2025/04/30 09:21:37 Increased receive buffer size to 14336 kiB 2025/04/30 09:21:37 Increased send buffer size to 14336 kiB 2025/04/30 09:21:37 Setting DF for IPv4 and IPv6. 2025/04/30 09:21:37 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:21:37 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:21:37 server Listening for udp connections on [::]:443 2025/04/30 09:21:37 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:21:37 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:21:37 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/ac0168a9d1a2ba36.sqlog 2025/04/30 09:21:38 server Changing connection ID to 8d64d098. 2025/04/30 09:21:38 Adding connection IDs ac0168a9d1a2ba36 and 8d64d098 for a new connection. 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/aa80af060c84d68f.sqlog 2025/04/30 09:21:38 server Changing connection ID to ce37a9d0. 2025/04/30 09:21:38 Adding connection IDs aa80af060c84d68f and ce37a9d0 for a new connection. 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/55ab69b83eb6ef83.sqlog 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection ac0168a9d1a2ba36, Initial 2025/04/30 09:21:38 server Changing connection ID to b915abb1. 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: ac0168a9d1a2ba36, SrcConnectionID: da9614328b03c2f2da15c8f7a0a54b56, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 Adding connection IDs 55ab69b83eb6ef83 and b915abb1 for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection aa80af060c84d68f, Initial 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: aa80af060c84d68f, SrcConnectionID: c68c28993224fd27dbb901aaad1b3247, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection 55ab69b83eb6ef83, Initial 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 55ab69b83eb6ef83, SrcConnectionID: 2457a36f1a136e11a5ebded5035f7243, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Created qlog file: /logs/qlog/226cca1740348987.sqlog 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Changing connection ID to e9bae830. 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c68c28993224fd27dbb901aaad1b3247, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID ec34bad6. 2025/04/30 09:21:38 Adding connection ID 0eec5a76. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection aa80af060c84d68f 2025/04/30 09:21:38 Adding connection IDs 226cca1740348987 and e9bae830 for a new connection. 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: c68c28993224fd27dbb901aaad1b3247, SrcConnectionID: ce37a9d0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 410, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: c68c28993224fd27dbb901aaad1b3247, SrcConnectionID: ce37a9d0, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 09:21:38 server Short Header{DestConnectionID: c68c28993224fd27dbb901aaad1b3247, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0eec5a76, StatelessResetToken: 0x8338d923a4f21894496965e0ea1666de} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec34bad6, StatelessResetToken: 0xfd6a50058e17bbddf47580cf43d53170} 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection 226cca1740348987, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 226cca1740348987, SrcConnectionID: 73e250fc1c5dec24e4eb2ee83737ae99, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: da9614328b03c2f2da15c8f7a0a54b56, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 2457a36f1a136e11a5ebded5035f7243, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID 91b42f88. 2025/04/30 09:21:38 Adding connection ID 652fa97c. 2025/04/30 09:21:38 Adding connection ID a8207e69. 2025/04/30 09:21:38 Adding connection ID 0fc384e3. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 55ab69b83eb6ef83 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 2457a36f1a136e11a5ebded5035f7243, SrcConnectionID: b915abb1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 417, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 2457a36f1a136e11a5ebded5035f7243, SrcConnectionID: b915abb1, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 09:21:38 server Short Header{DestConnectionID: 2457a36f1a136e11a5ebded5035f7243, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 91b42f88, StatelessResetToken: 0x3769a1152d28b75d64b29a90e600dd59} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a8207e69, StatelessResetToken: 0x71647e0e2d8615cf12099bae7a1a08e7} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ac0168a9d1a2ba36 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: da9614328b03c2f2da15c8f7a0a54b56, SrcConnectionID: 8d64d098, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 419, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: da9614328b03c2f2da15c8f7a0a54b56, SrcConnectionID: 8d64d098, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 09:21:38 server Short Header{DestConnectionID: da9614328b03c2f2da15c8f7a0a54b56, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 652fa97c, StatelessResetToken: 0xfcdcae821dad45c41ab3e36eaa2667c7} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0fc384e3, StatelessResetToken: 0xa768156a7f4571ba7b9e94f8f7695cce} 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Created qlog file: /logs/qlog/13ec6cad3dc00557.sqlog 2025/04/30 09:21:38 server Changing connection ID to 4871ab7c. 2025/04/30 09:21:38 Adding connection IDs 13ec6cad3dc00557 and 4871ab7c for a new connection. 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 73e250fc1c5dec24e4eb2ee83737ae99, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID 9cf90b9a. 2025/04/30 09:21:38 Adding connection ID d13beb5c. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/0673282f3216e3fd.sqlog 2025/04/30 09:21:38 server Changing connection ID to 3364e27c. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 226cca1740348987 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 73e250fc1c5dec24e4eb2ee83737ae99, SrcConnectionID: e9bae830, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 407, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection 13ec6cad3dc00557, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 13ec6cad3dc00557, SrcConnectionID: 6bca1164cc743128669172c2b3deb993, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 Adding connection IDs 0673282f3216e3fd and 3364e27c for a new connection. 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 73e250fc1c5dec24e4eb2ee83737ae99, SrcConnectionID: e9bae830, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 09:21:38 server Short Header{DestConnectionID: 73e250fc1c5dec24e4eb2ee83737ae99, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9cf90b9a, StatelessResetToken: 0xa5c9701c42d98783d31bd0f619c1be9c} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d13beb5c, StatelessResetToken: 0x71636507dd1dc11f3d7e2896b3dce20c} 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection 0673282f3216e3fd, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 0673282f3216e3fd, SrcConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6bca1164cc743128669172c2b3deb993, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID d0872b8a. 2025/04/30 09:21:38 Adding connection ID 2ec746b4. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 13ec6cad3dc00557 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 6bca1164cc743128669172c2b3deb993, SrcConnectionID: 4871ab7c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 412, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 6bca1164cc743128669172c2b3deb993, SrcConnectionID: 4871ab7c, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 6bca1164cc743128669172c2b3deb993, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d0872b8a, StatelessResetToken: 0x5c13585d3b9083c21f974c8dd4b29b36} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2ec746b4, StatelessResetToken: 0xd1f2a08db209fff84fe787e38d332e14} 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID e36ec78f. 2025/04/30 09:21:38 Adding connection ID 9c4a3632. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0673282f3216e3fd 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, SrcConnectionID: 3364e27c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 412, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, SrcConnectionID: 3364e27c, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 09:21:38 server Short Header{DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9c4a3632, StatelessResetToken: 0xfe5e4caead403694e22c0abb8b9bb06b} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e36ec78f, StatelessResetToken: 0xa0fdc5e8bd059eb176eca5396d267bd9} 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/874a008efe949583.sqlog 2025/04/30 09:21:38 server Changing connection ID to 396d117f. 2025/04/30 09:21:38 Adding connection IDs 874a008efe949583 and 396d117f for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection 874a008efe949583, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 874a008efe949583, SrcConnectionID: 7150587477cec824956dbb6ad78a42da, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7150587477cec824956dbb6ad78a42da, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID cb61eee6. 2025/04/30 09:21:38 Adding connection ID 1775ef6b. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 874a008efe949583 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 7150587477cec824956dbb6ad78a42da, SrcConnectionID: 396d117f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 413, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 7150587477cec824956dbb6ad78a42da, SrcConnectionID: 396d117f, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7150587477cec824956dbb6ad78a42da, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1775ef6b, StatelessResetToken: 0x2536c0169e867abfee8363d03f1d41d1} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb61eee6, StatelessResetToken: 0xf46c62dafb21cd8674ea9ad75194d641} 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/bf46aa81dbcd04f0.sqlog 2025/04/30 09:21:38 server Changing connection ID to ac0472bf. 2025/04/30 09:21:38 Adding connection IDs bf46aa81dbcd04f0 and ac0472bf for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection bf46aa81dbcd04f0, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: bf46aa81dbcd04f0, SrcConnectionID: 5d8c83050d1fad9eea540e012fd55cb3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 5d8c83050d1fad9eea540e012fd55cb3, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID 292fa9fd. 2025/04/30 09:21:38 Adding connection ID 4160bbcc. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection bf46aa81dbcd04f0 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 5d8c83050d1fad9eea540e012fd55cb3, SrcConnectionID: ac0472bf, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 414, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 5d8c83050d1fad9eea540e012fd55cb3, SrcConnectionID: ac0472bf, PacketNumber: 0, PacketNumberLen: 2, Length: 724, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 702, Offset + Data length: 702} 2025/04/30 09:21:38 server Short Header{DestConnectionID: 5d8c83050d1fad9eea540e012fd55cb3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 292fa9fd, StatelessResetToken: 0x281b48739a4a1a5c19a73737838d8ac3} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4160bbcc, StatelessResetToken: 0xfdc82148a50d9e68e3dc49e25b5f0e14} 2025/04/30 09:21:38 Created qlog file: /logs/qlog/33af4a20c088fdf7.sqlog 2025/04/30 09:21:38 server Changing connection ID to 4b59879a. 2025/04/30 09:21:38 Adding connection IDs 33af4a20c088fdf7 and 4b59879a for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection 33af4a20c088fdf7, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 33af4a20c088fdf7, SrcConnectionID: 4f6507d51a7d77bf3c049f819981b6b3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 4f6507d51a7d77bf3c049f819981b6b3, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID a48a6cd2. 2025/04/30 09:21:38 Adding connection ID 0150a0c6. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 33af4a20c088fdf7 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 4f6507d51a7d77bf3c049f819981b6b3, SrcConnectionID: 4b59879a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 419, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 4f6507d51a7d77bf3c049f819981b6b3, SrcConnectionID: 4b59879a, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 09:21:38 server Short Header{DestConnectionID: 4f6507d51a7d77bf3c049f819981b6b3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a48a6cd2, StatelessResetToken: 0x567dd2f0a6276acf89f4c6dbc4fc6e2f} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0150a0c6, StatelessResetToken: 0x5fc0dbddb2ea7bfcd3549b320f237bef} 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/ef1be9349c65b9e1.sqlog 2025/04/30 09:21:38 server Changing connection ID to dda66dd1. 2025/04/30 09:21:38 Adding connection IDs ef1be9349c65b9e1 and dda66dd1 for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection ef1be9349c65b9e1, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: ef1be9349c65b9e1, SrcConnectionID: fc7177cc44ca71c05013d7564120c16f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: fc7177cc44ca71c05013d7564120c16f, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID 284e3e59. 2025/04/30 09:21:38 Adding connection ID e13811a6. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ef1be9349c65b9e1 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: fc7177cc44ca71c05013d7564120c16f, SrcConnectionID: dda66dd1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 417, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: fc7177cc44ca71c05013d7564120c16f, SrcConnectionID: dda66dd1, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 09:21:38 server Short Header{DestConnectionID: fc7177cc44ca71c05013d7564120c16f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 284e3e59, StatelessResetToken: 0xa4009fcea353ae0e37ee506d8f6e62e0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e13811a6, StatelessResetToken: 0x705e51071b24c000d7cab0151f249a21} 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/e21969b048f05653.sqlog 2025/04/30 09:21:38 server Changing connection ID to c1857bc7. 2025/04/30 09:21:38 Adding connection IDs e21969b048f05653 and c1857bc7 for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection e21969b048f05653, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: e21969b048f05653, SrcConnectionID: d5c02efe4754c7b187285bbf3c069e1c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d5c02efe4754c7b187285bbf3c069e1c, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID d5993c7e. 2025/04/30 09:21:38 Adding connection ID 6edb26e9. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e21969b048f05653 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: d5c02efe4754c7b187285bbf3c069e1c, SrcConnectionID: c1857bc7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 419, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: d5c02efe4754c7b187285bbf3c069e1c, SrcConnectionID: c1857bc7, PacketNumber: 0, PacketNumberLen: 2, Length: 719, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 697, Offset + Data length: 697} 2025/04/30 09:21:38 server Short Header{DestConnectionID: d5c02efe4754c7b187285bbf3c069e1c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6edb26e9, StatelessResetToken: 0x5e39b3ec46aed93c9d087417a46985d9} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d5993c7e, StatelessResetToken: 0xb6e7e139706f80ef5343d0cb3dfc201c} 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/072d88b9a208c550.sqlog 2025/04/30 09:21:38 server Changing connection ID to d12e1708. 2025/04/30 09:21:38 Adding connection IDs 072d88b9a208c550 and d12e1708 for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection 072d88b9a208c550, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 072d88b9a208c550, SrcConnectionID: eaf063d22e5352920ab51eb377b93b8d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: eaf063d22e5352920ab51eb377b93b8d, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID 0c195b79. 2025/04/30 09:21:38 Adding connection ID 637c4cd2. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 072d88b9a208c550 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: eaf063d22e5352920ab51eb377b93b8d, SrcConnectionID: d12e1708, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 411, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: eaf063d22e5352920ab51eb377b93b8d, SrcConnectionID: d12e1708, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 09:21:38 server Short Header{DestConnectionID: eaf063d22e5352920ab51eb377b93b8d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0c195b79, StatelessResetToken: 0x4ff202b375a4c4f027fbe6228bd53e37} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 637c4cd2, StatelessResetToken: 0xf09469d589f25cc0ef579b95c8bcb919} 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/ff617083fcf5b115.sqlog 2025/04/30 09:21:38 server Changing connection ID to 9db3bee0. 2025/04/30 09:21:38 Adding connection IDs ff617083fcf5b115 and 9db3bee0 for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection ff617083fcf5b115, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: ff617083fcf5b115, SrcConnectionID: ef7f52ebce9225999becb3008c5eafef, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: ef7f52ebce9225999becb3008c5eafef, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID 6bfd4661. 2025/04/30 09:21:38 Adding connection ID 090090e0. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ff617083fcf5b115 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: ef7f52ebce9225999becb3008c5eafef, SrcConnectionID: 9db3bee0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 417, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: ef7f52ebce9225999becb3008c5eafef, SrcConnectionID: 9db3bee0, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 09:21:38 server Short Header{DestConnectionID: ef7f52ebce9225999becb3008c5eafef, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 090090e0, StatelessResetToken: 0xc9afe2bea01b3904683dedfb9de0ebc6} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6bfd4661, StatelessResetToken: 0x274e58f83771e4dc07b6e80b912a2208} 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:38 server <- Reading packet 1 (66 bytes) for connection 0eec5a76, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 0eec5a76, SrcConnectionID: c68c28993224fd27dbb901aaad1b3247, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 22.168ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 37.194931ms (σ: 18.597465ms) 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:38 server <- Reading packet 0 (1134 bytes) for connection 0eec5a76, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 0eec5a76, SrcConnectionID: c68c28993224fd27dbb901aaad1b3247, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 22.168ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 37.194ms (σ: 13.947ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID aa80af060c84d68f in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server <- Reading packet 0 (43 bytes) for connection 0eec5a76, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 0eec5a76, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.768ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 37.195ms (σ: 10.463ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID ce37a9d0 in 5s. 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server -> Sending packet 1 (276 bytes) for connection aa80af060c84d68f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: c68c28993224fd27dbb901aaad1b3247, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 541.983µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xdc03ac5f5f0748834eb24c663e9ab7b0465c1aec5bc494b3e90fbd11a8d3d2f57f6e4c292c7ec0d8093ee57feea079ce06944efe176271b72125d19f39894937f36f31e69163ab0688a2f323ae9a4ef1fcbf52339c89} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:38 server <- Reading packet 1 (66 bytes) for connection 91b42f88, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 91b42f88, SrcConnectionID: 2457a36f1a136e11a5ebded5035f7243, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 56.616ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 47.44673ms (σ: 23.723365ms) 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:38 server <- Reading packet 0 (1134 bytes) for connection 91b42f88, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 91b42f88, SrcConnectionID: 2457a36f1a136e11a5ebded5035f7243, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 56.616ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 47.446ms (σ: 17.792ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID 55ab69b83eb6ef83 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection 55ab69b83eb6ef83, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 2457a36f1a136e11a5ebded5035f7243, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x883a731bbc98ad5f4b1d53172c288c9470d87cfd856f52ca1443543960c4c728a988e5e1d0a9caa689354528297ce34d88dd6f26ecaefa4538e24b31bc794d2b8e508664caacb2bfb01bcd88ff5d04e3fab8027aff0f} 2025/04/30 09:21:38 server <- Reading packet 0 (43 bytes) for connection 91b42f88, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 91b42f88, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 7.072ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 47.468ms (σ: 13.389ms) 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID b915abb1 in 5s. 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server -> Sending packet 2 (43 bytes) for connection 55ab69b83eb6ef83, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 2457a36f1a136e11a5ebded5035f7243, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 276.577µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:38 server <- Reading packet 1 (66 bytes) for connection 652fa97c, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 652fa97c, SrcConnectionID: da9614328b03c2f2da15c8f7a0a54b56, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 56.616ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 48.474735ms (σ: 24.237367ms) 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:38 server <- Reading packet 0 (1134 bytes) for connection 652fa97c, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 652fa97c, SrcConnectionID: da9614328b03c2f2da15c8f7a0a54b56, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 56.616ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 48.474ms (σ: 18.177ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID ac0168a9d1a2ba36 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection ac0168a9d1a2ba36, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: da9614328b03c2f2da15c8f7a0a54b56, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xfb7839bda2d3aa292841ef437d90314b4d7dcd6920c10dacad37c9fe1c9bd5bee184b6bedb639c65e827e3d2a7a7af86ca5b67d1e892e23c96d566e847416ecaaa792b7d830de83252bf86d3044083a34e77b8a20c8e} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server <- Reading packet 0 (43 bytes) for connection 652fa97c, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 652fa97c, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 7.072ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 48.56ms (σ: 13.806ms) 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID 8d64d098 in 5s. 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server -> Sending packet 2 (43 bytes) for connection ac0168a9d1a2ba36, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: da9614328b03c2f2da15c8f7a0a54b56, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 104.355µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:38 server <- Reading packet 1 (66 bytes) for connection 9cf90b9a, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 9cf90b9a, SrcConnectionID: 73e250fc1c5dec24e4eb2ee83737ae99, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 56.616ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 48.738577ms (σ: 24.369288ms) 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:38 server <- Reading packet 0 (1134 bytes) for connection 9cf90b9a, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 9cf90b9a, SrcConnectionID: 73e250fc1c5dec24e4eb2ee83737ae99, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 56.616ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 48.738ms (σ: 18.276ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID 226cca1740348987 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection 226cca1740348987, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 73e250fc1c5dec24e4eb2ee83737ae99, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x9ab4690b63649af5896b531a59192460e82e2d935a2e32911c2806ce2b5602f5e6f35f9f0af638babbb8226dab1d169e1a1e5806f58f48ee4dd29ae61645ac59eeb15b77a2412baefdd50219b562fbb0acf2f180e854} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:38 server <- Reading packet 1 (66 bytes) for connection d0872b8a, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: d0872b8a, SrcConnectionID: 6bca1164cc743128669172c2b3deb993, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 56.616ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 49.062174ms (σ: 24.531087ms) 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:38 server <- Reading packet 0 (1134 bytes) for connection d0872b8a, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: d0872b8a, SrcConnectionID: 6bca1164cc743128669172c2b3deb993, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 56.616ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 49.062ms (σ: 18.398ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server <- Reading packet 1 (45 bytes) for connection 91b42f88, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 91b42f88, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:38 Retiring connection ID 13ec6cad3dc00557 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 Received request: GET /atyzommkan 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 6bca1164cc743128669172c2b3deb993, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x3cdf5fa5c46136e6bee7eb6213b6a322fb89030f96b5c8a43b2f67149b041f3ef5ba2040d16f43bbe0a5ad7edf822289b3cbadec3317e4a2e1e4aa558e756559c93e63adcbeab66020b2bb86948204fa503239dd79d5} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server <- Reading packet 0 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 7.072ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 49.097ms (σ: 13.868ms) 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID 4871ab7c in 5s. 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server -> Sending packet 2 (43 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 6bca1164cc743128669172c2b3deb993, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 470.279µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> Sending packet 3 (1070 bytes) for connection 55ab69b83eb6ef83, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 2457a36f1a136e11a5ebded5035f7243, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 767.082µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:38 server <- Reading packet 1 (66 bytes) for connection 9c4a3632, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 9c4a3632, SrcConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 79.952ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 63.480274ms (σ: 31.740137ms) 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:38 server <- Reading packet 0 (1134 bytes) for connection 9c4a3632, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 9c4a3632, SrcConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 79.952ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 63.48ms (σ: 23.805ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID 0673282f3216e3fd in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server <- Reading packet 0 (43 bytes) for connection 9c4a3632, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 9c4a3632, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.992ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 63.484ms (σ: 17.861ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID 3364e27c in 5s. 