08:46:26 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 08:46:26 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3, EnableResetStreamAt: false} 2025/12/13 08:46:26 Adding connection ID 9917394a. 2025/12/13 08:46:26 Adding connection ID 9574d7e2. 2025/12/13 08:46:26 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 148553150f480015 2025/12/13 08:46:26 server Long Header{Type: Initial, DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, SrcConnectionID: 72b1da04, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 153, Version: v1} 2025/12/13 08:46:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 08:46:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/12/13 08:46:26 server Long Header{Type: Handshake, DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, SrcConnectionID: 72b1da04, PacketNumber: 0, PacketNumberLen: 2, Length: 1068, Version: v1} 2025/12/13 08:46:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 1046, Offset + Data length: 1046} 2025/12/13 08:46:26 server -> Sending packet 1 (1280 bytes) for connection 148553150f480015, Handshake 2025/12/13 08:46:26 server Long Header{Type: Handshake, DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, SrcConnectionID: 72b1da04, PacketNumber: 1, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 08:46:26 server -> &wire.CryptoFrame{Offset: 1046, Data length: 1228, Offset + Data length: 2274} 2025/12/13 08:46:26 server -> Sending packet 2 (1280 bytes) for connection 148553150f480015, Handshake 2025/12/13 08:46:26 server Long Header{Type: Handshake, DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, SrcConnectionID: 72b1da04, PacketNumber: 2, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 08:46:26 server -> &wire.CryptoFrame{Offset: 2274, Data length: 1228, Offset + Data length: 3502} 2025/12/13 08:46:26 server Canceling loss detection timer. 2025/12/13 08:46:26 server Amplification window limited. Received 1252 bytes, already sent out 3840 bytes 2025/12/13 08:46:26 server Amplification window limited. Received 1252 bytes, already sent out 3840 bytes 2025/12/13 08:46:27 server <- Reading packet 10 (65 bytes) for connection 72b1da04, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 72b1da04, SrcConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 10, PacketNumberLen: 1, Length: 36, Version: v1} 2025/12/13 08:46:27 server Dropping Initial keys. 2025/12/13 08:46:27 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 2.859664s} 2025/12/13 08:46:27 server newly acked packets (3): [0 1 2] 2025/12/13 08:46:27 server updated RTT: 392.262509ms (σ: 196.131254ms) 2025/12/13 08:46:27 server Canceling loss detection timer. 2025/12/13 08:46:27 server <- &wire.PingFrame{} 2025/12/13 08:46:27 server -> Sending packet 3 (1280 bytes) for connection 148553150f480015, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, SrcConnectionID: 72b1da04, PacketNumber: 3, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 08:46:27 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 08:46:27 server -> &wire.CryptoFrame{Offset: 3502, Data length: 1220, Offset + Data length: 4722} 2025/12/13 08:46:27 server -> Sending packet 4 (1280 bytes) for connection 148553150f480015, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, SrcConnectionID: 72b1da04, PacketNumber: 4, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 08:46:27 server -> &wire.CryptoFrame{Offset: 4722, Data length: 1228, Offset + Data length: 5950} 2025/12/13 08:46:27 server -> Sending packet 5 (1280 bytes) for connection 148553150f480015, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, SrcConnectionID: 72b1da04, PacketNumber: 5, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 08:46:27 server -> &wire.CryptoFrame{Offset: 5950, Data length: 1228, Offset + Data length: 7178} 2025/12/13 08:46:27 server -> Sending packet 6 (1280 bytes) for connection 148553150f480015, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, SrcConnectionID: 72b1da04, PacketNumber: 6, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 08:46:27 server -> &wire.CryptoFrame{Offset: 7178, Data length: 1228, Offset + Data length: 8406} 2025/12/13 08:46:27 server -> Sending packet 7 (1280 bytes) for connection 148553150f480015, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, SrcConnectionID: 72b1da04, PacketNumber: 7, PacketNumberLen: 2, Length: 1251, Version: v1} 2025/12/13 08:46:27 server -> &wire.CryptoFrame{Offset: 8406, Data length: 1228, Offset + Data length: 9634} 2025/12/13 08:46:27 server -> Sending packet 8 (461 bytes) for connection 148553150f480015, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, SrcConnectionID: 72b1da04, PacketNumber: 8, PacketNumberLen: 2, Length: 349, Version: v1} 2025/12/13 08:46:27 server -> &wire.CryptoFrame{Offset: 9634, Data length: 326, Offset + Data length: 9960} 2025/12/13 08:46:27 server Short Header{DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:46:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9574d7e2, StatelessResetToken: 