2025/04/30 09:12:40 Increased receive buffer size to 14336 kiB 2025/04/30 09:12:40 Increased send buffer size to 14336 kiB 2025/04/30 09:12:40 Setting DF for IPv4 and IPv6. 2025/04/30 09:12:40 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:12:40 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:12:40 server Listening for udp connections on [::]:443 2025/04/30 09:12:40 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:12:40 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:12:40 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:12:41 server <- Received Initial packet. 2025/04/30 09:12:41 Created qlog file: /logs/qlog/6b3207e510f36c6c.sqlog 2025/04/30 09:12:41 server Changing connection ID to dbbda1a2. 2025/04/30 09:12:41 Adding connection IDs 6b3207e510f36c6c and dbbda1a2 for a new connection. 2025/04/30 09:12:41 server <- Reading packet 0 (1252 bytes) for connection 6b3207e510f36c6c, Initial 2025/04/30 09:12:41 server Long Header{Type: Initial, DestConnectionID: 6b3207e510f36c6c, SrcConnectionID: 180840f21c9c688991e49cbffecbcebd, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1218, Version: v1} 2025/04/30 09:12:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:12:41 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:41 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:41 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:41 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 180840f21c9c688991e49cbffecbcebd, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:12:41 Adding connection ID 92e09327. 2025/04/30 09:12:41 Adding connection ID 8c5ae8b1. 2025/04/30 09:12:41 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6b3207e510f36c6c 2025/04/30 09:12:41 server Long Header{Type: Initial, DestConnectionID: 180840f21c9c688991e49cbffecbcebd, SrcConnectionID: dbbda1a2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 407, Version: v1} 2025/04/30 09:12:41 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:12:41 server Long Header{Type: Handshake, DestConnectionID: 180840f21c9c688991e49cbffecbcebd, SrcConnectionID: dbbda1a2, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 09:12:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 09:12:41 server Short Header{DestConnectionID: 180840f21c9c688991e49cbffecbcebd, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8c5ae8b1, StatelessResetToken: 0x55cc8bf6334bf3d99587ce8811107380} 2025/04/30 09:12:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 92e09327, StatelessResetToken: 0x0f9fdf2148acb18f7361d9a4a4e4eefe} 2025/04/30 09:12:41 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1186 bytes. 2025/04/30 09:12:41 server <- Reading packet 1 (66 bytes) for connection 8c5ae8b1, Initial 2025/04/30 09:12:41 server Long Header{Type: Initial, DestConnectionID: 8c5ae8b1, SrcConnectionID: 180840f21c9c688991e49cbffecbcebd, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:12:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.12ms} 2025/04/30 09:12:41 server newly acked packets (1): [0] 2025/04/30 09:12:41 server updated RTT: 36.508395ms (σ: 18.254197ms) 2025/04/30 09:12:41 server Parsed a coalesced packet. Part 2: 1186 bytes. Remaining: 0 bytes. 2025/04/30 09:12:41 server <- Reading packet 0 (1186 bytes) for connection 8c5ae8b1, Handshake 2025/04/30 09:12:41 server Long Header{Type: Handshake, DestConnectionID: 8c5ae8b1, SrcConnectionID: 180840f21c9c688991e49cbffecbcebd, PacketNumber: 0, PacketNumberLen: 1, Length: 1157, Version: v1} 2025/04/30 09:12:41 server Dropping Initial keys. 2025/04/30 09:12:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.12ms} 2025/04/30 09:12:41 server newly acked packets (1): [0] 2025/04/30 09:12:41 server updated RTT: 36.508ms (σ: 13.69ms) 2025/04/30 09:12:41 server Canceling loss detection timer. 2025/04/30 09:12:41 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:12:41 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:12:41 Retiring connection ID 6b3207e510f36c6c in 5s. 2025/04/30 09:12:41 server Dropping Handshake keys. 2025/04/30 09:12:41 server <- Reading packet 0 (43 bytes) for connection 8c5ae8b1, 1-RTT 2025/04/30 09:12:41 server Short Header{DestConnectionID: 8c5ae8b1, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:41 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.512ms} 2025/04/30 09:12:41 server newly acked packets (1): [0] 2025/04/30 09:12:41 server updated RTT: 36.511ms (σ: 10.275ms) 2025/04/30 09:12:41 server Canceling loss detection timer. 