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server -> Sending packet 1 (275 bytes) for connection 0673282f3216e3fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 440.664µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xf26669a29e687979544f37ce5674bb3b0bfffcb125fb8425deebf60e526d88e2b576a294962e1952a461eae39347def49822150057eec4bef07c70f7c5023de3736401908af135bdea3bcab56db6ebc101e6603df1cb} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:38 server <- Reading packet 1 (66 bytes) for connection a48a6cd2, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: a48a6cd2, SrcConnectionID: 4f6507d51a7d77bf3c049f819981b6b3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 79.952ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 61.813519ms (σ: 30.906759ms) 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:38 server <- Reading packet 0 (1134 bytes) for connection a48a6cd2, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: a48a6cd2, SrcConnectionID: 4f6507d51a7d77bf3c049f819981b6b3, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 79.952ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 61.813ms (σ: 23.179ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID 33af4a20c088fdf7 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server <- Reading packet 0 (43 bytes) for connection a48a6cd2, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: a48a6cd2, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.992ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 61.814ms (σ: 17.386ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID 4b59879a in 5s. 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server -> Sending packet 1 (275 bytes) for connection 33af4a20c088fdf7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 4f6507d51a7d77bf3c049f819981b6b3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 387.367µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x44f05ea99ee097cb3eb9cfb71acad67568906b597fa82db01599c6bffea7785478e1a8bae093a492834100a2e7b19b6cb41f4afe1a7224bea3608b096f7bdb4d35e2ad752fe50ce63907ec4a83319c7631cd9e127dde} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server Queueing packet (43 bytes) for later decryption 2025/04/30 09:21:38 server <- Reading packet 1 (45 bytes) for connection 9c4a3632, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 9c4a3632, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:38 Received request: GET /lzpzfadpbf 2025/04/30 09:21:38 server -> Sending packet 2 (1069 bytes) for connection 0673282f3216e3fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 286.588µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:38 server <- Reading packet 1 (45 bytes) for connection a48a6cd2, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: a48a6cd2, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:38 Received request: GET /wwzsiyaeqx 2025/04/30 09:21:38 server -> Sending packet 2 (1069 bytes) for connection 33af4a20c088fdf7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 4f6507d51a7d77bf3c049f819981b6b3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 289.611µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server <- Reading packet 2 (139 bytes) for connection 652fa97c, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 652fa97c, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.032ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [1] 2025/04/30 09:21:38 server updated RTT: 46.613ms (σ: 14.247ms) 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 62f912874bd206abac37ab352f6433c4, StatelessResetToken: 0x78969266aca2959929e8b62041981e47} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: cd761f4e4f0520327cab6b741a4859e5, StatelessResetToken: 0x6f61ad516d666547ce87ae0c77583b4b} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: af24d1444d406c3edab1ef5bbb628c14, StatelessResetToken: 0xfdce3de286ce5a964ea3e90aa5633621} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server -> Sending packet 3 (47 bytes) for connection ac0168a9d1a2ba36, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 62f912874bd206abac37ab352f6433c4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 171.08µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server <- Reading packet 2 (139 bytes) for connection 9cf90b9a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 9cf90b9a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.136ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (2): [0 1] 2025/04/30 09:21:38 server updated RTT: 46.89ms (σ: 17.401ms) 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: cfde5e887fc1a2f13ab060b683ba62cf, StatelessResetToken: 0x05721b86715ff66688aee856af1386fa} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: b6452b8d9d6a96085056de7569a29f96, StatelessResetToken: 0x1ba54d4d2bcc3ec194c154cc1158de68} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 656be7635e99a6fc284817569222cbdd, StatelessResetToken: 0xd9fb3803b75cb127456db17b5620cb45} 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server -> Sending packet 2 (45 bytes) for connection 226cca1740348987, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: cfde5e887fc1a2f13ab060b683ba62cf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 156.843µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server <- Reading packet 2 (139 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.224ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [1] 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 65 bytes. Remaining: 43 bytes. 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 789803d2d13a0d1d465937a4260c487e, StatelessResetToken: 0x787a93d16b8a852fea9466ed6ef2b30a} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 5cbe8cfb5f37a010c54c8a21362d681c, StatelessResetToken: 0xa9f1d65789db6119a7e29105a3ffa6b6} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 8d025b09e398b761c67e8ae27c4c7975, StatelessResetToken: 0x30d91de82e89decd616e1ec8f2ece61f} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server -> Sending packet 3 (47 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:21:38 server <- Reading packet 2 (43 bytes) for connection 91b42f88, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 91b42f88, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:38 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 142.497µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Replacing connection for connection IDs [91b42f88 a8207e69] with a closed connection. 2025/04/30 09:21:38 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:38 server Connection 55ab69b83eb6ef83 closed. 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/a3fe4aa400102af5.sqlog 2025/04/30 09:21:38 server Changing connection ID to 2c0cfeb3. 2025/04/30 09:21:38 Adding connection IDs a3fe4aa400102af5 and 2c0cfeb3 for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection a3fe4aa400102af5, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: a3fe4aa400102af5, SrcConnectionID: 489e159b97b05b0caf9ac14aad9ec19a, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 489e159b97b05b0caf9ac14aad9ec19a, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID f8e78c7a. 2025/04/30 09:21:38 Adding connection ID f1aa8357. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a3fe4aa400102af5 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 489e159b97b05b0caf9ac14aad9ec19a, SrcConnectionID: 2c0cfeb3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 955, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 489e159b97b05b0caf9ac14aad9ec19a, SrcConnectionID: 2c0cfeb3, PacketNumber: 0, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 09:21:38 server Short Header{DestConnectionID: 489e159b97b05b0caf9ac14aad9ec19a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f8e78c7a, StatelessResetToken: 0x576d3f7a8642bf368057d6794df7cf1f} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f1aa8357, StatelessResetToken: 0x4a2c465bf55841acc5eafc7581bd3da5} 2025/04/30 09:21:38 server <- Reading packet 3 (53 bytes) for connection 652fa97c, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 652fa97c, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 496µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [3] 2025/04/30 09:21:38 server updated RTT: 44.758ms (σ: 14.394ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:38 server Ignoring all packets below 3. 2025/04/30 09:21:38 Received request: GET /dzeieisajp 2025/04/30 09:21:38 server -> Sending packet 4 (1069 bytes) for connection ac0168a9d1a2ba36, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 62f912874bd206abac37ab352f6433c4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 336.138µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server <- Reading packet 3 (55 bytes) for connection 9cf90b9a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 9cf90b9a, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 464µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [2] 2025/04/30 09:21:38 server updated RTT: 44.98ms (σ: 16.869ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID e9bae830 in 5s. 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:38 server Ignoring all packets below 3. 2025/04/30 09:21:38 Received request: GET /peoxngjunp 2025/04/30 09:21:38 server -> Sending packet 3 (1069 bytes) for connection 226cca1740348987, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: cfde5e887fc1a2f13ab060b683ba62cf, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 257.622µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 3 (267 bytes) for connection aa80af060c84d68f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: c68c28993224fd27dbb901aaad1b3247, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xdc03ac5f5f0748834eb24c663e9ab7b0465c1aec5bc494b3e90fbd11a8d3d2f57f6e4c292c7ec0d8093ee57feea079ce06944efe176271b72125d19f39894937f36f31e69163ab0688a2f323ae9a4ef1fcbf52339c89} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> Sending packet 4 (267 bytes) for connection aa80af060c84d68f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: c68c28993224fd27dbb901aaad1b3247, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xdc03ac5f5f0748834eb24c663e9ab7b0465c1aec5bc494b3e90fbd11a8d3d2f57f6e4c292c7ec0d8093ee57feea079ce06944efe176271b72125d19f39894937f36f31e69163ab0688a2f323ae9a4ef1fcbf52339c89} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:38 server <- Reading packet 1 (66 bytes) for connection f8e78c7a, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: f8e78c7a, SrcConnectionID: 489e159b97b05b0caf9ac14aad9ec19a, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.952ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 35.673044ms (σ: 17.836522ms) 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:38 server <- Reading packet 0 (1134 bytes) for connection f8e78c7a, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: f8e78c7a, SrcConnectionID: 489e159b97b05b0caf9ac14aad9ec19a, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.952ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 35.673ms (σ: 13.377ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID a3fe4aa400102af5 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 489e159b97b05b0caf9ac14aad9ec19a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x6e8f2f4b99eff95023c2581d4168d461c2b0e6249a0f45aaa952f0cfb11209f01cd35e5739dc49866ee94148b184d078d18700eb18ba273e2fe72f30b13032a7e0b3ce66b4432c68c50cfa9ebe46f79ea50e457a8455} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server <- Reading packet 4 (43 bytes) for connection 652fa97c, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 652fa97c, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:38 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:38 Replacing connection for connection IDs [652fa97c 0fc384e3] with a closed connection. 2025/04/30 09:21:38 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:38 server Connection ac0168a9d1a2ba36 closed. 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/8148dac8fc4e1535.sqlog 2025/04/30 09:21:38 server Changing connection ID to 9108d06f. 2025/04/30 09:21:38 Adding connection IDs 8148dac8fc4e1535 and 9108d06f for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection 8148dac8fc4e1535, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 8148dac8fc4e1535, SrcConnectionID: 719c740a7738841e55a1761f678a93bf, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 719c740a7738841e55a1761f678a93bf, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID bf362d96. 2025/04/30 09:21:38 Adding connection ID a81a3c41. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8148dac8fc4e1535 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 719c740a7738841e55a1761f678a93bf, SrcConnectionID: 9108d06f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 415, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 719c740a7738841e55a1761f678a93bf, SrcConnectionID: 9108d06f, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 09:21:38 server Short Header{DestConnectionID: 719c740a7738841e55a1761f678a93bf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bf362d96, StatelessResetToken: 0xa19cd33249da5f497d82217d03884b47} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a81a3c41, StatelessResetToken: 0xdbbed5d4035f2536c3f3ee84c5e899ac} 2025/04/30 09:21:38 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:38 server <- Reading packet 2 (141 bytes) for connection 0eec5a76, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 0eec5a76, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 792µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 79432f90291ab05c37a2e3c5f61a8657, StatelessResetToken: 0xb2f3a0e8f0480944f89bf9aa920e8687} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: c7224b3df0633a6d66d1f9e2f4deb764, StatelessResetToken: 0xcc1c23e141dc1ef5d20869ef33323731} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: b6f4b9a5ec46c0971cd1a1b3c4f0223c, StatelessResetToken: 0xaf250e79f89c3d0f0cf705fed40476c9} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server -> Sending packet 5 (47 bytes) for connection aa80af060c84d68f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 79432f90291ab05c37a2e3c5f61a8657, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 167.763µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:38 server <- Reading packet 1 (66 bytes) for connection bf362d96, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: bf362d96, SrcConnectionID: 719c740a7738841e55a1761f678a93bf, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 17.456ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 36.064157ms (σ: 18.032078ms) 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:38 server <- Reading packet 0 (1134 bytes) for connection bf362d96, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: bf362d96, SrcConnectionID: 719c740a7738841e55a1761f678a93bf, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 17.456ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 36.064ms (σ: 13.524ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID 8148dac8fc4e1535 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection 8148dac8fc4e1535, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 719c740a7738841e55a1761f678a93bf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x95c3843341378a23d421392d4591510a5d777db8751c0d1edf6edaf514b9892e49aaeb4c3baa7b9940149a9c49b2fed76f489ec07279c247154c2060cbe9156ffe52cbf9dede224588243635454e1e58ac21e133707e} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server <- Reading packet 0 (43 bytes) for connection bf362d96, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: bf362d96, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.176ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 36.086ms (σ: 10.188ms) 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID 9108d06f in 5s. 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server <- Reading packet 1 (45 bytes) for connection bf362d96, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: bf362d96, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server -> Sending packet 2 (43 bytes) for connection 8148dac8fc4e1535, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 719c740a7738841e55a1761f678a93bf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 441.247µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 Received request: GET /zgnjfgsvcz 2025/04/30 09:21:38 server -> Sending packet 3 (1061 bytes) for connection 8148dac8fc4e1535, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 719c740a7738841e55a1761f678a93bf, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 1 (1280 bytes) for connection 874a008efe949583, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 7150587477cec824956dbb6ad78a42da, SrcConnectionID: 396d117f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server -> Sending packet 2 (1280 bytes) for connection 874a008efe949583, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 7150587477cec824956dbb6ad78a42da, SrcConnectionID: 396d117f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:38 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 1 (1280 bytes) for connection bf46aa81dbcd04f0, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 5d8c83050d1fad9eea540e012fd55cb3, SrcConnectionID: ac0472bf, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server -> Sending packet 2 (1280 bytes) for connection bf46aa81dbcd04f0, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 5d8c83050d1fad9eea540e012fd55cb3, SrcConnectionID: ac0472bf, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server Amplification window limited. Received 1245 bytes, already sent out 3840 bytes 2025/04/30 09:21:38 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 1 (1280 bytes) for connection ef1be9349c65b9e1, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: fc7177cc44ca71c05013d7564120c16f, SrcConnectionID: dda66dd1, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server -> Sending packet 2 (1280 bytes) for connection ef1be9349c65b9e1, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: fc7177cc44ca71c05013d7564120c16f, SrcConnectionID: dda66dd1, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:38 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 1 (1280 bytes) for connection e21969b048f05653, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: d5c02efe4754c7b187285bbf3c069e1c, SrcConnectionID: c1857bc7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server -> Sending packet 2 (1280 bytes) for connection e21969b048f05653, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: d5c02efe4754c7b187285bbf3c069e1c, SrcConnectionID: c1857bc7, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server Amplification window limited. Received 1245 bytes, already sent out 3840 bytes 2025/04/30 09:21:38 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 1 (1280 bytes) for connection 072d88b9a208c550, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: eaf063d22e5352920ab51eb377b93b8d, SrcConnectionID: d12e1708, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server -> Sending packet 2 (1280 bytes) for connection 072d88b9a208c550, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: eaf063d22e5352920ab51eb377b93b8d, SrcConnectionID: d12e1708, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server Amplification window limited. Received 1243 bytes, already sent out 3840 bytes 2025/04/30 09:21:38 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 1 (1280 bytes) for connection ff617083fcf5b115, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: ef7f52ebce9225999becb3008c5eafef, SrcConnectionID: 9db3bee0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server -> Sending packet 2 (1280 bytes) for connection ff617083fcf5b115, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: ef7f52ebce9225999becb3008c5eafef, SrcConnectionID: 9db3bee0, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 5 (37 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server -> Sending packet 6 (37 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 4 (267 bytes) for connection 33af4a20c088fdf7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 4f6507d51a7d77bf3c049f819981b6b3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x44f05ea99ee097cb3eb9cfb71acad67568906b597fa82db01599c6bffea7785478e1a8bae093a492834100a2e7b19b6cb41f4afe1a7224bea3608b096f7bdb4d35e2ad752fe50ce63907ec4a83319c7631cd9e127dde} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server Skipping packet number 3 2025/04/30 09:21:38 server -> Sending packet 5 (1061 bytes) for connection 33af4a20c088fdf7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 4f6507d51a7d77bf3c049f819981b6b3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 4 (267 bytes) for connection 0673282f3216e3fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xf26669a29e687979544f37ce5674bb3b0bfffcb125fb8425deebf60e526d88e2b576a294962e1952a461eae39347def49822150057eec4bef07c70f7c5023de3736401908af135bdea3bcab56db6ebc101e6603df1cb} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server Skipping packet number 3 2025/04/30 09:21:38 server -> Sending packet 5 (1061 bytes) for connection 0673282f3216e3fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server <- Reading packet 1 (1200 bytes) for connection 396d117f, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 396d117f, SrcConnectionID: 7150587477cec824956dbb6ad78a42da, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 6.808ms} 2025/04/30 09:21:38 server newly acked packets (1): [2] 2025/04/30 09:21:38 server updated RTT: 35.391619ms (σ: 17.695809ms) 2025/04/30 09:21:38 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 1 (754 bytes) for connection 874a008efe949583, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 7150587477cec824956dbb6ad78a42da, SrcConnectionID: 396d117f, PacketNumber: 1, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 09:21:38 server -> Sending packet 2 (754 bytes) for connection 874a008efe949583, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 7150587477cec824956dbb6ad78a42da, SrcConnectionID: 396d117f, PacketNumber: 2, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 09:21:38 server <- Reading packet 1 (1200 bytes) for connection dda66dd1, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: dda66dd1, SrcConnectionID: fc7177cc44ca71c05013d7564120c16f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 5.784ms} 2025/04/30 09:21:38 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:38 server <- Reading packet 2 (93 bytes) for connection 292fa9fd, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 292fa9fd, SrcConnectionID: 5d8c83050d1fad9eea540e012fd55cb3, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.548952s} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 241.065155ms (σ: 120.532577ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID bf46aa81dbcd04f0 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection bf46aa81dbcd04f0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 5d8c83050d1fad9eea540e012fd55cb3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server <- Reading packet 2 (93 bytes) for connection 0c195b79, Handshake 2025/04/30 09:21:38 server <- Reading packet 2 (93 bytes) for connection 6edb26e9, Handshake 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xeaf6566607611ecee66428d6a99015ca7b102a23a8b38e3e0fc386f51940bf14732bd214a508f80a17e38b2f3b0a0084bf63c6e87f20261c6105e6a562a45d67c726753fae038a003879d475100b649effbf4a49d5de} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 0c195b79, SrcConnectionID: eaf063d22e5352920ab51eb377b93b8d, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.548952s} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 6edb26e9, SrcConnectionID: d5c02efe4754c7b187285bbf3c069e1c, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server <- Reading packet 1 (45 bytes) for connection 292fa9fd, 1-RTT 2025/04/30 09:21:38 server updated RTT: 237.62826ms (σ: 118.81413ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.548952s} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 238.524259ms (σ: 119.262129ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID 072d88b9a208c550 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID e21969b048f05653 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection 072d88b9a208c550, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: eaf063d22e5352920ab51eb377b93b8d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xfb47dbaccf63fda21031bf3a70d4c116467c857806fc496bb6389864aba593264307792502f882f5bc564b81f54cd49ad18b7072b34616ff4a34a8cbc5e4e83a7d578c2855bb45e5cb7fae48b9e938937dd18b5f9cf5} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server <- Reading packet 0 (43 bytes) for connection 0c195b79, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 0c195b79, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 9.992ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 215.554ms (σ: 133.258ms) 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection e21969b048f05653, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: d5c02efe4754c7b187285bbf3c069e1c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xe43fb8a02f1ba8f96179768dd5dd97ea4937c57d8ccbfcdce5cf97fdabd303166b9f0b5247bd891113b1903dbde82bf6465e1e1068832adf6e0a1a957ecbfe1ac5dc5063973091e99d5b402dae82b62ff33be559b02c} 2025/04/30 09:21:38 server <- Reading packet 2 (93 bytes) for connection 090090e0, Handshake 2025/04/30 09:21:38 server <- Reading packet 1 (45 bytes) for connection 6edb26e9, 1-RTT 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 090090e0, SrcConnectionID: ef7f52ebce9225999becb3008c5eafef, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server Short Header{DestConnectionID: 6edb26e9, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server Short Header{DestConnectionID: 292fa9fd, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server -> Sending packet 2 (46 bytes) for connection e21969b048f05653, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: d5c02efe4754c7b187285bbf3c069e1c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 Retiring connection ID d12e1708 in 5s. 