0x9e032665441c3535008c461fba4ba4a5} 2025/12/13 08:46:27 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9917394a, StatelessResetToken: 0xc2714a75c681529e0957d6d7231e80ca} 2025/12/13 08:46:27 server <- Reading packet 11 (65 bytes) for connection 72b1da04, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 72b1da04, SrcConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 11, PacketNumberLen: 1, Length: 36, Version: v1} 2025/12/13 08:46:27 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 4.768ms} 2025/12/13 08:46:27 server newly acked packets (1): [3] 2025/12/13 08:46:27 server updated RTT: 347.306ms (σ: 237.009ms) 2025/12/13 08:46:27 server <- Reading packet 12 (65 bytes) for connection 72b1da04, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 72b1da04, SrcConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 12, PacketNumberLen: 1, Length: 36, Version: v1} 2025/12/13 08:46:27 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 1.208ms} 2025/12/13 08:46:27 server newly acked packets (1): [4] 2025/12/13 08:46:27 server updated RTT: 308.024ms (σ: 256.32ms) 2025/12/13 08:46:27 server <- Reading packet 13 (65 bytes) for connection 72b1da04, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 72b1da04, SrcConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 13, PacketNumberLen: 1, Length: 36, Version: v1} 2025/12/13 08:46:27 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, DelayTime: 1.296ms} 2025/12/13 08:46:27 server newly acked packets (1): [5] 2025/12/13 08:46:27 server updated RTT: 273.77ms (σ: 260.747ms) 2025/12/13 08:46:27 server <- Reading packet 14 (65 bytes) for connection 72b1da04, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 72b1da04, SrcConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 14, PacketNumberLen: 1, Length: 36, Version: v1} 2025/12/13 08:46:27 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, DelayTime: 1.392ms} 2025/12/13 08:46:27 server newly acked packets (1): [6] 2025/12/13 08:46:27 server updated RTT: 243.93ms (σ: 255.239ms) 2025/12/13 08:46:27 server <- Reading packet 15 (65 bytes) for connection 72b1da04, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 72b1da04, SrcConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 15, PacketNumberLen: 1, Length: 36, Version: v1} 2025/12/13 08:46:27 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, DelayTime: 1.104ms} 2025/12/13 08:46:27 server newly acked packets (1): [7] 2025/12/13 08:46:27 server updated RTT: 217.945ms (σ: 243.398ms) 2025/12/13 08:46:27 server <- &wire.PingFrame{} 2025/12/13 08:46:27 server -> Sending packet 9 (55 bytes) for connection 148553150f480015, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, SrcConnectionID: 72b1da04, PacketNumber: 9, PacketNumberLen: 2, Length: 26, Version: v1} 2025/12/13 08:46:27 server -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 10, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/12/13 08:46:27 server Parsed a coalesced packet. Part 1: 91 bytes. Remaining: 43 bytes. 2025/12/13 08:46:27 server <- Reading packet 16 (91 bytes) for connection 9574d7e2, Handshake 2025/12/13 08:46:27 server Long Header{Type: Handshake, DestConnectionID: 9574d7e2, SrcConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 16, PacketNumberLen: 1, Length: 62, Version: v1} 2025/12/13 08:46:27 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, DelayTime: 19.4ms} 2025/12/13 08:46:27 server newly acked packets (1): [8] 2025/12/13 08:46:27 server updated RTT: 195.588ms (σ: 227.261ms) 2025/12/13 08:46:27 server Canceling loss detection timer. 2025/12/13 08:46:27 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/12/13 08:46:27 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/12/13 08:46:27 server Dropping Handshake keys. 2025/12/13 08:46:27 server <- Reading packet 0 (43 bytes) for connection 9574d7e2, 1-RTT 2025/12/13 08:46:27 server Short Header{DestConnectionID: 9574d7e2, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 08:46:27 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.424ms} 2025/12/13 08:46:27 server newly acked packets (1): [0] 2025/12/13 08:46:27 server updated RTT: 175.722ms (σ: 210.175ms) 2025/12/13 08:46:27 server Canceling loss detection timer. 