2025/04/30 09:12:41 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:12:41 Retiring connection ID dbbda1a2 in 5s. 2025/04/30 09:12:41 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:12:41 server <- Reading packet 1 (45 bytes) for connection 8c5ae8b1, 1-RTT 2025/04/30 09:12:41 server Short Header{DestConnectionID: 8c5ae8b1, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:41 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:12:41 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:12:41 server -> Sending packet 1 (276 bytes) for connection 6b3207e510f36c6c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:41 Received request: GET /orcrzjcjcc 2025/04/30 09:12:41 server Short Header{DestConnectionID: 180840f21c9c688991e49cbffecbcebd, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:41 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 531.586µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:12:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:12:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:12:41 server -> &wire.NewTokenFrame{Token: 0xabdca4b777445ebb173e0befe19686451006532b670fe6f3cdd9b2452a5a277ff166362e8cb772343411694b8e285a380a195548fdf57d4fae7621ff1df1b1637fb94e6e6775d972b9af6a5a6f3141bec4194c81ffe7} 2025/04/30 09:12:41 server -> Sending packet 2 (1061 bytes) for connection 6b3207e510f36c6c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:12:41 server Short Header{DestConnectionID: 180840f21c9c688991e49cbffecbcebd, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:12:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:12:41 server Dropping %!s(logging.PacketType=5) packet (1452 bytes) that could not be unpacked. Error: decryption failed 2025/04/30 09:12:41 server <- Reading packet 3 (139 bytes) for connection 8c5ae8b1, 1-RTT 2025/04/30 09:12:41 server Short Header{DestConnectionID: 8c5ae8b1, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:41 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:12:41 server newly acked packets (1): [1] 2025/04/30 09:12:41 server updated RTT: 36.193ms (σ: 8.341ms) 2025/04/30 09:12:41 server ECN capability confirmed. 2025/04/30 09:12:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: e88b36d74090d63d9cc0c0972ad13906, StatelessResetToken: 0xdaa2ec356cb19e166e25206d67109940} 2025/04/30 09:12:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 840f8f09c0abe3ecf18357155cce1d07, StatelessResetToken: 0x0ad2cd8bd6b756dc2f399274715e7b3f} 2025/04/30 09:12:41 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: bf1c8c2c2b6986096837ca9212b02141, StatelessResetToken: 0xdb9c265e6ef337f66568b7d60b7628a4} 2025/04/30 09:12:41 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:12:41 server Ignoring all packets below 2. 2025/04/30 09:12:41 server <- Reading packet 4 (43 bytes) for connection 8c5ae8b1, 1-RTT 2025/04/30 09:12:41 server Short Header{DestConnectionID: 8c5ae8b1, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:12:41 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:12:41 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:12:41 Replacing connection for connection IDs [8c5ae8b1 92e09327] with a closed connection. 2025/04/30 09:12:41 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:12:41 server Connection 6b3207e510f36c6c closed. 2025/04/30 09:12:42 Tracking 4 connection IDs and 0 reset tokens. 2025/04/30 09:12:44 Tracking 4 connection IDs and 0 reset tokens. 2025/04/30 09:12:46 Tracking 4 connection IDs and 0 reset tokens. 2025/04/30 09:12:46 Removing connection ID dbbda1a2 after it has been retired. 2025/04/30 09:12:46 Removing connection ID 6b3207e510f36c6c after it has been retired. 2025/04/30 09:12:46 Removing connection IDs [8c5ae8b1 92e09327] for a closed connection after it has been retired. 2025/04/30 09:12:48 Tracking 0 connection IDs and 0 reset tokens.