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 Received request: GET /fvfhrsvnwu 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 175.440195ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 Received request: GET /gaigaovviw 2025/04/30 09:21:38 server -> Sending packet 2 (46 bytes) for connection bf46aa81dbcd04f0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 5d8c83050d1fad9eea540e012fd55cb3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 175.930909ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> Sending packet 3 (1061 bytes) for connection bf46aa81dbcd04f0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 5d8c83050d1fad9eea540e012fd55cb3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:38 server -> Sending packet 2 (46 bytes) for connection 072d88b9a208c550, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.548952s} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 234.254716ms (σ: 117.127358ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server -> Sending packet 3 (1061 bytes) for connection e21969b048f05653, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Short Header{DestConnectionID: d5c02efe4754c7b187285bbf3c069e1c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID ff617083fcf5b115 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: ef7f52ebce9225999becb3008c5eafef, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server Short Header{DestConnectionID: eaf063d22e5352920ab51eb377b93b8d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 177.605967ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xc59fe604b600b558b9794ce0dd2960832dd0ec944fd8c4ff2dcfdd8efa39723f0a6bc649a8b732f2b72d4635ba067c05d6a1bb8891b29267d429d62af3ed2cabaaa96ba85bfd641adf592cecdf6c189562095fd9c87b} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server <- Reading packet 4 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 224µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 5 (1061 bytes) for connection 226cca1740348987, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: cfde5e887fc1a2f13ab060b683ba62cf, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server -> Sending packet 6 (1061 bytes) for connection 226cca1740348987, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: cfde5e887fc1a2f13ab060b683ba62cf, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 3 (83 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 489e159b97b05b0caf9ac14aad9ec19a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f8e78c7a, StatelessResetToken: 0x576d3f7a8642bf368057d6794df7cf1f} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f1aa8357, StatelessResetToken: 0x4a2c465bf55841acc5eafc7581bd3da5} 2025/04/30 09:21:38 server Skipping packet number 2 2025/04/30 09:21:38 server -> Sending packet 4 (267 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 489e159b97b05b0caf9ac14aad9ec19a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x6e8f2f4b99eff95023c2581d4168d461c2b0e6249a0f45aaa952f0cfb11209f01cd35e5739dc49866ee94148b184d078d18700eb18ba273e2fe72f30b13032a7e0b3ce66b4432c68c50cfa9ebe46f79ea50e457a8455} 2025/04/30 09:21:38 server <- Reading packet 2 (43 bytes) for connection 9c4a3632, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 9c4a3632, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 208µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [5] 2025/04/30 09:21:38 server updated RTT: 59.61ms (σ: 21.143ms) 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server setting loss timer for packet 4 (1-RTT) to 67.06125ms (in 2025-04-30 09:21:38.399944697 +0000 UTC m=+1.397577073) 2025/04/30 09:21:38 server -> Sending packet 6 (38 bytes) for connection 0673282f3216e3fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:38 server <- Reading packet 6 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 19.528ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [6] 2025/04/30 09:21:38 server updated RTT: 49.42ms (σ: 11.047ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server -> Sending packet 7 (49 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 176.349µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- Reading packet 0 (91 bytes) for connection 396d117f, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 396d117f, SrcConnectionID: 7150587477cec824956dbb6ad78a42da, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 9.384ms} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID 874a008efe949583 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 2 (315 bytes) for connection 874a008efe949583, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7150587477cec824956dbb6ad78a42da, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb61eee6, StatelessResetToken: 0xf46c62dafb21cd8674ea9ad75194d641} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1775ef6b, StatelessResetToken: 0x2536c0169e867abfee8363d03f1d41d1} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x7fcb2a4b8c665526e732f717ea91c11429c93f3efeb8a33dfdf5ad269a1ad511ceea6b6600e6168520df552103419283ca57d1960b4b5d0fb1aedf56bba51ad648733cf0b317dec70b6642825198cc7b48bb8ca96625} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> Sending packet 3 (315 bytes) for connection 874a008efe949583, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7150587477cec824956dbb6ad78a42da, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cb61eee6, StatelessResetToken: 0xf46c62dafb21cd8674ea9ad75194d641} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 1775ef6b, StatelessResetToken: 0x2536c0169e867abfee8363d03f1d41d1} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x7fcb2a4b8c665526e732f717ea91c11429c93f3efeb8a33dfdf5ad269a1ad511ceea6b6600e6168520df552103419283ca57d1960b4b5d0fb1aedf56bba51ad648733cf0b317dec70b6642825198cc7b48bb8ca96625} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server <- Reading packet 0 (45 bytes) for connection 396d117f, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 396d117f, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server -> Sending packet 4 (44 bytes) for connection 874a008efe949583, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 Received request: GET /mffmqvwqun 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7150587477cec824956dbb6ad78a42da, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 691.778µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> Sending packet 5 (1061 bytes) for connection 874a008efe949583, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7150587477cec824956dbb6ad78a42da, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server <- Reading packet 2 (139 bytes) for connection 292fa9fd, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 292fa9fd, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 904µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (2): [0 1] 2025/04/30 09:21:38 server updated RTT: 215.055ms (σ: 142.418ms) 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: ee94def7241e1e780468d300c3a387f9, StatelessResetToken: 0x30d32afdb4e5fc0513873aaa4d98b652} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: b9afb881481e02d7007321adff0f4fcd, StatelessResetToken: 0x82431b716743097dff333bb09bbf58b5} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 198f41b73fe5aca04aa539616ed28b8d, StatelessResetToken: 0x786855f6f3889b40156511c7bafb58f3} 2025/04/30 09:21:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:38 server -> Sending packet 4 (45 bytes) for connection bf46aa81dbcd04f0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: ee94def7241e1e780468d300c3a387f9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 137.797µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server <- Reading packet 3 (43 bytes) for connection f8e78c7a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: f8e78c7a, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 376µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [3] 2025/04/30 09:21:38 server updated RTT: 35.249ms (σ: 10.88ms) 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 5 (267 bytes) for connection 8148dac8fc4e1535, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 719c740a7738841e55a1761f678a93bf, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x95c3843341378a23d421392d4591510a5d777db8751c0d1edf6edaf514b9892e49aaeb4c3baa7b9940149a9c49b2fed76f489ec07279c247154c2060cbe9156ffe52cbf9dede224588243635454e1e58ac21e133707e} 2025/04/30 09:21:38 server Skipping packet number 4 2025/04/30 09:21:38 server -> Sending packet 6 (1061 bytes) for connection 8148dac8fc4e1535, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 719c740a7738841e55a1761f678a93bf, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:21:38.399944697 +0000 UTC m=+1.397577073 2025/04/30 09:21:38 server lost packet 4 (time threshold) 2025/04/30 09:21:38 server -> Sending packet 7 (267 bytes) for connection 0673282f3216e3fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xf26669a29e687979544f37ce5674bb3b0bfffcb125fb8425deebf60e526d88e2b576a294962e1952a461eae39347def49822150057eec4bef07c70f7c5023de3736401908af135bdea3bcab56db6ebc101e6603df1cb} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 65 bytes. Remaining: 43 bytes. 2025/04/30 09:21:38 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:21:38 server <- Reading packet 2 (43 bytes) for connection a48a6cd2, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: a48a6cd2, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:38 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:38 Replacing connection for connection IDs [a48a6cd2 0150a0c6] with a closed connection. 2025/04/30 09:21:38 server Connection 33af4a20c088fdf7 closed. 2025/04/30 09:21:38 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:38 server <- Reading packet 3 (43 bytes) for connection 292fa9fd, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 292fa9fd, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 23.6ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID ac0472bf in 5s. 2025/04/30 09:21:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:38 server <- Reading packet 7 (43 bytes) for connection f8e78c7a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: f8e78c7a, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 14.272ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [4] 2025/04/30 09:21:38 server updated RTT: 35.069ms (σ: 8.519ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server <- Reading packet 1 (141 bytes) for connection cb61eee6, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: cb61eee6, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 944µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [3] 2025/04/30 09:21:38 server updated RTT: 35.211ms (σ: 13.629ms) 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server -> Sending packet 5 (45 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: d420b11360f6d4ea1a77da5f42011d5f, StatelessResetToken: 0x86d9217a13c6adfda469111cf1dbf80e} 2025/04/30 09:21:38 server Short Header{DestConnectionID: 489e159b97b05b0caf9ac14aad9ec19a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 110.036µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 09cb47827ff3a4e0cb969538b817c041, StatelessResetToken: 0xbf03965be6457f996e68eacfefb8cf05} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 42ad44a8a79507a9b4198ae7609315d3, StatelessResetToken: 0x08fec3b78551cd59e4db9a1062334eef} 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID 396d117f in 5s. 2025/04/30 09:21:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:38 server -> Sending packet 6 (45 bytes) for connection 874a008efe949583, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: d420b11360f6d4ea1a77da5f42011d5f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 346.708µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server <- Reading packet 2 (43 bytes) for connection cb61eee6, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: cb61eee6, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 240µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [5] 2025/04/30 09:21:38 server updated RTT: 34.975ms (σ: 10.692ms) 2025/04/30 09:21:38 server -> Sending packet 7 (38 bytes) for connection 874a008efe949583, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: d420b11360f6d4ea1a77da5f42011d5f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/09aff03dcb509c02.sqlog 2025/04/30 09:21:38 server Changing connection ID to 36684893. 2025/04/30 09:21:38 Adding connection IDs 09aff03dcb509c02 and 36684893 for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection 09aff03dcb509c02, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 09aff03dcb509c02, SrcConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID d53315bb. 2025/04/30 09:21:38 Adding connection ID 6d9b0862. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 09aff03dcb509c02 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, SrcConnectionID: 36684893, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 965, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, SrcConnectionID: 36684893, PacketNumber: 0, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:38 server Short Header{DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d53315bb, StatelessResetToken: 0xb8b77209a7512b8a92228df93ec596bf} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6d9b0862, StatelessResetToken: 0x7d0ad1aeae9aea11b773f08553b4f158} 2025/04/30 09:21:38 server <- Reading packet 4 (43 bytes) for connection 9cf90b9a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 9cf90b9a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:38 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:38 Replacing connection for connection IDs [9cf90b9a d13beb5c] with a closed connection. 2025/04/30 09:21:38 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:38 server Connection 226cca1740348987 closed. 2025/04/30 09:21:38 server <- Reading packet 2 (141 bytes) for connection bf362d96, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: bf362d96, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 648µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [5] 2025/04/30 09:21:38 server updated RTT: 35.627ms (σ: 8.557ms) 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 4f92ba42a229b7d685a0effa3aa77fbb, StatelessResetToken: 0x41f42e659d384f71e1412b887662e76f} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 6b1cda20d4c0af918bed332cbd4b954f, StatelessResetToken: 0xbdfd919668ce2ce32be7cb0d92e78b79} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 949f89d41a27e44557060aac0c3d76d8, StatelessResetToken: 0x04a6251999e5b9888248fd9ecc363f00} 2025/04/30 09:21:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:38 server -> Sending packet 7 (45 bytes) for connection 8148dac8fc4e1535, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 4f92ba42a229b7d685a0effa3aa77fbb, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 131.887µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server <- Reading packet 3 (43 bytes) for connection bf362d96, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: bf362d96, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:38 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:38 Replacing connection for connection IDs [bf362d96 a81a3c41] with a closed connection. 2025/04/30 09:21:38 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:38 server Connection 8148dac8fc4e1535 closed. 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/40bbfb046db4d45c.sqlog 2025/04/30 09:21:38 server Changing connection ID to 51a20b6e. 2025/04/30 09:21:38 Adding connection IDs 40bbfb046db4d45c and 51a20b6e for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection 40bbfb046db4d45c, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 40bbfb046db4d45c, SrcConnectionID: 7683540266912a242b78461f9d199114, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:38 server Sending ACK because the ACK timer expired. 2025/04/30 09:21:38 server -> Sending packet 5 (44 bytes) for connection bf46aa81dbcd04f0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: ee94def7241e1e780468d300c3a387f9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 25.034607ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7683540266912a242b78461f9d199114, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID acbe6295. 2025/04/30 09:21:38 Adding connection ID ccc6dee7. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 40bbfb046db4d45c 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 7683540266912a242b78461f9d199114, SrcConnectionID: 51a20b6e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 962, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 7683540266912a242b78461f9d199114, SrcConnectionID: 51a20b6e, PacketNumber: 0, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7683540266912a242b78461f9d199114, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: acbe6295, StatelessResetToken: 0x2da2c81f346ee03b423b3ea3de13a193} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ccc6dee7, StatelessResetToken: 0x244a74de141a6105e924f558021bdc1e} 2025/04/30 09:21:38 server <- Reading packet 8 (164 bytes) for connection f8e78c7a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: f8e78c7a, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 840µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 7e0cf1041fabdbf364aa0bec2d90a97c, StatelessResetToken: 0x86e7799c38f23a7c813d005603923c84} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 04e77d5b07caa24386fe6dfb07654190, StatelessResetToken: 0xefd46beeea6b1e1d2e97e2cdabf65784} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 7203038d16e82adf25637c15f2c39eb7, StatelessResetToken: 0x9485fc383f571b50e538ec94e52306ec} 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID 2c0cfeb3 in 5s. 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:38 server -> Sending packet 6 (1366 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7e0cf1041fabdbf364aa0bec2d90a97c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.PingFrame{} 2025/04/30 09:21:38 server -> Sending packet 7 (47 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7e0cf1041fabdbf364aa0bec2d90a97c, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 233.737µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Received request: GET /jpapcvfeyk 2025/04/30 09:21:38 server -> Sending packet 8 (1061 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7e0cf1041fabdbf364aa0bec2d90a97c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server <- Reading packet 3 (43 bytes) for connection cb61eee6, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: cb61eee6, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:38 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:38 Replacing connection for connection IDs [cb61eee6 1775ef6b] with a closed connection. 2025/04/30 09:21:38 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:38 server Connection 874a008efe949583 closed. 2025/04/30 09:21:38 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 1 (1280 bytes) for connection 09aff03dcb509c02, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, SrcConnectionID: 36684893, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:38 server -> Sending packet 2 (1280 bytes) for connection 09aff03dcb509c02, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, SrcConnectionID: 36684893, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:38 server <- Reading packet 6 (43 bytes) for connection 0eec5a76, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 0eec5a76, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 150.256ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (2): [4 5] 2025/04/30 09:21:38 server updated RTT: 52.178ms (σ: 37.814ms) 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server Ignoring all packets below 3. 2025/04/30 09:21:38 server <- Reading packet 8 (43 bytes) for connection 0eec5a76, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 0eec5a76, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 150.256ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server -> Sending packet 6 (1366 bytes) for connection aa80af060c84d68f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 79432f90291ab05c37a2e3c5f61a8657, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.PingFrame{} 2025/04/30 09:21:38 server -> Sending packet 7 (45 bytes) for connection aa80af060c84d68f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 79432f90291ab05c37a2e3c5f61a8657, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 275.455µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server Queueing packet (43 bytes) for later decryption 2025/04/30 09:21:38 server <- Reading packet 9 (43 bytes) for connection f8e78c7a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: f8e78c7a, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 5, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 512µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (2): [6 8] 2025/04/30 09:21:38 server updated RTT: 34.85ms (σ: 6.825ms) 2025/04/30 09:21:38 server setting loss timer for packet 7 (1-RTT) to 39.20625ms (in 2025-04-30 09:21:38.480191326 +0000 UTC m=+1.477823702) 2025/04/30 09:21:38 server -> Sending packet 9 (38 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7e0cf1041fabdbf364aa0bec2d90a97c, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/4d60efc2d057faea.sqlog 2025/04/30 09:21:38 server Changing connection ID to 3d9d2cc2. 2025/04/30 09:21:38 Adding connection IDs 4d60efc2d057faea and 3d9d2cc2 for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection 4d60efc2d057faea, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 4d60efc2d057faea, SrcConnectionID: f09cd925de5ab7a9c6f9554f7e6b9383, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f09cd925de5ab7a9c6f9554f7e6b9383, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID 5f8405ed. 2025/04/30 09:21:38 Adding connection ID 377ff026. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4d60efc2d057faea 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: f09cd925de5ab7a9c6f9554f7e6b9383, SrcConnectionID: 3d9d2cc2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 963, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: f09cd925de5ab7a9c6f9554f7e6b9383, SrcConnectionID: 3d9d2cc2, PacketNumber: 0, PacketNumberLen: 2, Length: 175, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 153, Offset + Data length: 153} 2025/04/30 09:21:38 server Short Header{DestConnectionID: f09cd925de5ab7a9c6f9554f7e6b9383, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f8405ed, StatelessResetToken: 0x5e3675045ca569f2f40bb23d67c9b786} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 377ff026, StatelessResetToken: 0x24d0a5849cd5f9bfeb93c96d15601de7} 2025/04/30 09:21:38 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:21:38.480191326 +0000 UTC m=+1.477823702 2025/04/30 09:21:38 server lost packet 7 (time threshold) 2025/04/30 09:21:38 server -> Sending packet 10 (37 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7e0cf1041fabdbf364aa0bec2d90a97c, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server <- Reading packet 1 (1200 bytes) for connection 36684893, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 36684893, SrcConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 5.504ms} 2025/04/30 09:21:38 server newly acked packets (1): [2] 2025/04/30 09:21:38 server updated RTT: 35.026886ms (σ: 17.513443ms) 2025/04/30 09:21:38 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:38 server -> Sending packet 1 (750 bytes) for connection ef1be9349c65b9e1, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: fc7177cc44ca71c05013d7564120c16f, SrcConnectionID: dda66dd1, PacketNumber: 1, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 09:21:38 server -> Sending packet 2 (750 bytes) for connection ef1be9349c65b9e1, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: fc7177cc44ca71c05013d7564120c16f, SrcConnectionID: dda66dd1, PacketNumber: 2, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:38 server <- Reading packet 1 (66 bytes) for connection 5f8405ed, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: 5f8405ed, SrcConnectionID: f09cd925de5ab7a9c6f9554f7e6b9383, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.384ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 35.686526ms (σ: 17.843263ms) 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:38 server <- Reading packet 0 (1134 bytes) for connection 5f8405ed, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 5f8405ed, SrcConnectionID: f09cd925de5ab7a9c6f9554f7e6b9383, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.384ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 35.686ms (σ: 13.382ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID 4d60efc2d057faea in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection 4d60efc2d057faea, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: f09cd925de5ab7a9c6f9554f7e6b9383, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xedc9c645153c60ca99798dde98308f30d74618fc28c4990940fa326d88c954870ebf930f764e9544572a7335635a4151fd67b9de113fd4d180207bf7b131d196cbc029e1d4fcddf2f7a8dc2e2db8574d74f5161624df} 2025/04/30 09:21:38 server <- Reading packet 1 (45 bytes) for connection 5f8405ed, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 5f8405ed, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server -> Sending packet 2 (43 bytes) for connection 4d60efc2d057faea, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: f09cd925de5ab7a9c6f9554f7e6b9383, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 511.509µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 Received request: GET /karumdjgnj 2025/04/30 09:21:38 server -> Sending packet 3 (1061 bytes) for connection 4d60efc2d057faea, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: f09cd925de5ab7a9c6f9554f7e6b9383, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server <- Reading packet 9 (43 bytes) for connection 0eec5a76, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 0eec5a76, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 1 (202 bytes) for connection 09aff03dcb509c02, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, SrcConnectionID: 36684893, PacketNumber: 1, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:38 server -> Sending packet 2 (202 bytes) for connection 09aff03dcb509c02, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, SrcConnectionID: 36684893, PacketNumber: 2, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 26.6ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [6] 2025/04/30 09:21:38 server updated RTT: 53.028ms (σ: 30.061ms) 2025/04/30 09:21:38 server <- Reading packet 10 (43 bytes) for connection f8e78c7a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: f8e78c7a, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 26.024ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [9] 2025/04/30 09:21:38 server updated RTT: 34.579ms (σ: 5.66ms) 2025/04/30 09:21:38 server <- Reading packet 0 (91 bytes) for connection dda66dd1, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: dda66dd1, SrcConnectionID: fc7177cc44ca71c05013d7564120c16f, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 10.584ms} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID ef1be9349c65b9e1 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 2 (312 bytes) for connection ef1be9349c65b9e1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: fc7177cc44ca71c05013d7564120c16f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x3a5469ed20a6a4703f14d3443d71352de6ff5c4058e8fa8c70ba115a7c0330d4a8cfb0961a8b8ae821a1c784abb0d33e4cee2ec107262f55dae48337ef1b4d596cac11b362e15d3e53dda631ef3952c6e993b7ba47f1} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e13811a6, StatelessResetToken: 0x705e51071b24c000d7cab0151f249a21} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 284e3e59, StatelessResetToken: 0xa4009fcea353ae0e37ee506d8f6e62e0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:21:38 server -> Sending packet 3 (312 bytes) for connection ef1be9349c65b9e1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: fc7177cc44ca71c05013d7564120c16f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e13811a6, StatelessResetToken: 0x705e51071b24c000d7cab0151f249a21} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x3a5469ed20a6a4703f14d3443d71352de6ff5c4058e8fa8c70ba115a7c0330d4a8cfb0961a8b8ae821a1c784abb0d33e4cee2ec107262f55dae48337ef1b4d596cac11b362e15d3e53dda631ef3952c6e993b7ba47f1} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 284e3e59, StatelessResetToken: 0xa4009fcea353ae0e37ee506d8f6e62e0} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:21:38 server -> Sending packet 4 (1366 bytes) for connection ef1be9349c65b9e1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: fc7177cc44ca71c05013d7564120c16f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.PingFrame{} 2025/04/30 09:21:38 server Parsed a coalesced packet. Part 1: 65 bytes. Remaining: 43 bytes. 