2025/12/13 08:46:27 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 08:46:27 server Setting ACK timer to max ack delay: 25ms 2025/12/13 08:46:27 server -> Sending packet 1 (309 bytes) for connection 148553150f480015, 1-RTT (ECN: ECT(0)) 2025/12/13 08:46:27 server Short Header{DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:46:27 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 236.541µs} 2025/12/13 08:46:27 server -> &wire.CryptoFrame{Offset: 0, Data length: 170, Offset + Data length: 170} 2025/12/13 08:46:27 server -> &wire.NewTokenFrame{Token: 0xef96e95a06456fc22a5646a66d5e4a86c5f2c42b0f7d980a3ac9cdc86516fc6b321ef99e0ee57c9a98d2ca6fd5e7abaeb90e6e059d0d5d9c215f1d57366585885018c83e5dfd5ced57060b12b38aa2a8cf987792cbd012562ddec5} 2025/12/13 08:46:27 server -> &wire.HandshakeDoneFrame{} 2025/12/13 08:46:27 server <- Reading packet 1 (54 bytes) for connection 9574d7e2, 1-RTT 2025/12/13 08:46:27 server Short Header{DestConnectionID: 9574d7e2, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 08:46:27 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/12/13 08:46:27 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 26, Offset + Data length: 26} 2025/12/13 08:46:27 server Setting ACK timer to max ack delay: 25ms 2025/12/13 08:46:27 Received request: GET /enough-envious-lion 2025/12/13 08:46:27 server -> Sending packet 2 (1280 bytes) for connection 148553150f480015, 1-RTT (ECN: ECT(0)) 2025/12/13 08:46:27 server Short Header{DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:46:27 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 285.512µs} 2025/12/13 08:46:27 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1238, Offset + Data length: 1238} 2025/12/13 08:46:27 server -> Sending packet 3 (1280 bytes) for connection 148553150f480015, 1-RTT (ECN: ECT(0)) 2025/12/13 08:46:27 server Short Header{DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:46:27 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 1238, Data length: 1241, Offset + Data length: 2479} 2025/12/13 08:46:27 server -> Sending packet 4 (1280 bytes) for connection 148553150f480015, 1-RTT (ECN: ECT(0)) 2025/12/13 08:46:27 server Short Header{DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:46:27 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 2479, Data length: 1241, Offset + Data length: 3720} 2025/12/13 08:46:27 server -> Sending packet 5 (1280 bytes) for connection 148553150f480015, 1-RTT (ECN: ECT(0)) 2025/12/13 08:46:27 server Short Header{DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:46:27 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 3720, Data length: 1241, Offset + Data length: 4961} 2025/12/13 08:46:27 server -> Sending packet 6 (198 bytes) for connection 148553150f480015, 1-RTT (ECN: ECT(0)) 2025/12/13 08:46:27 server Short Header{DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:46:27 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 4961, Data length: 159, Offset + Data length: 5120} 2025/12/13 08:46:27 server -> Sending packet 7 (39 bytes) for connection 148553150f480015, 1-RTT (ECN: ECT(0)) 2025/12/13 08:46:27 server Short Header{DestConnectionID: 406e6ec927ca3ee348b766dfef5e82c4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:46:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 5120, Data length: 0, Offset + Data length: 5120} 2025/12/13 08:46:27 server Dropping 1RTT packet (1452 bytes) that could not be unpacked. Error: decryption failed 2025/12/13 08:46:27 server <- Reading packet 3 (139 bytes) for connection 9574d7e2, 1-RTT 2025/12/13 08:46:27 server Short Header{DestConnectionID: 9574d7e2, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 08:46:27 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 880µs, ECT0: 1, ECT1: 0, CE: 0} 2025/12/13 08:46:27 server newly acked packets (1): [1] 2025/12/13 08:46:27 server Ignoring all packets below 1. 2025/12/13 08:46:27 server updated RTT: 157.927ms (σ: 193.219ms) 2025/12/13 08:46:27 server ECN capability confirmed. 2025/12/13 08:46:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 6cc7b41ab2990bb0aeb53e79b650dafa, StatelessResetToken: 0x450a3c51c19ed122da78b77abf5ce7fd} 2025/12/13 08:46:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 4e52ae13e0bb297d428c08cba448128f, StatelessResetToken: 0x38d891ddd420a3433725aa0aea853bdb} 2025/12/13 08:46:27 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 39ccc0bd0b40bd14b4fa9e490ccbc452, StatelessResetToken: 0xee1f684ee76cf50f0737ee3a1cfbac43} 2025/12/13 08:46:27 server Queuing ACK because there's a new missing packet to report. 2025/12/13 08:46:27 server -> Sending packet 8 (44 bytes) for connection 148553150f480015, 1-RTT (ECN: ECT(0)) 2025/12/13 08:46:27 server Short Header{DestConnectionID: 6cc7b41ab2990bb0aeb53e79b650dafa, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/12/13 08:46:27 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 104.915µs} 2025/12/13 08:46:27 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/12/13 08:46:27 server <- Reading packet 4 (43 bytes) for connection 9574d7e2, 1-RTT 2025/12/13 08:46:27 server Short Header{DestConnectionID: 9574d7e2, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/12/13 08:46:27 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/12/13 08:46:27 server Closing connection with error: NO_ERROR (remote) 2025/12/13 08:46:27 Replacing connection for connection IDs [9574d7e2 9917394a 72b1da04 148553150f480015] with a closed connection. 2025/12/13 08:46:27 Error accepting stream: NO_ERROR (remote) 2025/12/13 08:46:27 server Connection 148553150f480015 closed. 2025/12/13 08:46:30 Removing connection IDs [9574d7e2 9917394a 72b1da04 148553150f480015] for a closed connection after it has been retired.