2025/04/30 09:21:38 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:21:38 server <- Reading packet 2 (43 bytes) for connection 5f8405ed, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 5f8405ed, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:38 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:38 Replacing connection for connection IDs [3d9d2cc2 5f8405ed 377ff026] with a closed connection. 2025/04/30 09:21:38 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:38 server Connection 4d60efc2d057faea closed. 2025/04/30 09:21:38 server <- Received Initial packet. 2025/04/30 09:21:38 Created qlog file: /logs/qlog/ddbd08e3093b2af4.sqlog 2025/04/30 09:21:38 server Changing connection ID to c7ecd684. 2025/04/30 09:21:38 Adding connection IDs ddbd08e3093b2af4 and c7ecd684 for a new connection. 2025/04/30 09:21:38 server <- Reading packet 0 (1200 bytes) for connection ddbd08e3093b2af4, Initial 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: ddbd08e3093b2af4, SrcConnectionID: e753e2894b90cb45fb9d85347a4cbf9e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:38 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e753e2894b90cb45fb9d85347a4cbf9e, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:38 Adding connection ID c8628b71. 2025/04/30 09:21:38 Adding connection ID 476520ee. 2025/04/30 09:21:38 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ddbd08e3093b2af4 2025/04/30 09:21:38 server Long Header{Type: Initial, DestConnectionID: e753e2894b90cb45fb9d85347a4cbf9e, SrcConnectionID: c7ecd684, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 968, Version: v1} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: e753e2894b90cb45fb9d85347a4cbf9e, SrcConnectionID: c7ecd684, PacketNumber: 0, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:21:38 server Short Header{DestConnectionID: e753e2894b90cb45fb9d85347a4cbf9e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 476520ee, StatelessResetToken: 0xf682ad8ac6da17f38110bd46dec8df5b} 2025/04/30 09:21:38 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c8628b71, StatelessResetToken: 0x4a453def253be3d51bfb5c5eba8e380f} 2025/04/30 09:21:38 server <- Reading packet 12 (43 bytes) for connection f8e78c7a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: f8e78c7a, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 47.728ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server -> Sending packet 11 (47 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7e0cf1041fabdbf364aa0bec2d90a97c, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 3, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 76.533µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- Reading packet 14 (43 bytes) for connection f8e78c7a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: f8e78c7a, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 5}}, DelayTime: 47.728ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server -> Sending packet 12 (49 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7e0cf1041fabdbf364aa0bec2d90a97c, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 3, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 7}, {Largest: 3, Smallest: 3}}, DelayTime: 119.04µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 14 (37 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7e0cf1041fabdbf364aa0bec2d90a97c, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server -> Sending packet 15 (37 bytes) for connection a3fe4aa400102af5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7e0cf1041fabdbf364aa0bec2d90a97c, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server <- Reading packet 2 (93 bytes) for connection acbe6295, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: acbe6295, SrcConnectionID: 7683540266912a242b78461f9d199114, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 836.472ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 137.33325ms (σ: 68.666625ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID 40bbfb046db4d45c in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7683540266912a242b78461f9d199114, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xdc542beb7593356dee0e1d55b713ebd29157d023dcfb9680df1efe04a482225833ba8a57393ac7249a12b7a09350c58badcb222ea0a935dad13820a0e06aa4c335da15ce3a1760ff9bfa1b8e276e5899078ee464016a} 2025/04/30 09:21:38 server <- Reading packet 0 (43 bytes) for connection acbe6295, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: acbe6295, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.608ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 124.575ms (σ: 77.015ms) 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID 51a20b6e in 5s. 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:38 server -> Sending packet 2 (44 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 7683540266912a242b78461f9d199114, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 102.58316ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 9 (38 bytes) for connection 0673282f3216e3fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:38 server Skipping packet number 8 2025/04/30 09:21:38 server -> Sending packet 10 (267 bytes) for connection 0673282f3216e3fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0xf26669a29e687979544f37ce5674bb3b0bfffcb125fb8425deebf60e526d88e2b576a294962e1952a461eae39347def49822150057eec4bef07c70f7c5023de3736401908af135bdea3bcab56db6ebc101e6603df1cb} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> Sending packet 11 (1366 bytes) for connection 0673282f3216e3fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.PingFrame{} 2025/04/30 09:21:38 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:38 server <- Reading packet 15 (43 bytes) for connection f8e78c7a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: f8e78c7a, PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:38 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:38 Replacing connection for connection IDs [f8e78c7a f1aa8357] with a closed connection. 2025/04/30 09:21:38 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:38 server Connection a3fe4aa400102af5 closed. 2025/04/30 09:21:38 server <- Reading packet 6 (43 bytes) for connection 090090e0, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 090090e0, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 210.032ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (2): [0 1] 2025/04/30 09:21:38 server updated RTT: 235.642ms (σ: 90.622ms) 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server -> Sending packet 2 (43 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: ef7f52ebce9225999becb3008c5eafef, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 171µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- Reading packet 2 (43 bytes) for connection e13811a6, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: e13811a6, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 26.048ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (2): [3 4] 2025/04/30 09:21:38 server updated RTT: 59.654789ms (σ: 29.827394ms) 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- Reading packet 2 (139 bytes) for connection acbe6295, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: acbe6295, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.176ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [1] 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, StatelessResetToken: 0x8839acb06e47996400dd98e66ebb9177} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: f1e861639af42056096e87ac568a47aa, StatelessResetToken: 0x388257c6c35f968efb40fb642371add0} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 9ad573cc67bd9525d683d6a6c71e1951, StatelessResetToken: 0x667998c25af465bbfc87f46a675e4651} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server -> Sending packet 3 (47 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 258.744µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server <- Reading packet 4 (43 bytes) for connection 9c4a3632, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 9c4a3632, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 496µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (2): [9 10] 2025/04/30 09:21:38 server updated RTT: 56.163ms (σ: 22.75ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- Reading packet 5 (43 bytes) for connection 9c4a3632, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 9c4a3632, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 25.84ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [11] 2025/04/30 09:21:38 server updated RTT: 53.355ms (σ: 22.676ms) 2025/04/30 09:21:38 server <- Reading packet 9 (43 bytes) for connection 9c4a3632, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 9c4a3632, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 40.744ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server -> Sending packet 12 (47 bytes) for connection 0673282f3216e3fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 650c0bd2bf43b905760e1cb3be33bc89, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 149.769µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- Reading packet 12 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 3, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 317.776ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server -> Sending packet 8 (1366 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.PingFrame{} 2025/04/30 09:21:38 server -> Sending packet 9 (51 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 234.358µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- Reading packet 10 (43 bytes) for connection 9c4a3632, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 9c4a3632, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:38 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:38 Replacing connection for connection IDs [e36ec78f 9c4a3632] with a closed connection. 2025/04/30 09:21:38 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:38 server Connection 0673282f3216e3fd closed. 2025/04/30 09:21:38 server <- Reading packet 2 (93 bytes) for connection 476520ee, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 476520ee, SrcConnectionID: e753e2894b90cb45fb9d85347a4cbf9e, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 847.784ms} 2025/04/30 09:21:38 server newly acked packets (1): [0] 2025/04/30 09:21:38 server updated RTT: 138.885316ms (σ: 69.442658ms) 2025/04/30 09:21:38 server Canceling loss detection timer. 2025/04/30 09:21:38 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:38 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:38 Retiring connection ID ddbd08e3093b2af4 in 5s. 2025/04/30 09:21:38 server Dropping Handshake keys. 2025/04/30 09:21:38 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:38 server -> Sending packet 1 (267 bytes) for connection ddbd08e3093b2af4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: e753e2894b90cb45fb9d85347a4cbf9e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:38 server -> &wire.NewTokenFrame{Token: 0x379805c7265ed14e9976510498269cf478fc15260d9a1f62e255b90928f62412ea7a63cf4dfa38e3b0ac11c7e57c33671d2f28c29a67d02538ef754d768c5b9a842cf98fd225a97255c7e2851a9b1ddd842b74e5678c} 2025/04/30 09:21:38 server <- Reading packet 1 (45 bytes) for connection 476520ee, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 476520ee, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:38 server -> Sending packet 2 (44 bytes) for connection ddbd08e3093b2af4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: e753e2894b90cb45fb9d85347a4cbf9e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 Received request: GET /uzhpdovdvm 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 103.227852ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> Sending packet 3 (1061 bytes) for connection ddbd08e3093b2af4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: e753e2894b90cb45fb9d85347a4cbf9e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:38 server <- Reading packet 2 (139 bytes) for connection 476520ee, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 476520ee, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 840µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (2): [0 1] 2025/04/30 09:21:38 server updated RTT: 125.605ms (σ: 78.639ms) 2025/04/30 09:21:38 server ECN capability confirmed. 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: ff2ecb374ee44c2ffd9908b2c11698b4, StatelessResetToken: 0x0bc2a146decd76a7b967dc46af02f0ba} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 9e71ef8589bf7c87d5b7365be07b7746, StatelessResetToken: 0xe8fe0d8b694dc6dcb8ef4e1bfad214ac} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 09938d6ab794ed4f776e4b2985ed95cb, StatelessResetToken: 0x5b5a2be701c044a3c7b210477d948d93} 2025/04/30 09:21:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:38 server -> Sending packet 4 (45 bytes) for connection ddbd08e3093b2af4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: ff2ecb374ee44c2ffd9908b2c11698b4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 182.562µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server <- Reading packet 3 (43 bytes) for connection 476520ee, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 476520ee, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:38 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:38 Replacing connection for connection IDs [c7ecd684 c8628b71 476520ee] with a closed connection. 2025/04/30 09:21:38 server Connection ddbd08e3093b2af4 closed. 2025/04/30 09:21:38 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:38 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:38 server -> Sending packet 3 (202 bytes) for connection 09aff03dcb509c02, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, SrcConnectionID: 36684893, PacketNumber: 3, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:38 server -> Sending packet 4 (202 bytes) for connection 09aff03dcb509c02, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, SrcConnectionID: 36684893, PacketNumber: 4, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:38 server <- Reading packet 13 (43 bytes) for connection 0eec5a76, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 0eec5a76, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 264.096ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server -> Sending packet 8 (1409 bytes) for connection aa80af060c84d68f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 79432f90291ab05c37a2e3c5f61a8657, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.PingFrame{} 2025/04/30 09:21:38 server -> Sending packet 9 (47 bytes) for connection aa80af060c84d68f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 79432f90291ab05c37a2e3c5f61a8657, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 6, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 216.584µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- Reading packet 1 (65 bytes) for connection 36684893, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 36684893, SrcConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:38 server Dropping Initial keys. 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 2.56ms} 2025/04/30 09:21:38 server <- Reading packet 9 (43 bytes) for connection 090090e0, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 090090e0, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 206.688ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server -> Sending packet 3 (45 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: ef7f52ebce9225999becb3008c5eafef, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}}, DelayTime: 183.102µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- Reading packet 11 (43 bytes) for connection 090090e0, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 090090e0, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 206.688ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server -> Sending packet 4 (47 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: ef7f52ebce9225999becb3008c5eafef, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 6, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}}, DelayTime: 86.858µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:21:38 server -> Sending packet 5 (202 bytes) for connection 09aff03dcb509c02, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, SrcConnectionID: 36684893, PacketNumber: 5, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:38 server -> Sending packet 6 (202 bytes) for connection 09aff03dcb509c02, Handshake 2025/04/30 09:21:38 server Long Header{Type: Handshake, DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, SrcConnectionID: 36684893, PacketNumber: 6, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:38 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:38 server <- Reading packet 15 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 142.496ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:38 server <- Reading packet 17 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 142.496ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.PingFrame{} 2025/04/30 09:21:38 server -> Sending packet 10 (55 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 0, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 129.651µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- Reading packet 12 (164 bytes) for connection 090090e0, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 090090e0, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 704µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: f85aee58ec759369e23f45153431bb72, StatelessResetToken: 0x62068a62f7121eec3af666a089492cf4} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: fd7c210d937bc9ab600af87f3b250632, StatelessResetToken: 0x216f2cd7ad255a2504afde494c328148} 2025/04/30 09:21:38 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 575a6e1610af0e1f1699edca26bb7d5b, StatelessResetToken: 0x7edcfa0bdddb92cb6a902e9597b885fd} 2025/04/30 09:21:38 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 Retiring connection ID 9db3bee0 in 5s. 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:38 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:38 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:38 server -> Sending packet 5 (49 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: f85aee58ec759369e23f45153431bb72, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 Received request: GET /abdveagulv 2025/04/30 09:21:38 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 6, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 6, Smallest: 6}}, DelayTime: 227.435µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:38 server -> Sending packet 6 (1061 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:38 server Short Header{DestConnectionID: f85aee58ec759369e23f45153431bb72, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:38 server <- Reading packet 13 (43 bytes) for connection 090090e0, 1-RTT 2025/04/30 09:21:38 server Short Header{DestConnectionID: 090090e0, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:38 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 26.456ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:38 server newly acked packets (1): [5] 2025/04/30 09:21:38 server updated RTT: 213.451ms (σ: 112.347ms) 2025/04/30 09:21:38 server Ignoring all packets below 13. 2025/04/30 09:21:39 Tracking 76 connection IDs and 5 reset tokens. 2025/04/30 09:21:39 server <- Reading packet 20 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 20, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 136.768ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server <- Reading packet 22 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 22, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 136.768ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server -> Sending packet 11 (59 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 22, LowestAcked: 0, AckRanges: {{Largest: 22, Smallest: 22}, {Largest: 20, Smallest: 20}, {Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 356.968µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server -> Sending packet 7 (202 bytes) for connection 09aff03dcb509c02, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, SrcConnectionID: 36684893, PacketNumber: 7, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:39 server -> Sending packet 8 (202 bytes) for connection 09aff03dcb509c02, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, SrcConnectionID: 36684893, PacketNumber: 8, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:39 server <- Reading packet 23 (54 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 23, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 792µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 Received request: GET /jdopgbafmk 2025/04/30 09:21:39 server -> Sending packet 12 (1085 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 23, LowestAcked: 0, AckRanges: {{Largest: 23, Smallest: 22}, {Largest: 20, Smallest: 20}, {Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 275.322µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 5 (37 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 server -> Sending packet 6 (37 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 server <- Reading packet 3 (65 bytes) for connection 36684893, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 36684893, SrcConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, PacketNumber: 3, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 1}}, DelayTime: 4.76ms} 2025/04/30 09:21:39 server newly acked packets (1): [8] 2025/04/30 09:21:39 server updated RTT: 34.693ms (σ: 13.8ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 5 (83 bytes) for connection e21969b048f05653, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d5c02efe4754c7b187285bbf3c069e1c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6edb26e9, StatelessResetToken: 0x5e39b3ec46aed93c9d087417a46985d9} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d5993c7e, StatelessResetToken: 0xb6e7e139706f80ef5343d0cb3dfc201c} 2025/04/30 09:21:39 server Skipping packet number 4 2025/04/30 09:21:39 server -> Sending packet 6 (267 bytes) for connection e21969b048f05653, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d5c02efe4754c7b187285bbf3c069e1c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xe43fb8a02f1ba8f96179768dd5dd97ea4937c57d8ccbfcdce5cf97fdabd303166b9f0b5247bd891113b1903dbde82bf6465e1e1068832adf6e0a1a957ecbfe1ac5dc5063973091e99d5b402dae82b62ff33be559b02c} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/fef22c25d7e0ddf4.sqlog 2025/04/30 09:21:39 server Changing connection ID to b40871fe. 2025/04/30 09:21:39 Adding connection IDs fef22c25d7e0ddf4 and b40871fe for a new connection. 2025/04/30 09:21:39 server <- Reading packet 4 (1200 bytes) for connection fef22c25d7e0ddf4, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: fef22c25d7e0ddf4, SrcConnectionID: c0acb24e8513f8c2b66b4da959b09503, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c0acb24e8513f8c2b66b4da959b09503, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID ebdbdb24. 2025/04/30 09:21:39 Adding connection ID 97a4264a. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection fef22c25d7e0ddf4 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, SrcConnectionID: b40871fe, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 408, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, SrcConnectionID: b40871fe, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 09:21:39 server Short Header{DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ebdbdb24, StatelessResetToken: 0x0b61184e34973a77d34e6c14fc66ce91} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 97a4264a, StatelessResetToken: 0xdbea90cfb4aeabdc487c9102bfe56831} 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/a18a0d5bd0205eaf.sqlog 2025/04/30 09:21:39 server Changing connection ID to 9618efb4. 2025/04/30 09:21:39 Adding connection IDs a18a0d5bd0205eaf and 9618efb4 for a new connection. 2025/04/30 09:21:39 server <- Reading packet 2 (1200 bytes) for connection a18a0d5bd0205eaf, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: a18a0d5bd0205eaf, SrcConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 13b62f09. 2025/04/30 09:21:39 Adding connection ID 34798cec. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a18a0d5bd0205eaf 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, SrcConnectionID: 9618efb4, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 409, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, SrcConnectionID: 9618efb4, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 13b62f09, StatelessResetToken: 0x42469c6a17707ed90da832a803c9b277} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 34798cec, StatelessResetToken: 0x5f6a5b031ecd4e0ca5b7739676797909} 2025/04/30 09:21:39 server <- Reading packet 4 (1200 bytes) for connection a18a0d5bd0205eaf, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: a18a0d5bd0205eaf, SrcConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:39 server -> Sending packet 1 (58 bytes) for connection a18a0d5bd0205eaf, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, SrcConnectionID: 9618efb4, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/effb1374b15b553b.sqlog 2025/04/30 09:21:39 server Changing connection ID to f58609aa. 2025/04/30 09:21:39 Adding connection IDs effb1374b15b553b and f58609aa for a new connection. 2025/04/30 09:21:39 server <- Reading packet 2 (1200 bytes) for connection effb1374b15b553b, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: effb1374b15b553b, SrcConnectionID: 9a8f648d5a52422bd76e1b978f9ca3c1, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 9a8f648d5a52422bd76e1b978f9ca3c1, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID efb27675. 2025/04/30 09:21:39 Adding connection ID 7a128ad4. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection effb1374b15b553b 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 9a8f648d5a52422bd76e1b978f9ca3c1, SrcConnectionID: f58609aa, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 409, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 9a8f648d5a52422bd76e1b978f9ca3c1, SrcConnectionID: f58609aa, PacketNumber: 0, PacketNumberLen: 2, Length: 729, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 707, Offset + Data length: 707} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 9a8f648d5a52422bd76e1b978f9ca3c1, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7a128ad4, StatelessResetToken: 0xfbe723ffebce02b118c4e6a9cc29d7dd} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: efb27675, StatelessResetToken: 0x6ad8aad78c7fccf1cf8041fb603cece9} 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/6d87784948e64867.sqlog 2025/04/30 09:21:39 server Changing connection ID to a803e185. 2025/04/30 09:21:39 Adding connection IDs 6d87784948e64867 and a803e185 for a new connection. 2025/04/30 09:21:39 server <- Reading packet 2 (1200 bytes) for connection 6d87784948e64867, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 6d87784948e64867, SrcConnectionID: a43a275b00f6cec8c64fd0942a4bd5f4, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a43a275b00f6cec8c64fd0942a4bd5f4, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 2d9a6e11. 2025/04/30 09:21:39 Adding connection ID 0fa42d47. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 6d87784948e64867 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: a43a275b00f6cec8c64fd0942a4bd5f4, SrcConnectionID: a803e185, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 417, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: a43a275b00f6cec8c64fd0942a4bd5f4, SrcConnectionID: a803e185, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 09:21:39 server Short Header{DestConnectionID: a43a275b00f6cec8c64fd0942a4bd5f4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0fa42d47, StatelessResetToken: 0x873133ddbc9e6985ed4f2653a6d97fe5} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2d9a6e11, StatelessResetToken: 0x0b363f2ed372b15c68b9e314a6ff0017} 2025/04/30 09:21:39 server <- Reading packet 4 (1200 bytes) for connection 6d87784948e64867, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 6d87784948e64867, SrcConnectionID: a43a275b00f6cec8c64fd0942a4bd5f4, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:39 server -> Sending packet 1 (58 bytes) for connection 6d87784948e64867, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: a43a275b00f6cec8c64fd0942a4bd5f4, SrcConnectionID: a803e185, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/f25083d98837c071.sqlog 2025/04/30 09:21:39 server Changing connection ID to 8e45749f. 2025/04/30 09:21:39 Adding connection IDs f25083d98837c071 and 8e45749f for a new connection. 2025/04/30 09:21:39 server <- Reading packet 4 (1200 bytes) for connection f25083d98837c071, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: f25083d98837c071, SrcConnectionID: 9d48b4c2b1e25a1c0b04cf39b4335b3c, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 9d48b4c2b1e25a1c0b04cf39b4335b3c, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID d30ff9c1. 2025/04/30 09:21:39 Adding connection ID ec1983d5. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f25083d98837c071 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 9d48b4c2b1e25a1c0b04cf39b4335b3c, SrcConnectionID: 8e45749f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 407, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 9d48b4c2b1e25a1c0b04cf39b4335b3c, SrcConnectionID: 8e45749f, PacketNumber: 0, PacketNumberLen: 2, Length: 731, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 709, Offset + Data length: 709} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 9d48b4c2b1e25a1c0b04cf39b4335b3c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d30ff9c1, StatelessResetToken: 0x856dc52756960e93aeb13c1b8f2e6c5a} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec1983d5, StatelessResetToken: 0xe859051f6c8a2242e251c25c6ccd0801} 2025/04/30 09:21:39 server <- Reading packet 7 (43 bytes) for connection acbe6295, 1-RTT 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 server Short Header{DestConnectionID: acbe6295, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 488µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [6] 2025/04/30 09:21:39 server updated RTT: 114.886ms (σ: 77.137ms) 2025/04/30 09:21:39 Created qlog file: /logs/qlog/a9ccd6fc9b88f19b.sqlog 2025/04/30 09:21:39 server Changing connection ID to 4de520d7. 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 Adding connection IDs a9ccd6fc9b88f19b and 4de520d7 for a new connection. 2025/04/30 09:21:39 server <- Reading packet 4 (1200 bytes) for connection a9ccd6fc9b88f19b, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: a9ccd6fc9b88f19b, SrcConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID b620f76b. 2025/04/30 09:21:39 Adding connection ID 2924d457. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a9ccd6fc9b88f19b 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, SrcConnectionID: 4de520d7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 405, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, SrcConnectionID: 4de520d7, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b620f76b, StatelessResetToken: 0xdea0f179ef0867086153b1fe81a186c2} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2924d457, StatelessResetToken: 0x5a554d181c089b640953cb55e81b794a} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 4 (267 bytes) for connection 072d88b9a208c550, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: eaf063d22e5352920ab51eb377b93b8d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xfb47dbaccf63fda21031bf3a70d4c116467c857806fc496bb6389864aba593264307792502f882f5bc564b81f54cd49ad18b7072b34616ff4a34a8cbc5e4e83a7d578c2855bb45e5cb7fae48b9e938937dd18b5f9cf5} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> Sending packet 5 (267 bytes) for connection 072d88b9a208c550, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: eaf063d22e5352920ab51eb377b93b8d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xfb47dbaccf63fda21031bf3a70d4c116467c857806fc496bb6389864aba593264307792502f882f5bc564b81f54cd49ad18b7072b34616ff4a34a8cbc5e4e83a7d578c2855bb45e5cb7fae48b9e938937dd18b5f9cf5} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server <- Reading packet 4 (143 bytes) for connection 6edb26e9, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6edb26e9, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 856µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [6] 2025/04/30 09:21:39 server updated RTT: 212.886ms (σ: 140.722ms) 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server lost packet 3 (time threshold) 2025/04/30 09:21:39 server setting loss timer for packet 5 (1-RTT) to 239.49675ms (in 2025-04-30 09:21:39.32933843 +0000 UTC m=+2.326970806) 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 3123b5948e1849eb31b5df3ae430d620, StatelessResetToken: 0x975856fe8562c90d80813f6df5ef5ffc} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: a180848129a59d397de936557e5dbb67, StatelessResetToken: 0xea56b4cf98a4512aee715eff35d10612} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 4e0371df9382e25eccf60f055edf1e41, StatelessResetToken: 0x4a261367e035e9d89f052ee052e11f18} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 7 (1073 bytes) for connection e21969b048f05653, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 3123b5948e1849eb31b5df3ae430d620, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 182.501µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 6 (43 bytes) for connection 6edb26e9, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6edb26e9, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 856µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 8 (47 bytes) for connection e21969b048f05653, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 3123b5948e1849eb31b5df3ae430d620, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 147.649µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:39 server <- Reading packet 5 (66 bytes) for connection 13b62f09, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 13b62f09, SrcConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19.968ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 36.625498ms (σ: 18.312749ms) 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:39 server <- Reading packet 0 (1134 bytes) for connection 13b62f09, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 13b62f09, SrcConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19.968ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 36.625ms (σ: 13.734ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID a18a0d5bd0205eaf in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server <- Reading packet 0 (43 bytes) for connection 13b62f09, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 13b62f09, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.496ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 36.628ms (σ: 10.306ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID 9618efb4 in 5s. 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server -> Sending packet 1 (275 bytes) for connection a18a0d5bd0205eaf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 457.876µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xf4845812b507042162172b5bc115575b42fff7464629a4acbfb36dac1de0152cafc1233bf9695db9c0f27aec64d74a4a2d99c436527b79f4e1fd3176577e93245404093132f5824cf54f56a8194ace22c93ed504ccfd} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:39 server <- Reading packet 5 (66 bytes) for connection 7a128ad4, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 7a128ad4, SrcConnectionID: 9a8f648d5a52422bd76e1b978f9ca3c1, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 31.04ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 41.363766ms (σ: 20.681883ms) 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:39 server <- Reading packet 0 (1134 bytes) for connection 7a128ad4, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 7a128ad4, SrcConnectionID: 9a8f648d5a52422bd76e1b978f9ca3c1, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 31.04ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 41.363ms (σ: 15.51ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID effb1374b15b553b in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server <- Reading packet 0 (43 bytes) for connection 7a128ad4, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7a128ad4, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3.88ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 41.367ms (σ: 11.642ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID f58609aa in 5s. 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server -> Sending packet 1 (275 bytes) for connection effb1374b15b553b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 9a8f648d5a52422bd76e1b978f9ca3c1, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 468.095µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x5af6c9164bb871c83ff92f895bdb436672ab2e431d4485120004dc6d4c8655b4911690b252ade9379c6c274efb1a8a0defc3beac1ad0f0cdeb8cc663d08c2fccbb769f41ef9d9f559cbc70549bb8206c10282989d14b} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:39 server <- Reading packet 1 (45 bytes) for connection 7a128ad4, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7a128ad4, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 Received request: GET /fsrhklyfxo 2025/04/30 09:21:39 server -> Sending packet 2 (1069 bytes) for connection effb1374b15b553b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 9a8f648d5a52422bd76e1b978f9ca3c1, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 357.277µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Queueing packet (43 bytes) for later decryption 2025/04/30 09:21:39 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 14 (1061 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server -> Sending packet 15 (1061 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 2 (139 bytes) for connection 7a128ad4, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7a128ad4, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- Reading packet 27 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 920µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [1] 2025/04/30 09:21:39 server updated RTT: 40.325ms (σ: 10.815ms) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 27, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 11, DelayTime: 128.936ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 16 (61 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 27, LowestAcked: 0, AckRanges: {{Largest: 27, Smallest: 27}, {Largest: 23, Smallest: 22}, {Largest: 20, Smallest: 20}, {Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 164.515µs, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 0e960850caa2ffe24b62cac887738ea4, StatelessResetToken: 0xfd11ad319767c18db2a657f97e679563} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 2ff61b6f4e7fcd7255b4f738e6c13602, StatelessResetToken: 0x1c52792febac6ded07b6fb9b990b381d} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: d3d8b3f8e5d94a0e9312d9bb569269d8, StatelessResetToken: 0xdf555923735b0e5ac62c91c778b1873a} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 server Ignoring all packets below 1. 2025/04/30 09:21:39 server -> Sending packet 3 (45 bytes) for connection effb1374b15b553b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0e960850caa2ffe24b62cac887738ea4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 293.146µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 server <- Reading packet 3 (43 bytes) for connection 7a128ad4, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7a128ad4, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [efb27675 7a128ad4] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection effb1374b15b553b closed. 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/34aaed880e0104b3.sqlog 2025/04/30 09:21:39 server Changing connection ID to adc93156. 2025/04/30 09:21:39 Adding connection IDs 34aaed880e0104b3 and adc93156 for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection 34aaed880e0104b3, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 34aaed880e0104b3, SrcConnectionID: 977cabc868fc443aab6d3f6cec42c64e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 977cabc868fc443aab6d3f6cec42c64e, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 6a32fe24. 2025/04/30 09:21:39 Adding connection ID edd77dca. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 34aaed880e0104b3 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 977cabc868fc443aab6d3f6cec42c64e, SrcConnectionID: adc93156, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 961, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 977cabc868fc443aab6d3f6cec42c64e, SrcConnectionID: adc93156, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 977cabc868fc443aab6d3f6cec42c64e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6a32fe24, StatelessResetToken: 0x186a2c05d44bbe55d3fb5731c0f4f971} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: edd77dca, StatelessResetToken: 0xc880e5d025f35dc8e08312541594b65f} 2025/04/30 09:21:39 server <- Reading packet 12 (43 bytes) for connection 0c195b79, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0c195b79, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 26.232ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [5] 2025/04/30 09:21:39 server updated RTT: 195.952ms (σ: 139.145ms) 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 7 (1061 bytes) for connection bf46aa81dbcd04f0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: ee94def7241e1e780468d300c3a387f9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Skipping packet number 6 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 server -> Sending packet 8 (37 bytes) for connection bf46aa81dbcd04f0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: ee94def7241e1e780468d300c3a387f9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Created qlog file: /logs/qlog/e7bb776f21e0d390.sqlog 2025/04/30 09:21:39 server Changing connection ID to 0bff59d0. 2025/04/30 09:21:39 Adding connection IDs e7bb776f21e0d390 and 0bff59d0 for a new connection. 2025/04/30 09:21:39 server <- Reading packet 2 (1200 bytes) for connection e7bb776f21e0d390, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: e7bb776f21e0d390, SrcConnectionID: 7368339336cfdf19c210c7316d477c22, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7368339336cfdf19c210c7316d477c22, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 37a9cec4. 2025/04/30 09:21:39 Adding connection ID bcc956ff. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e7bb776f21e0d390 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 7368339336cfdf19c210c7316d477c22, SrcConnectionID: 0bff59d0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 959, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 7368339336cfdf19c210c7316d477c22, SrcConnectionID: 0bff59d0, PacketNumber: 0, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 37a9cec4, StatelessResetToken: 0x4759eaf6ff29ed8f0673431a880fdbe9} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bcc956ff, StatelessResetToken: 0xffb8052b6b348d61defd496d8faf06f0} 2025/04/30 09:21:39 server <- Reading packet 28 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 28, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 11, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 11, Smallest: 11}}, DelayTime: 392µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/4fe27f3c015e81f2.sqlog 2025/04/30 09:21:39 server Changing connection ID to 36f45aa2. 2025/04/30 09:21:39 Adding connection IDs 4fe27f3c015e81f2 and 36f45aa2 for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection 4fe27f3c015e81f2, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 4fe27f3c015e81f2, SrcConnectionID: 2fbc3372173805ae3459df16d6fc195c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 2fbc3372173805ae3459df16d6fc195c, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID d2bf1dd5. 2025/04/30 09:21:39 Adding connection ID 0ac1e30e. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4fe27f3c015e81f2 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, SrcConnectionID: 36f45aa2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 967, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, SrcConnectionID: 36f45aa2, PacketNumber: 0, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d2bf1dd5, StatelessResetToken: 0x547a26b069dc228f7acc60d5d27b4ddc} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0ac1e30e, StatelessResetToken: 0xcc206a4b07c2c6043ab1c90f0ed13502} 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:39 server <- Reading packet 1 (66 bytes) for connection 6a32fe24, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 6a32fe24, SrcConnectionID: 977cabc868fc443aab6d3f6cec42c64e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 13.88ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 35.832168ms (σ: 17.916084ms) 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:39 server <- Reading packet 0 (1134 bytes) for connection 6a32fe24, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 6a32fe24, SrcConnectionID: 977cabc868fc443aab6d3f6cec42c64e, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 13.88ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 35.832ms (σ: 13.437ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID 34aaed880e0104b3 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server -> Sending packet 1 (267 bytes) for connection 34aaed880e0104b3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 977cabc868fc443aab6d3f6cec42c64e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x1f8b9590499e96a50d310c3db27301b82af079cf97a96aaa028abfcbf5eb4873a30ea6984ac951c258deeeeff985996abe4f2212eea5aa6a6fd079359a876b7bd8f75be33b32c22d4f6cb60d8feaf3cc84326a92160b} 2025/04/30 09:21:39 server <- Reading packet 4 (43 bytes) for connection 292fa9fd, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 292fa9fd, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 5, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}}, DelayTime: 336µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [7] 2025/04/30 09:21:39 server updated RTT: 192.313ms (σ: 152.296ms) 2025/04/30 09:21:39 server -> Sending packet 9 (38 bytes) for connection bf46aa81dbcd04f0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: ee94def7241e1e780468d300c3a387f9, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:39 server <- Reading packet 29 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 29, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 15, LowestAcked: 11, AckRanges: {{Largest: 15, Smallest: 14}, {Largest: 11, Smallest: 11}}, DelayTime: 25.384ms, ECT0: 10, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [15] 2025/04/30 09:21:39 server updated RTT: 50.986ms (σ: 11.418ms) 2025/04/30 09:21:39 server lost packet 8 (time threshold) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server -> Sending packet 17 (1323 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:39 server <- Reading packet 5 (66 bytes) for connection 37a9cec4, Initial 2025/04/30 09:21:39 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 37a9cec4, SrcConnectionID: 7368339336cfdf19c210c7316d477c22, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 13.528ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 35.905387ms (σ: 17.952693ms) 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:39 server <- Reading packet 0 (1134 bytes) for connection 37a9cec4, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 37a9cec4, SrcConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 13.528ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 35.905ms (σ: 13.464ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID e7bb776f21e0d390 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server <- Reading packet 5 (43 bytes) for connection 292fa9fd, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 292fa9fd, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 server -> Sending packet 18 (38 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server <- Reading packet 0 (43 bytes) for connection 37a9cec4, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 37a9cec4, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.688ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 35.906ms (σ: 10.101ms) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID 0bff59d0 in 5s. 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 Replacing connection for connection IDs [292fa9fd 4160bbcc] with a closed connection. 2025/04/30 09:21:39 server -> Sending packet 1 (276 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.009067ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x2178a8c909e83354baa38027ac62b6d5bae81853dca5da8e2f508aeb2f0778081cef9e96154174acbccac610a76050ae2eb0312c7e76030137ec7e85aad2c87c7c8cac5d3aa63831bef096c68fb8e25db6bb974f1e82} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server Connection bf46aa81dbcd04f0 closed. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server <- Reading packet 9 (43 bytes) for connection acbe6295, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: acbe6295, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 140.272ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server <- Reading packet 11 (43 bytes) for connection acbe6295, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: acbe6295, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 140.272ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server -> Sending packet 7 (1366 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server -> Sending packet 8 (51 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 200.415µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 3 (267 bytes) for connection a18a0d5bd0205eaf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xf4845812b507042162172b5bc115575b42fff7464629a4acbfb36dac1de0152cafc1233bf9695db9c0f27aec64d74a4a2d99c436527b79f4e1fd3176577e93245404093132f5824cf54f56a8194ace22c93ed504ccfd} 2025/04/30 09:21:39 server -> Sending packet 4 (267 bytes) for connection a18a0d5bd0205eaf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xf4845812b507042162172b5bc115575b42fff7464629a4acbfb36dac1de0152cafc1233bf9695db9c0f27aec64d74a4a2d99c436527b79f4e1fd3176577e93245404093132f5824cf54f56a8194ace22c93ed504ccfd} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/a15049ea6c4a1b38.sqlog 2025/04/30 09:21:39 server Changing connection ID to 124fba0d. 2025/04/30 09:21:39 Adding connection IDs a15049ea6c4a1b38 and 124fba0d for a new connection. 2025/04/30 09:21:39 server <- Reading packet 2 (1200 bytes) for connection a15049ea6c4a1b38, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: a15049ea6c4a1b38, SrcConnectionID: bfeefe9c91cfef597837cb0410be66b6, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: bfeefe9c91cfef597837cb0410be66b6, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 9d4c868a. 2025/04/30 09:21:39 Adding connection ID 6644e98c. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a15049ea6c4a1b38 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, SrcConnectionID: 124fba0d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 965, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, SrcConnectionID: 124fba0d, PacketNumber: 0, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:39 server Short Header{DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9d4c868a, StatelessResetToken: 0xa0926cdb031f7107e1aaac8dc8cc9776} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6644e98c, StatelessResetToken: 0xbcb7698113ccfbb6afe9b97e9f029254} 2025/04/30 09:21:39 server <- Reading packet 4 (1200 bytes) for connection a15049ea6c4a1b38, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: a15049ea6c4a1b38, SrcConnectionID: bfeefe9c91cfef597837cb0410be66b6, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server -> Sending packet 1 (58 bytes) for connection a15049ea6c4a1b38, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, SrcConnectionID: 124fba0d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Reading packet 30 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 30, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 17, LowestAcked: 11, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 14}, {Largest: 11, Smallest: 11}}, DelayTime: 432µs, ECT0: 11, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [17] 2025/04/30 09:21:39 server updated RTT: 48.763ms (σ: 13.007ms) 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 1 (1280 bytes) for connection 4fe27f3c015e81f2, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, SrcConnectionID: 36f45aa2, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server -> Sending packet 2 (1280 bytes) for connection 4fe27f3c015e81f2, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, SrcConnectionID: 36f45aa2, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:39 server <- Reading packet 3 (43 bytes) for connection 13b62f09, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 13b62f09, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 400µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [4] 2025/04/30 09:21:39 server updated RTT: 36.126ms (σ: 8.732ms) 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- Reading packet 2 (93 bytes) for connection 0fa42d47, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 0fa42d47, SrcConnectionID: a43a275b00f6cec8c64fd0942a4bd5f4, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.131976s} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 175.198812ms (σ: 87.599406ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID 6d87784948e64867 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server -> Sending packet 1 (267 bytes) for connection 6d87784948e64867, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: a43a275b00f6cec8c64fd0942a4bd5f4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x1c161acce9647a190b5551bd9c2a6cd0486a77ef604eba92ac5026726d724a1071a8509bec3edd45564238ac81d346145147588c70e3c7cb3aef6be342538070ad17a31ab5ee60f8e59a1f6df45ddccdbf94444dfe68} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server <- Reading packet 1 (45 bytes) for connection 0fa42d47, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0fa42d47, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server -> Sending packet 2 (46 bytes) for connection 6d87784948e64867, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 Received request: GET /iyiomigsnu 2025/04/30 09:21:39 server Short Header{DestConnectionID: a43a275b00f6cec8c64fd0942a4bd5f4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 135.274899ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> Sending packet 3 (1061 bytes) for connection 6d87784948e64867, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: a43a275b00f6cec8c64fd0942a4bd5f4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:39 server <- Reading packet 31 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 31, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 18, LowestAcked: 11, AckRanges: {{Largest: 18, Smallest: 17}, {Largest: 15, Smallest: 14}, {Largest: 11, Smallest: 11}}, DelayTime: 25.416ms, ECT0: 12, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [18] 2025/04/30 09:21:39 server updated RTT: 46.969ms (σ: 13.341ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- Reading packet 12 (43 bytes) for connection acbe6295, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: acbe6295, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 26.632ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [7] 2025/04/30 09:21:39 server updated RTT: 107.965ms (σ: 71.693ms) 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 1 (1280 bytes) for connection fef22c25d7e0ddf4, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, SrcConnectionID: b40871fe, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:39 server -> Sending packet 2 (1280 bytes) for connection fef22c25d7e0ddf4, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, SrcConnectionID: b40871fe, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 2 (1280 bytes) for connection a15049ea6c4a1b38, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, SrcConnectionID: 124fba0d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server -> Sending packet 3 (1280 bytes) for connection a15049ea6c4a1b38, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, SrcConnectionID: 124fba0d, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server <- Reading packet 1 (1200 bytes) for connection 36f45aa2, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 36f45aa2, SrcConnectionID: 2fbc3372173805ae3459df16d6fc195c, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 8.872ms} 2025/04/30 09:21:39 server <- Reading packet 4 (93 bytes) for connection d30ff9c1, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: d30ff9c1, SrcConnectionID: 9d48b4c2b1e25a1c0b04cf39b4335b3c, PacketNumber: 4, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.26904s} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 197.304684ms (σ: 98.652342ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID f25083d98837c071 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server -> Sending packet 1 (267 bytes) for connection f25083d98837c071, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 9d48b4c2b1e25a1c0b04cf39b4335b3c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x135bee5babee8a5beac95e9c866ea6fd7e0858b005e38e1305c7c6e8d74ee302ad73b0235b5037053604741a5d1200eda7724488bac81fdd43b0635ae2f517a15a439a14a9491ca3929b8e0a1f46d87720055db1d166} 2025/04/30 09:21:39 server <- Reading packet 0 (43 bytes) for connection d30ff9c1, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: d30ff9c1, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.664ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 177.634ms (σ: 113.329ms) 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID 8e45749f in 5s. 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server <- Reading packet 1 (45 bytes) for connection d30ff9c1, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: d30ff9c1, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 Received request: GET /firjpfhnah 2025/04/30 09:21:39 server -> Sending packet 2 (46 bytes) for connection f25083d98837c071, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 9d48b4c2b1e25a1c0b04cf39b4335b3c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 157.88212ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> Sending packet 3 (1061 bytes) for connection f25083d98837c071, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 9d48b4c2b1e25a1c0b04cf39b4335b3c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server -> Sending packet 4 (39 bytes) for connection f25083d98837c071, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 9d48b4c2b1e25a1c0b04cf39b4335b3c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 1024, Data length: 0, Offset + Data length: 1024} 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 1 (1280 bytes) for connection a9ccd6fc9b88f19b, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, SrcConnectionID: 4de520d7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:39 server -> Sending packet 2 (1280 bytes) for connection a9ccd6fc9b88f19b, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, SrcConnectionID: 4de520d7, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:39 server <- Reading packet 2 (139 bytes) for connection 0fa42d47, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0fa42d47, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 1.376ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (2): [0 1] 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 9829f43ad4d9646b6f871deb2ed670c7, StatelessResetToken: 0x7bcc610631d4c2431c7facad8fbf3e62} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: c3cb694a56ba981e1ddf47a67cc9e1d6, StatelessResetToken: 0xa7e553886c699775ef259f525a449f31} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 2826e05d16deeae13c3b3176c73a5fa1, StatelessResetToken: 0xc2240920b104b2a7ef3c80c1fa481782} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 server -> Sending packet 4 (45 bytes) for connection 6d87784948e64867, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 9829f43ad4d9646b6f871deb2ed670c7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 187.093µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 server <- Reading packet 3 (43 bytes) for connection 0fa42d47, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0fa42d47, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [a803e185 2d9a6e11 0fa42d47] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection 6d87784948e64867 closed. 2025/04/30 09:21:39 server <- Reading packet 5 (43 bytes) for connection 13b62f09, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 13b62f09, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 48.336ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server <- Reading packet 7 (43 bytes) for connection 13b62f09, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 13b62f09, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 48.336ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server -> Sending packet 5 (1366 bytes) for connection a18a0d5bd0205eaf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server -> Sending packet 6 (49 bytes) for connection a18a0d5bd0205eaf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 78210b8a8eb3a19cf19f4484d4193b82, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 229.519µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:21:39.32933843 +0000 UTC m=+2.326970806 2025/04/30 09:21:39 server lost packet 5 (time threshold) 2025/04/30 09:21:39 server -> Sending packet 9 (83 bytes) for connection e21969b048f05653, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 3123b5948e1849eb31b5df3ae430d620, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6edb26e9, StatelessResetToken: 0x5e39b3ec46aed93c9d087417a46985d9} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d5993c7e, StatelessResetToken: 0xb6e7e139706f80ef5343d0cb3dfc201c} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 3 (267 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x2178a8c909e83354baa38027ac62b6d5bae81853dca5da8e2f508aeb2f0778081cef9e96154174acbccac610a76050ae2eb0312c7e76030137ec7e85aad2c87c7c8cac5d3aa63831bef096c68fb8e25db6bb974f1e82} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> Sending packet 4 (267 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x2178a8c909e83354baa38027ac62b6d5bae81853dca5da8e2f508aeb2f0778081cef9e96154174acbccac610a76050ae2eb0312c7e76030137ec7e85aad2c87c7c8cac5d3aa63831bef096c68fb8e25db6bb974f1e82} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> Sending packet 3 (83 bytes) for connection 34aaed880e0104b3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 977cabc868fc443aab6d3f6cec42c64e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6a32fe24, StatelessResetToken: 0x186a2c05d44bbe55d3fb5731c0f4f971} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: edd77dca, StatelessResetToken: 0xc880e5d025f35dc8e08312541594b65f} 2025/04/30 09:21:39 server Skipping packet number 2 2025/04/30 09:21:39 server -> Sending packet 4 (267 bytes) for connection 34aaed880e0104b3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 977cabc868fc443aab6d3f6cec42c64e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x1f8b9590499e96a50d310c3db27301b82af079cf97a96aaa028abfcbf5eb4873a30ea6984ac951c258deeeeff985996abe4f2212eea5aa6a6fd079359a876b7bd8f75be33b32c22d4f6cb60d8feaf3cc84326a92160b} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server <- Reading packet 5 (1200 bytes) for connection b40871fe, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: b40871fe, SrcConnectionID: c0acb24e8513f8c2b66b4da959b09503, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 9ms} 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server -> Sending packet 1 (200 bytes) for connection 4fe27f3c015e81f2, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, SrcConnectionID: 36f45aa2, PacketNumber: 1, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:21:39 server -> Sending packet 2 (200 bytes) for connection 4fe27f3c015e81f2, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, SrcConnectionID: 36f45aa2, PacketNumber: 2, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:21:39 server <- Reading packet 3 (43 bytes) for connection d30ff9c1, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: d30ff9c1, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [d30ff9c1 ec1983d5] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection f25083d98837c071 closed. 2025/04/30 09:21:39 server <- Reading packet 5 (1200 bytes) for connection 4de520d7, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 4de520d7, SrcConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 5.112ms} 2025/04/30 09:21:39 server <- Reading packet 17 (43 bytes) for connection 0eec5a76, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0eec5a76, PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, DelayTime: 857.352ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 10 (49 bytes) for connection aa80af060c84d68f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 79432f90291ab05c37a2e3c5f61a8657, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 6, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 13, Smallest: 13}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 144.46µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server -> Sending packet 1 (202 bytes) for connection a15049ea6c4a1b38, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, SrcConnectionID: 124fba0d, PacketNumber: 1, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:39 server -> Sending packet 2 (202 bytes) for connection a15049ea6c4a1b38, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, SrcConnectionID: 124fba0d, PacketNumber: 2, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:39 server <- Reading packet 8 (162 bytes) for connection 13b62f09, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 13b62f09, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 552µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [5] 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 480283bf8bd405b90fd4d92d394040a4, StatelessResetToken: 0x161a231584b467833c21dcdc573a8e53} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 16876bb61707a836c58afa170dbcc9f7, StatelessResetToken: 0x4cd05af9902d338371cf8d3c28601e02} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: ddd51821f9ed9844b78db6bf1ecf7203, StatelessResetToken: 0xacb23fb1b36dc2f93ea7c143d823afd8} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 server -> Sending packet 7 (51 bytes) for connection a18a0d5bd0205eaf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 480283bf8bd405b90fd4d92d394040a4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 187.751µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Received request: GET /ivfmandmqk 2025/04/30 09:21:39 server -> Sending packet 8 (1061 bytes) for connection a18a0d5bd0205eaf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 480283bf8bd405b90fd4d92d394040a4, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 3 (43 bytes) for connection 6a32fe24, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6a32fe24, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 728µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [3] 2025/04/30 09:21:39 server updated RTT: 35.469ms (σ: 10.802ms) 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/e2501aed128fb288.sqlog 2025/04/30 09:21:39 server Changing connection ID to e99fa0cb. 2025/04/30 09:21:39 Adding connection IDs e2501aed128fb288 and e99fa0cb for a new connection. 2025/04/30 09:21:39 server <- Reading packet 2 (1200 bytes) for connection e2501aed128fb288, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: e2501aed128fb288, SrcConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID f3fd5f99. 2025/04/30 09:21:39 Adding connection ID 6a57bb87. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e2501aed128fb288 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, SrcConnectionID: e99fa0cb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 968, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, SrcConnectionID: e99fa0cb, PacketNumber: 0, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:21:39 server Short Header{DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a57bb87, StatelessResetToken: 0xdbd17fb690899b7c4db0561c15d40ecd} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f3fd5f99, StatelessResetToken: 0x530abc305c0ffa933d8712889626abbd} 2025/04/30 09:21:39 server <- Reading packet 4 (1200 bytes) for connection e2501aed128fb288, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: e2501aed128fb288, SrcConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server -> Sending packet 1 (58 bytes) for connection e2501aed128fb288, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, SrcConnectionID: e99fa0cb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Reading packet 5 (43 bytes) for connection 6a32fe24, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6a32fe24, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 15.144ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [4] 2025/04/30 09:21:39 server updated RTT: 35.321ms (σ: 8.396ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server <- Reading packet 7 (43 bytes) for connection 6a32fe24, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6a32fe24, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 15.144ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server -> Sending packet 5 (47 bytes) for connection 34aaed880e0104b3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 977cabc868fc443aab6d3f6cec42c64e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 213.228µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Reading packet 18 (54 bytes) for connection 0eec5a76, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0eec5a76, PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 608µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 Received request: GET /zfaarpblvb 2025/04/30 09:21:39 server -> Sending packet 11 (1075 bytes) for connection aa80af060c84d68f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 79432f90291ab05c37a2e3c5f61a8657, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 6, AckRanges: {{Largest: 18, Smallest: 17}, {Largest: 13, Smallest: 13}, {Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 320.245µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 2 (93 bytes) for connection 9d4c868a, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 9d4c868a, SrcConnectionID: bfeefe9c91cfef597837cb0410be66b6, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 869.728ms} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID a15049ea6c4a1b38 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 2 (315 bytes) for connection a15049ea6c4a1b38, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x3f9d3c7720ea51530d58b456e8a6c6a2cb3765ff327fc226436c1296505441b0c3ebef5f1e66ca7b48291b7b2de788ec888151b058cf5b505533896625258fbb123d26ea29c6b8dd84699e46c95eb766c64db14e7f56} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6644e98c, StatelessResetToken: 0xbcb7698113ccfbb6afe9b97e9f029254} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9d4c868a, StatelessResetToken: 0xa0926cdb031f7107e1aaac8dc8cc9776} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> Sending packet 3 (315 bytes) for connection a15049ea6c4a1b38, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9d4c868a, StatelessResetToken: 0xa0926cdb031f7107e1aaac8dc8cc9776} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6644e98c, StatelessResetToken: 0xbcb7698113ccfbb6afe9b97e9f029254} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x3f9d3c7720ea51530d58b456e8a6c6a2cb3765ff327fc226436c1296505441b0c3ebef5f1e66ca7b48291b7b2de788ec888151b058cf5b505533896625258fbb123d26ea29c6b8dd84699e46c95eb766c64db14e7f56} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server <- Reading packet 1 (45 bytes) for connection 9d4c868a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 9d4c868a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server -> Sending packet 4 (44 bytes) for connection a15049ea6c4a1b38, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 105.927992ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 Received request: GET /qwqwdghacz 2025/04/30 09:21:39 server -> Sending packet 5 (1061 bytes) for connection a15049ea6c4a1b38, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Queueing packet (43 bytes) for later decryption 2025/04/30 09:21:39 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 2 (1280 bytes) for connection e2501aed128fb288, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, SrcConnectionID: e99fa0cb, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server -> Sending packet 3 (1280 bytes) for connection e2501aed128fb288, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, SrcConnectionID: e99fa0cb, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server <- Reading packet 9 (43 bytes) for connection 13b62f09, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 13b62f09, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- Reading packet 8 (164 bytes) for connection 6a32fe24, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6a32fe24, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 856µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 8f8abd9e5a96a77bfd1555d36d31ff52, StatelessResetToken: 0xbcae8c41621550c680a6a24739debaec} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 1aa8e1206860a600c15c9fb78fd64e48, StatelessResetToken: 0xc906a6832b351fc1a7c18df6249692a2} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 04bd1cf4da7a19c20116b53848070285, StatelessResetToken: 0x483a4af8e846a39b79c67fce2f43fcab} 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID adc93156 in 5s. 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 27.48ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 server newly acked packets (1): [7] 2025/04/30 09:21:39 server -> Sending packet 6 (1366 bytes) for connection 34aaed880e0104b3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server updated RTT: 35.935ms (σ: 6.929ms) 2025/04/30 09:21:39 server Ignoring all packets below 9. 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8f8abd9e5a96a77bfd1555d36d31ff52, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 Received request: GET /dlvdchgbjs 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server -> Sending packet 7 (49 bytes) for connection 34aaed880e0104b3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8f8abd9e5a96a77bfd1555d36d31ff52, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 463.501µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 server -> Sending packet 8 (1061 bytes) for connection 34aaed880e0104b3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8f8abd9e5a96a77bfd1555d36d31ff52, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 19 (43 bytes) for connection 0eec5a76, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0eec5a76, PacketNumber: 19, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [ec34bad6 0eec5a76] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection aa80af060c84d68f closed. 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/1e0bac2497bc4802.sqlog 2025/04/30 09:21:39 server Changing connection ID to 44bc9ec4. 2025/04/30 09:21:39 Adding connection IDs 1e0bac2497bc4802 and 44bc9ec4 for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection 1e0bac2497bc4802, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 1e0bac2497bc4802, SrcConnectionID: 5b5e603f76b0281879b5f6b10c68efcf, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 5b5e603f76b0281879b5f6b10c68efcf, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 36c00588. 2025/04/30 09:21:39 Adding connection ID 4857d571. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1e0bac2497bc4802 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 5b5e603f76b0281879b5f6b10c68efcf, SrcConnectionID: 44bc9ec4, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 967, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 5b5e603f76b0281879b5f6b10c68efcf, SrcConnectionID: 44bc9ec4, PacketNumber: 0, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 5b5e603f76b0281879b5f6b10c68efcf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 36c00588, StatelessResetToken: 0x44d7e51093c97cb01eea9ad37da5ba78} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4857d571, StatelessResetToken: 0x39a40c0d9f59adfd1f2e54dd1eb3a883} 2025/04/30 09:21:39 server <- Reading packet 33 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 33, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 18, LowestAcked: 11, AckRanges: {{Largest: 18, Smallest: 17}, {Largest: 15, Smallest: 14}, {Largest: 11, Smallest: 11}}, DelayTime: 166.624ms, ECT0: 12, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 19 (63 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 33, LowestAcked: 0, AckRanges: {{Largest: 33, Smallest: 33}, {Largest: 31, Smallest: 27}, {Largest: 23, Smallest: 22}, {Largest: 20, Smallest: 20}, {Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 160.26µs, ECT0: 15, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Reading packet 35 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 35, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 18, LowestAcked: 11, AckRanges: {{Largest: 18, Smallest: 17}, {Largest: 15, Smallest: 14}, {Largest: 11, Smallest: 11}}, DelayTime: 166.624ms, ECT0: 12, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/097294eaa3b0d938.sqlog 2025/04/30 09:21:39 server -> Sending packet 20 (65 bytes) for connection 13ec6cad3dc00557, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 789803d2d13a0d1d465937a4260c487e, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server Changing connection ID to f43812fb. 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 35, LowestAcked: 0, AckRanges: {{Largest: 35, Smallest: 35}, {Largest: 33, Smallest: 33}, {Largest: 31, Smallest: 27}, {Largest: 23, Smallest: 22}, {Largest: 20, Smallest: 20}, {Largest: 17, Smallest: 17}, {Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 180.444µs, ECT0: 16, ECT1: 0, CE: 0} 2025/04/30 09:21:39 Adding connection IDs 097294eaa3b0d938 and f43812fb for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection 097294eaa3b0d938, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 097294eaa3b0d938, SrcConnectionID: 14b40658cbf2ba797766f7c8d0b014cb, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 14b40658cbf2ba797766f7c8d0b014cb, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 97d1ee0d. 2025/04/30 09:21:39 Adding connection ID 77a8a245. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 097294eaa3b0d938 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 14b40658cbf2ba797766f7c8d0b014cb, SrcConnectionID: f43812fb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 968, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 14b40658cbf2ba797766f7c8d0b014cb, SrcConnectionID: f43812fb, PacketNumber: 0, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 14b40658cbf2ba797766f7c8d0b014cb, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 77a8a245, StatelessResetToken: 0x03ca5c5ed65816b4d47eb1910a791c54} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 97d1ee0d, StatelessResetToken: 0x1fe3462d87a3071b55b412434c77032b} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 10 (1061 bytes) for connection a18a0d5bd0205eaf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 480283bf8bd405b90fd4d92d394040a4, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server -> Sending packet 11 (1061 bytes) for connection a18a0d5bd0205eaf, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 480283bf8bd405b90fd4d92d394040a4, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server -> Sending packet 1 (199 bytes) for connection e2501aed128fb288, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, SrcConnectionID: e99fa0cb, PacketNumber: 1, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:21:39 server -> Sending packet 2 (199 bytes) for connection e2501aed128fb288, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, SrcConnectionID: e99fa0cb, PacketNumber: 2, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:39 server <- Reading packet 1 (66 bytes) for connection 36c00588, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 36c00588, SrcConnectionID: 5b5e603f76b0281879b5f6b10c68efcf, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.456ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 35.520525ms (σ: 17.760262ms) 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:39 server <- Reading packet 0 (1134 bytes) for connection 36c00588, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 36c00588, SrcConnectionID: 5b5e603f76b0281879b5f6b10c68efcf, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.456ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 35.52ms (σ: 13.32ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID 1e0bac2497bc4802 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server <- Reading packet 0 (43 bytes) for connection 36c00588, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 36c00588, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.8ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 35.522ms (σ: 9.994ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID 44bc9ec4 in 5s. 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server <- Reading packet 1 (45 bytes) for connection 36c00588, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 36c00588, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server -> Sending packet 1 (275 bytes) for connection 1e0bac2497bc4802, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 5b5e603f76b0281879b5f6b10c68efcf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 503.411µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xe00afb5ebf8d8016a720f73465644e0d17fa2dc52afcd64cc63af13c8cc66f3dda99957479481cd01793c928896a010dc34fab113121298e4aeb0d4202e84998919198439d3c2de544a3d01adf78129bdde113bfd06d} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 Received request: GET /wujgreonsf 2025/04/30 09:21:39 server -> Sending packet 2 (1061 bytes) for connection 1e0bac2497bc4802, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 5b5e603f76b0281879b5f6b10c68efcf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 36 (43 bytes) for connection d0872b8a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: d0872b8a, PacketNumber: 36, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [d0872b8a 2ec746b4] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection 13ec6cad3dc00557 closed. 2025/04/30 09:21:39 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 1 (1280 bytes) for connection 097294eaa3b0d938, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 14b40658cbf2ba797766f7c8d0b014cb, SrcConnectionID: f43812fb, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server -> Sending packet 2 (1280 bytes) for connection 097294eaa3b0d938, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 14b40658cbf2ba797766f7c8d0b014cb, SrcConnectionID: f43812fb, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Amplification window limited. Received 1245 bytes, already sent out 3840 bytes 2025/04/30 09:21:39 server <- Reading packet 9 (43 bytes) for connection 6a32fe24, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6a32fe24, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 25.632ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (2): [6 7] 2025/04/30 09:21:39 server updated RTT: 35.058ms (σ: 6.822ms) 2025/04/30 09:21:39 server Ignoring all packets below 9. 2025/04/30 09:21:39 server <- Reading packet 11 (43 bytes) for connection 13b62f09, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 13b62f09, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [13b62f09 34798cec] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection a18a0d5bd0205eaf closed. 2025/04/30 09:21:39 server <- Reading packet 3 (43 bytes) for connection 36c00588, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 36c00588, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [36c00588 4857d571] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection 1e0bac2497bc4802 closed. 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/7415fa14cece7c21.sqlog 2025/04/30 09:21:39 server Changing connection ID to 35f27e56. 2025/04/30 09:21:39 Adding connection IDs 7415fa14cece7c21 and 35f27e56 for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection 7415fa14cece7c21, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 7415fa14cece7c21, SrcConnectionID: 0ab8012bb2ebffb514a0f926e429c294, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0ab8012bb2ebffb514a0f926e429c294, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 5979d439. 2025/04/30 09:21:39 Adding connection ID f7f864e9. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7415fa14cece7c21 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 0ab8012bb2ebffb514a0f926e429c294, SrcConnectionID: 35f27e56, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 953, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 0ab8012bb2ebffb514a0f926e429c294, SrcConnectionID: 35f27e56, PacketNumber: 0, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0ab8012bb2ebffb514a0f926e429c294, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5979d439, StatelessResetToken: 0x1ba4ad8de1b5f43969e140d402f584f6} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f7f864e9, StatelessResetToken: 0xe3a1919c993b37e58ba58e65a1f4c84a} 2025/04/30 09:21:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server -> Sending packet 1 (759 bytes) for connection fef22c25d7e0ddf4, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, SrcConnectionID: b40871fe, PacketNumber: 1, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 09:21:39 server -> Sending packet 2 (759 bytes) for connection fef22c25d7e0ddf4, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, SrcConnectionID: b40871fe, PacketNumber: 2, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 10 (1061 bytes) for connection 34aaed880e0104b3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8f8abd9e5a96a77bfd1555d36d31ff52, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server -> Sending packet 11 (1061 bytes) for connection 34aaed880e0104b3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8f8abd9e5a96a77bfd1555d36d31ff52, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server -> Sending packet 1 (762 bytes) for connection a9ccd6fc9b88f19b, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, SrcConnectionID: 4de520d7, PacketNumber: 1, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 09:21:39 server -> Sending packet 2 (762 bytes) for connection a9ccd6fc9b88f19b, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, SrcConnectionID: 4de520d7, PacketNumber: 2, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 09:21:39 server <- Reading packet 2 (93 bytes) for connection 6a57bb87, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 6a57bb87, SrcConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 868.448ms} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID e2501aed128fb288 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 2 (315 bytes) for connection e2501aed128fb288, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f3fd5f99, StatelessResetToken: 0x530abc305c0ffa933d8712889626abbd} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a57bb87, StatelessResetToken: 0xdbd17fb690899b7c4db0561c15d40ecd} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x9be4f609aedfbb9d4e516d5c9a8895a73308dbf38edb5b000330ee71f403e685cd459737a2ad65f1d04ac59fbdeeb5e4973e937796a3c9545a01d3f76c016284b2d54e7be0248fd02231a82d14522dc62e7ac2c88224} 2025/04/30 09:21:39 server -> Sending packet 3 (315 bytes) for connection e2501aed128fb288, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x9be4f609aedfbb9d4e516d5c9a8895a73308dbf38edb5b000330ee71f403e685cd459737a2ad65f1d04ac59fbdeeb5e4973e937796a3c9545a01d3f76c016284b2d54e7be0248fd02231a82d14522dc62e7ac2c88224} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a57bb87, StatelessResetToken: 0xdbd17fb690899b7c4db0561c15d40ecd} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f3fd5f99, StatelessResetToken: 0x530abc305c0ffa933d8712889626abbd} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server <- Reading packet 0 (43 bytes) for connection 6a57bb87, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6a57bb87, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.04ms} 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID e99fa0cb in 5s. 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server <- Reading packet 1 (45 bytes) for connection 6a57bb87, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6a57bb87, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server -> Sending packet 4 (44 bytes) for connection e2501aed128fb288, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 106.050078ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 Received request: GET /nhrkmdvqhn 2025/04/30 09:21:39 server -> Sending packet 5 (1061 bytes) for connection e2501aed128fb288, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 09:21:39 server -> Sending packet 3 (1280 bytes) for connection 4fe27f3c015e81f2, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, SrcConnectionID: 36f45aa2, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server -> Sending packet 4 (1280 bytes) for connection 4fe27f3c015e81f2, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, SrcConnectionID: 36f45aa2, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 1 (1280 bytes) for connection 7415fa14cece7c21, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 0ab8012bb2ebffb514a0f926e429c294, SrcConnectionID: 35f27e56, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server -> Sending packet 2 (1280 bytes) for connection 7415fa14cece7c21, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 0ab8012bb2ebffb514a0f926e429c294, SrcConnectionID: 35f27e56, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:39 server <- Reading packet 0 (91 bytes) for connection b40871fe, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: b40871fe, SrcConnectionID: c0acb24e8513f8c2b66b4da959b09503, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 10.896ms} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID fef22c25d7e0ddf4 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 2 (312 bytes) for connection fef22c25d7e0ddf4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 97a4264a, StatelessResetToken: 0xdbea90cfb4aeabdc487c9102bfe56831} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ebdbdb24, StatelessResetToken: 0x0b61184e34973a77d34e6c14fc66ce91} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x4effeb7c9cb34888edb8809ee66b5b582733d17d1d5030b6c403863065435f815063bbb011a49867bbe1d5088ea4a5ef425e4e8eb99a2539af5c71d957cf7f0bd86e74aabe798d6ee34112766049089e9d7bff4a1060} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> Sending packet 3 (312 bytes) for connection fef22c25d7e0ddf4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 97a4264a, StatelessResetToken: 0xdbea90cfb4aeabdc487c9102bfe56831} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ebdbdb24, StatelessResetToken: 0x0b61184e34973a77d34e6c14fc66ce91} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x4effeb7c9cb34888edb8809ee66b5b582733d17d1d5030b6c403863065435f815063bbb011a49867bbe1d5088ea4a5ef425e4e8eb99a2539af5c71d957cf7f0bd86e74aabe798d6ee34112766049089e9d7bff4a1060} 2025/04/30 09:21:39 server -> Sending packet 4 (1366 bytes) for connection fef22c25d7e0ddf4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server <- Reading packet 0 (45 bytes) for connection b40871fe, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: b40871fe, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server -> Sending packet 5 (43 bytes) for connection fef22c25d7e0ddf4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 95.348µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 Received request: GET /lhvrtseavo 2025/04/30 09:21:39 server Skipping packet number 6 2025/04/30 09:21:39 server -> Sending packet 7 (1061 bytes) for connection fef22c25d7e0ddf4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Skipping packet number 6 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server -> Sending packet 6 (267 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x2178a8c909e83354baa38027ac62b6d5bae81853dca5da8e2f508aeb2f0778081cef9e96154174acbccac610a76050ae2eb0312c7e76030137ec7e85aad2c87c7c8cac5d3aa63831bef096c68fb8e25db6bb974f1e82} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> Sending packet 7 (267 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x2178a8c909e83354baa38027ac62b6d5bae81853dca5da8e2f508aeb2f0778081cef9e96154174acbccac610a76050ae2eb0312c7e76030137ec7e85aad2c87c7c8cac5d3aa63831bef096c68fb8e25db6bb974f1e82} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> Sending packet 8 (1366 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server <- Reading packet 0 (91 bytes) for connection 4de520d7, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 4de520d7, SrcConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 13.704ms} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID a9ccd6fc9b88f19b in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 2 (312 bytes) for connection a9ccd6fc9b88f19b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x8fe6d28229d4a7d3dd5ef62bbeba5f76369bcff511b07a779a50181c65501174d499414a399069e5f29beb14396b164291869121249a33e6146d9ded2fc477b9c197ca7de91af6c7080dcc617cf55826ac72fac287c7} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2924d457, StatelessResetToken: 0x5a554d181c089b640953cb55e81b794a} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b620f76b, StatelessResetToken: 0xdea0f179ef0867086153b1fe81a186c2} 2025/04/30 09:21:39 server -> Sending packet 3 (312 bytes) for connection a9ccd6fc9b88f19b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2924d457, StatelessResetToken: 0x5a554d181c089b640953cb55e81b794a} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x8fe6d28229d4a7d3dd5ef62bbeba5f76369bcff511b07a779a50181c65501174d499414a399069e5f29beb14396b164291869121249a33e6146d9ded2fc477b9c197ca7de91af6c7080dcc617cf55826ac72fac287c7} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b620f76b, StatelessResetToken: 0xdea0f179ef0867086153b1fe81a186c2} 2025/04/30 09:21:39 server -> Sending packet 4 (1366 bytes) for connection a9ccd6fc9b88f19b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server <- Reading packet 0 (45 bytes) for connection 4de520d7, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 4de520d7, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server -> Sending packet 7 (315 bytes) for connection a15049ea6c4a1b38, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server Short Header{DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 9d4c868a, StatelessResetToken: 0xa0926cdb031f7107e1aaac8dc8cc9776} 2025/04/30 09:21:39 Received request: GET /rjedgcemct 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6644e98c, StatelessResetToken: 0xbcb7698113ccfbb6afe9b97e9f029254} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x3f9d3c7720ea51530d58b456e8a6c6a2cb3765ff327fc226436c1296505441b0c3ebef5f1e66ca7b48291b7b2de788ec888151b058cf5b505533896625258fbb123d26ea29c6b8dd84699e46c95eb766c64db14e7f56} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server Skipping packet number 6 2025/04/30 09:21:39 server -> Sending packet 8 (1061 bytes) for connection a15049ea6c4a1b38, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: bfeefe9c91cfef597837cb0410be66b6, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server -> Sending packet 5 (43 bytes) for connection a9ccd6fc9b88f19b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 119.795µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> Sending packet 6 (1061 bytes) for connection a9ccd6fc9b88f19b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 07e115d3a0d169ae05bd5d35e7b78d08, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 5 (95 bytes) for connection 36684893, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 36684893, SrcConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, PacketNumber: 5, PacketNumberLen: 1, Length: 66, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 1}}, DelayTime: 3.78484s} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID 09aff03dcb509c02 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (95 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 2 (315 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6d9b0862, StatelessResetToken: 0x7d0ad1aeae9aea11b773f08553b4f158} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d53315bb, StatelessResetToken: 0xb8b77209a7512b8a92228df93ec596bf} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xff5d982d990af89a5f46491fbc14c2dff53294a24c7c3f5d797ad8c81b7e8408ddf7fdadc1f384c53e53d585d7137c4e6edec3d695384f73b40a072fbc0352ea79570da714276d2bc6276712254e4d64a3a2b97b6df5} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> Sending packet 3 (315 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 48dc70efcb4b0b7d4fc04d71bf508cbc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d53315bb, StatelessResetToken: 0xb8b77209a7512b8a92228df93ec596bf} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xff5d982d990af89a5f46491fbc14c2dff53294a24c7c3f5d797ad8c81b7e8408ddf7fdadc1f384c53e53d585d7137c4e6edec3d695384f73b40a072fbc0352ea79570da714276d2bc6276712254e4d64a3a2b97b6df5} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6d9b0862, StatelessResetToken: 0x7d0ad1aeae9aea11b773f08553b4f158} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 8 (1061 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f85aee58ec759369e23f45153431bb72, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server -> Sending packet 9 (1061 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f85aee58ec759369e23f45153431bb72, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server -> Sending packet 10 (1366 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f85aee58ec759369e23f45153431bb72, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server <- Reading packet 1 (1200 bytes) for connection 35f27e56, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 35f27e56, SrcConnectionID: 0ab8012bb2ebffb514a0f926e429c294, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 6.192ms} 2025/04/30 09:21:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server -> Sending packet 1 (214 bytes) for connection 7415fa14cece7c21, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 0ab8012bb2ebffb514a0f926e429c294, SrcConnectionID: 35f27e56, PacketNumber: 1, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 09:21:39 server -> Sending packet 2 (214 bytes) for connection 7415fa14cece7c21, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 0ab8012bb2ebffb514a0f926e429c294, SrcConnectionID: 35f27e56, PacketNumber: 2, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 09:21:39 server <- Reading packet 2 (43 bytes) for connection 97a4264a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 97a4264a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 2}}, DelayTime: 936µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (3): [3 4 7] 2025/04/30 09:21:39 server updated RTT: 35.690873ms (σ: 17.845436ms) 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server -> Sending packet 8 (38 bytes) for connection fef22c25d7e0ddf4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: c0acb24e8513f8c2b66b4da959b09503, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:39 server <- Reading packet 3 (43 bytes) for connection 97a4264a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 97a4264a, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [97a4264a b40871fe ebdbdb24] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection fef22c25d7e0ddf4 closed. 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/f8ba55f2236adf42.sqlog 2025/04/30 09:21:39 server Changing connection ID to 5fdbe6dd. 2025/04/30 09:21:39 Adding connection IDs f8ba55f2236adf42 and 5fdbe6dd for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection f8ba55f2236adf42, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: f8ba55f2236adf42, SrcConnectionID: 14b9e9ab44c62598c575a7b077804170, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 14b9e9ab44c62598c575a7b077804170, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 3910c5c3. 2025/04/30 09:21:39 Adding connection ID df1f5008. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f8ba55f2236adf42 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 14b9e9ab44c62598c575a7b077804170, SrcConnectionID: 5fdbe6dd, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 967, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 14b9e9ab44c62598c575a7b077804170, SrcConnectionID: 5fdbe6dd, PacketNumber: 0, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 14b9e9ab44c62598c575a7b077804170, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3910c5c3, StatelessResetToken: 0x9485a633e70c81d8655eb8ab3b1b0e4d} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: df1f5008, StatelessResetToken: 0xcde0bea99737e212a235dede32463b2c} 2025/04/30 09:21:39 server <- Reading packet 2 (93 bytes) for connection 77a8a245, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 77a8a245, SrcConnectionID: 14b40658cbf2ba797766f7c8d0b014cb, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- Reading packet 1 (141 bytes) for connection 2924d457, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 2924d457, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 1.128ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 84fb94cdbd7817e4d6c0f306a249d1b7, StatelessResetToken: 0x18fb1cff5ac8d15b9b457bc55c358d06} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: ceddff70a4212f45ab465bbce6b19948, StatelessResetToken: 0x9aa30b7410698939a1647ad719eda9a4} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 4a51e19bb4f38e218c2b2fda167faeda, StatelessResetToken: 0xb70614ac5161554c140a14334f20cea5} 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID 4de520d7 in 5s. 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 895.904ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 145.649807ms (σ: 72.824903ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server -> Sending packet 7 (45 bytes) for connection a9ccd6fc9b88f19b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 84fb94cdbd7817e4d6c0f306a249d1b7, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 230.262µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID 097294eaa3b0d938 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server -> Sending packet 1 (267 bytes) for connection 097294eaa3b0d938, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 14b40658cbf2ba797766f7c8d0b014cb, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x41d916a5c19a278a04220d81075ec1aca3d19ce5fb3afc9f7e5cc0590bb906554ca5f9f98ae20d1e56ae03a6c69494f7ecd11a80bb274851ad4ed75887f134a42b55bc666e386294105313176dd397365aef4413d354} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server <- Reading packet 1 (45 bytes) for connection 77a8a245, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 77a8a245, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server -> Sending packet 2 (44 bytes) for connection 097294eaa3b0d938, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 14b40658cbf2ba797766f7c8d0b014cb, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 110.462597ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 Received request: GET /bfxecvgmde 2025/04/30 09:21:39 server -> Sending packet 3 (1061 bytes) for connection 097294eaa3b0d938, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 14b40658cbf2ba797766f7c8d0b014cb, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 3 (43 bytes) for connection 2924d457, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 2924d457, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 240µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (2): [4 6] 2025/04/30 09:21:39 server updated RTT: 35.866561ms (σ: 17.93328ms) 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server lost packet 3 (reordering threshold) 2025/04/30 09:21:39 server -> Sending packet 8 (315 bytes) for connection a9ccd6fc9b88f19b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 84fb94cdbd7817e4d6c0f306a249d1b7, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x8fe6d28229d4a7d3dd5ef62bbeba5f76369bcff511b07a779a50181c65501174d499414a399069e5f29beb14396b164291869121249a33e6146d9ded2fc477b9c197ca7de91af6c7080dcc617cf55826ac72fac287c7} 2025/04/30 09:21:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b620f76b, StatelessResetToken: 0xdea0f179ef0867086153b1fe81a186c2} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 2924d457, StatelessResetToken: 0x5a554d181c089b640953cb55e81b794a} 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/a69cb6ec2a8d1a00.sqlog 2025/04/30 09:21:39 server Changing connection ID to d5b6cd92. 2025/04/30 09:21:39 Adding connection IDs a69cb6ec2a8d1a00 and d5b6cd92 for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection a69cb6ec2a8d1a00, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: a69cb6ec2a8d1a00, SrcConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID e7314f78. 2025/04/30 09:21:39 Adding connection ID 8ff3b0d2. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a69cb6ec2a8d1a00 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, SrcConnectionID: d5b6cd92, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 964, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, SrcConnectionID: d5b6cd92, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8ff3b0d2, StatelessResetToken: 0xa039db53cdd730e065e96b55e696544c} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e7314f78, StatelessResetToken: 0x44c3762f909658b24e1cf40db665e1d5} 2025/04/30 09:21:39 server <- Reading packet 1 (141 bytes) for connection 6d9b0862, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6d9b0862, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 976µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: f6d5406d6bc69ecf002099d48a5c80f0, StatelessResetToken: 0xd58399a877e9c7c8d3e4ee28d1470bb8} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 5a7ae5aa10aa8780adbd3461c39565eb, StatelessResetToken: 0x46e9d0fe690fffe955741feeb280ff0d} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: ea4849afc2767fc278a04d053ffbe3ce, StatelessResetToken: 0x46dd3cc82fc2dfa5ab07afc648f84e08} 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID 36684893 in 5s. 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server -> Sending packet 4 (45 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f6d5406d6bc69ecf002099d48a5c80f0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 124.572µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 server <- Reading packet 14 (43 bytes) for connection 090090e0, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 090090e0, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 5, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 5, Smallest: 5}}, DelayTime: 328µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [10] 2025/04/30 09:21:39 server updated RTT: 191.092ms (σ: 128.977ms) 2025/04/30 09:21:39 server setting loss timer for packet 9 (1-RTT) to 214.9785ms (in 2025-04-30 09:21:39.76913221 +0000 UTC m=+2.766764586) 2025/04/30 09:21:39 server <- Reading packet 6 (43 bytes) for connection 37a9cec4, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 37a9cec4, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 26.36ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (2): [7 8] 2025/04/30 09:21:39 server updated RTT: 36.075ms (σ: 7.914ms) 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:39 server <- Reading packet 4 (43 bytes) for connection e13811a6, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: e13811a6, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 1.024008s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server -> Sending packet 5 (1409 bytes) for connection ef1be9349c65b9e1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: fc7177cc44ca71c05013d7564120c16f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server <- Reading packet 6 (43 bytes) for connection e13811a6, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: e13811a6, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 1.024008s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server -> Sending packet 6 (47 bytes) for connection ef1be9349c65b9e1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: fc7177cc44ca71c05013d7564120c16f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 164.528µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Reading packet 1 (65 bytes) for connection 35f27e56, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 35f27e56, SrcConnectionID: 0ab8012bb2ebffb514a0f926e429c294, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 3.84ms} 2025/04/30 09:21:39 server newly acked packets (1): [2] 2025/04/30 09:21:39 server updated RTT: 35.309608ms (σ: 17.654804ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- Reading packet 4 (43 bytes) for connection 2924d457, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 2924d457, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [b620f76b 2924d457] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server <- Reading packet 2 (43 bytes) for connection 6d9b0862, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6d9b0862, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 25.232ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [3] 2025/04/30 09:21:39 server updated RTT: 34.612ms (σ: 10.511ms) 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server Connection a9ccd6fc9b88f19b closed. 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 1: 65 bytes. Remaining: 43 bytes. 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server <- Reading packet 2 (43 bytes) for connection 77a8a245, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 77a8a245, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [f43812fb 97d1ee0d 77a8a245] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection 097294eaa3b0d938 closed. 2025/04/30 09:21:39 server <- Reading packet 3 (54 bytes) for connection 6d9b0862, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6d9b0862, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 664µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [4] 2025/04/30 09:21:39 server updated RTT: 34.298ms (σ: 8.51ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 server Ignoring all packets below 2. 2025/04/30 09:21:39 Received request: GET /sytgvvclqk 2025/04/30 09:21:39 server -> Sending packet 5 (1069 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f6d5406d6bc69ecf002099d48a5c80f0, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 379.942µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server -> Sending packet 7 (315 bytes) for connection e2501aed128fb288, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: f3fd5f99, StatelessResetToken: 0x530abc305c0ffa933d8712889626abbd} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a57bb87, StatelessResetToken: 0xdbd17fb690899b7c4db0561c15d40ecd} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x9be4f609aedfbb9d4e516d5c9a8895a73308dbf38edb5b000330ee71f403e685cd459737a2ad65f1d04ac59fbdeeb5e4973e937796a3c9545a01d3f76c016284b2d54e7be0248fd02231a82d14522dc62e7ac2c88224} 2025/04/30 09:21:39 server Skipping packet number 6 2025/04/30 09:21:39 server -> Sending packet 8 (1061 bytes) for connection e2501aed128fb288, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 3 (43 bytes) for connection 6a57bb87, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6a57bb87, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 664µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [7] 2025/04/30 09:21:39 server updated RTT: 32.89123ms (σ: 16.445615ms) 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server -> Sending packet 13 (1061 bytes) for connection 34aaed880e0104b3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8f8abd9e5a96a77bfd1555d36d31ff52, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server -> Sending packet 14 (1061 bytes) for connection 34aaed880e0104b3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8f8abd9e5a96a77bfd1555d36d31ff52, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server -> Sending packet 15 (1409 bytes) for connection 34aaed880e0104b3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8f8abd9e5a96a77bfd1555d36d31ff52, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server <- Reading packet 10 (43 bytes) for connection 6a32fe24, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6a32fe24, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 6, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 7, Smallest: 6}}, DelayTime: 512µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> Sending packet 7 (1061 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f6d5406d6bc69ecf002099d48a5c80f0, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server -> Sending packet 8 (1061 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f6d5406d6bc69ecf002099d48a5c80f0, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 11 (43 bytes) for connection 6a32fe24, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6a32fe24, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [6a32fe24 edd77dca] with a closed connection. 2025/04/30 09:21:39 server Connection 34aaed880e0104b3 closed. 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/ae51fd6706fb517e.sqlog 2025/04/30 09:21:39 server Changing connection ID to e256d62e. 2025/04/30 09:21:39 Adding connection IDs ae51fd6706fb517e and e256d62e for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection ae51fd6706fb517e, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: ae51fd6706fb517e, SrcConnectionID: f343a550fe595e5fac2810c501cfde19, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 444, Offset + Data length: 444} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f343a550fe595e5fac2810c501cfde19, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 666195e9. 2025/04/30 09:21:39 Adding connection ID e512d63b. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ae51fd6706fb517e 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: f343a550fe595e5fac2810c501cfde19, SrcConnectionID: e256d62e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 955, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: f343a550fe595e5fac2810c501cfde19, SrcConnectionID: e256d62e, PacketNumber: 0, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 09:21:39 server Short Header{DestConnectionID: f343a550fe595e5fac2810c501cfde19, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e512d63b, StatelessResetToken: 0xb8c2fc0ad1ab2e009eb5dbb9914c0f04} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 666195e9, StatelessResetToken: 0x82a4141c49fa53cb591358a58cce337f} 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 1: 65 bytes. Remaining: 43 bytes. 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server <- Reading packet 2 (43 bytes) for connection 9d4c868a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 9d4c868a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [124fba0d 9d4c868a 6644e98c] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection a15049ea6c4a1b38 closed. 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/706f1af477cbdccc.sqlog 2025/04/30 09:21:39 server Changing connection ID to 27df7594. 2025/04/30 09:21:39 Adding connection IDs 706f1af477cbdccc and 27df7594 for a new connection. 2025/04/30 09:21:39 server <- Reading packet 2 (1200 bytes) for connection 706f1af477cbdccc, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 706f1af477cbdccc, SrcConnectionID: 045ba8b851072955cbdf669c3fcf441a, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 045ba8b851072955cbdf669c3fcf441a, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 0cb3e0bd. 2025/04/30 09:21:39 Adding connection ID 3a434476. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 706f1af477cbdccc 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, SrcConnectionID: 27df7594, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 967, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, SrcConnectionID: 27df7594, PacketNumber: 0, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3a434476, StatelessResetToken: 0x08aee0b362e51adf531830e493dea33d} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0cb3e0bd, StatelessResetToken: 0x9b1c3ecf6e2fd6022330c66057f045d4} 2025/04/30 09:21:39 server <- Reading packet 4 (1200 bytes) for connection 706f1af477cbdccc, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 706f1af477cbdccc, SrcConnectionID: 045ba8b851072955cbdf669c3fcf441a, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server -> Sending packet 1 (58 bytes) for connection 706f1af477cbdccc, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, SrcConnectionID: 27df7594, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Reading packet 7 (43 bytes) for connection 6d9b0862, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6d9b0862, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 123.872ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 9 (1366 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f6d5406d6bc69ecf002099d48a5c80f0, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server -> Sending packet 10 (45 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f6d5406d6bc69ecf002099d48a5c80f0, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 2}}, DelayTime: 234.61µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Reading packet 8 (43 bytes) for connection 6d9b0862, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6d9b0862, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 424µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/d8cc1a7f0a1a9204.sqlog 2025/04/30 09:21:39 server Changing connection ID to bdf137cb. 2025/04/30 09:21:39 Adding connection IDs d8cc1a7f0a1a9204 and bdf137cb for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection d8cc1a7f0a1a9204, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: d8cc1a7f0a1a9204, SrcConnectionID: c665551c03a28d17ac248f51ac336ada, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 1 (1280 bytes) for connection f8ba55f2236adf42, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 14b9e9ab44c62598c575a7b077804170, SrcConnectionID: 5fdbe6dd, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server -> Sending packet 2 (1280 bytes) for connection f8ba55f2236adf42, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 14b9e9ab44c62598c575a7b077804170, SrcConnectionID: 5fdbe6dd, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: c665551c03a28d17ac248f51ac336ada, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 51611844. 2025/04/30 09:21:39 Adding connection ID 8bd59e7a. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d8cc1a7f0a1a9204 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: c665551c03a28d17ac248f51ac336ada, SrcConnectionID: bdf137cb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 956, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: c665551c03a28d17ac248f51ac336ada, SrcConnectionID: bdf137cb, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:21:39 server Short Header{DestConnectionID: c665551c03a28d17ac248f51ac336ada, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8bd59e7a, StatelessResetToken: 0x3ba8b97a56f098a458c2b1b3f0b45026} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 51611844, StatelessResetToken: 0x03f00f8108d4b38abac9631a7779096f} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 10 (1061 bytes) for connection e2501aed128fb288, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server -> Sending packet 11 (1061 bytes) for connection e2501aed128fb288, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server -> Sending packet 12 (1366 bytes) for connection e2501aed128fb288, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server <- Reading packet 11 (43 bytes) for connection e13811a6, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: e13811a6, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 129.784ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [5] 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 7 (49 bytes) for connection ef1be9349c65b9e1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: fc7177cc44ca71c05013d7564120c16f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 2, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 141.62µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 2 (1280 bytes) for connection 706f1af477cbdccc, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, SrcConnectionID: 27df7594, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server -> Sending packet 3 (1280 bytes) for connection 706f1af477cbdccc, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, SrcConnectionID: 27df7594, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:39 server <- Reading packet 5 (66 bytes) for connection 3a434476, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 3a434476, SrcConnectionID: 045ba8b851072955cbdf669c3fcf441a, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.528ms} 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:39 server <- Reading packet 0 (1134 bytes) for connection 3a434476, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 3a434476, SrcConnectionID: 045ba8b851072955cbdf669c3fcf441a, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.528ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 37.04469ms (σ: 18.522345ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID 706f1af477cbdccc in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server -> Sending packet 1 (267 bytes) for connection 706f1af477cbdccc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xe5529d7e097aa1f228ea36f1b969c9f55a26bebcd4cdc4084c11075b8357a0990b84fef7497711470e111f337fc4aacff25636a6f822f9220b6bdcd07beb7350d9bc7135800e79b1be76972996b79a0388dea550b25a} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:21:39.76913221 +0000 UTC m=+2.766764586 2025/04/30 09:21:39 server lost packet 9 (time threshold) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server -> Sending packet 11 (1061 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f85aee58ec759369e23f45153431bb72, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 9 (43 bytes) for connection 6d9b0862, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6d9b0862, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 3, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 27ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [8] 2025/04/30 09:21:39 server updated RTT: 34.476ms (σ: 6.739ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server -> Sending packet 11 (38 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f6d5406d6bc69ecf002099d48a5c80f0, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:39 server <- Reading packet 8 (43 bytes) for connection 6edb26e9, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6edb26e9, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 656.64ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 10 (1366 bytes) for connection e21969b048f05653, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 3123b5948e1849eb31b5df3ae430d620, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server -> Sending packet 11 (49 bytes) for connection e21969b048f05653, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 3123b5948e1849eb31b5df3ae430d620, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 202.559µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Reading packet 10 (43 bytes) for connection 6edb26e9, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6edb26e9, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 656.64ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 12 (51 bytes) for connection e21969b048f05653, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 3123b5948e1849eb31b5df3ae430d620, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 102.842µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Reading packet 1 (1200 bytes) for connection 5fdbe6dd, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 5fdbe6dd, SrcConnectionID: 14b9e9ab44c62598c575a7b077804170, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 5.728ms} 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 1 (1280 bytes) for connection a69cb6ec2a8d1a00, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, SrcConnectionID: d5b6cd92, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server -> Sending packet 2 (1280 bytes) for connection a69cb6ec2a8d1a00, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, SrcConnectionID: d5b6cd92, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:39 server <- Reading packet 1 (66 bytes) for connection 8bd59e7a, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 8bd59e7a, SrcConnectionID: c665551c03a28d17ac248f51ac336ada, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.72ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 36.977856ms (σ: 18.488928ms) 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:39 server <- Reading packet 0 (1134 bytes) for connection 8bd59e7a, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 8bd59e7a, SrcConnectionID: c665551c03a28d17ac248f51ac336ada, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.72ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 36.977ms (σ: 13.866ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID d8cc1a7f0a1a9204 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server -> Sending packet 1 (267 bytes) for connection d8cc1a7f0a1a9204, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: c665551c03a28d17ac248f51ac336ada, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xf0f542e5742e814dd61855237e10c45a19a27083e9143977745c80d3969f3c3d47181fa8636310699002ea1aec16e61c6ffc5b48cd15dbe7089d421252d44201bc6ae55cf791eee4e2178c4a062c76915930ae1c620a} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server <- Reading packet 0 (43 bytes) for connection 8bd59e7a, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8bd59e7a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.84ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 36.987ms (σ: 10.419ms) 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID bdf137cb in 5s. 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server -> Sending packet 2 (43 bytes) for connection d8cc1a7f0a1a9204, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: c665551c03a28d17ac248f51ac336ada, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 495.98µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Reading packet 12 (164 bytes) for connection e13811a6, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: e13811a6, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 7, DelayTime: 904µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 8dd61ac8e677ca68a9cee23fe8df1f3a, StatelessResetToken: 0x5aedda2ca5b78f985395b27ebb68cba3} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 5da7929e14aa04c33c0041455b6a58c7, StatelessResetToken: 0x5f6becbc9ccee989f78a6238fe902ad5} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 4ce54a42239c418b82bd4ed31c7ac080, StatelessResetToken: 0x75c100fc58dd9ff9262de6dc605e838a} 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID dda66dd1 in 5s. 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 server -> Sending packet 8 (51 bytes) for connection ef1be9349c65b9e1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8dd61ac8e677ca68a9cee23fe8df1f3a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 301.013µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Received request: GET /yhmxwwjrfc 2025/04/30 09:21:39 server -> Sending packet 9 (1061 bytes) for connection ef1be9349c65b9e1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8dd61ac8e677ca68a9cee23fe8df1f3a, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 11 (43 bytes) for connection 6edb26e9, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6edb26e9, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 10, DelayTime: 1.952ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [10] 2025/04/30 09:21:39 server lost packet 7 (time threshold) 2025/04/30 09:21:39 server lost packet 9 (time threshold) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID c1857bc7 in 5s. 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 server -> Sending packet 13 (1127 bytes) for connection e21969b048f05653, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 3123b5948e1849eb31b5df3ae430d620, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 1, AckRanges: {{Largest: 11, Smallest: 10}, {Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 317.887µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6edb26e9, StatelessResetToken: 0x5e39b3ec46aed93c9d087417a46985d9} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d5993c7e, StatelessResetToken: 0xb6e7e139706f80ef5343d0cb3dfc201c} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Reading packet 1 (1200 bytes) for connection d5b6cd92, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: d5b6cd92, SrcConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 6.328ms} 2025/04/30 09:21:39 server <- Reading packet 10 (43 bytes) for connection 37a9cec4, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 37a9cec4, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 260.088ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 9 (1409 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server -> Sending packet 10 (47 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 231.052µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/2e4c7276166402d0.sqlog 2025/04/30 09:21:39 server Changing connection ID to 246078b8. 2025/04/30 09:21:39 Adding connection IDs 2e4c7276166402d0 and 246078b8 for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection 2e4c7276166402d0, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 2e4c7276166402d0, SrcConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 444, Offset + Data length: 444} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 1368d547. 2025/04/30 09:21:39 Adding connection ID c2443724. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2e4c7276166402d0 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, SrcConnectionID: 246078b8, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 964, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, SrcConnectionID: 246078b8, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c2443724, StatelessResetToken: 0xfabeed1925449d74b3c32bf5cf1e640d} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1368d547, StatelessResetToken: 0x64652c75c7c9d1f5c5eb9af6e316be3b} 2025/04/30 09:21:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 4 2025/04/30 09:21:39 server -> Sending packet 3 (200 bytes) for connection 4fe27f3c015e81f2, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, SrcConnectionID: 36f45aa2, PacketNumber: 3, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:21:39 server -> Sending packet 4 (200 bytes) for connection 4fe27f3c015e81f2, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, SrcConnectionID: 36f45aa2, PacketNumber: 4, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Amplification window limited. Received 2400 bytes, already sent out 7200 bytes 2025/04/30 09:21:39 server <- Reading packet 12 (43 bytes) for connection 6edb26e9, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6edb26e9, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [d5993c7e 6edb26e9] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection e21969b048f05653 closed. 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/f4f8751f43fbb68d.sqlog 2025/04/30 09:21:39 server Changing connection ID to 1c57c63c. 2025/04/30 09:21:39 Adding connection IDs f4f8751f43fbb68d and 1c57c63c for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection f4f8751f43fbb68d, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: f4f8751f43fbb68d, SrcConnectionID: d9e266d4be2c587788b690257e8d4ee6, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d9e266d4be2c587788b690257e8d4ee6, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID b7f83e70. 2025/04/30 09:21:39 Adding connection ID cadf937b. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f4f8751f43fbb68d 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: d9e266d4be2c587788b690257e8d4ee6, SrcConnectionID: 1c57c63c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 964, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: d9e266d4be2c587788b690257e8d4ee6, SrcConnectionID: 1c57c63c, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:21:39 server Short Header{DestConnectionID: d9e266d4be2c587788b690257e8d4ee6, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cadf937b, StatelessResetToken: 0x6187b71189b1ba03dc6965fdaa8014b0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b7f83e70, StatelessResetToken: 0x46e56210164aa09028e62243505ee339} 2025/04/30 09:21:39 server <- Reading packet 14 (43 bytes) for connection 0c195b79, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0c195b79, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 698.384ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 6 (1366 bytes) for connection 072d88b9a208c550, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: eaf063d22e5352920ab51eb377b93b8d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.PingFrame{} 2025/04/30 09:21:39 server <- Reading packet 16 (43 bytes) for connection 0c195b79, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0c195b79, PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 698.384ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server -> Sending packet 7 (49 bytes) for connection 072d88b9a208c550, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: eaf063d22e5352920ab51eb377b93b8d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 16, LowestAcked: 0, AckRanges: {{Largest: 16, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 0, Smallest: 0}}, DelayTime: 226.566µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 13 (38 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f6d5406d6bc69ecf002099d48a5c80f0, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:39 server -> Sending packet 14 (38 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f6d5406d6bc69ecf002099d48a5c80f0, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server <- Reading packet 0 (91 bytes) for connection 36f45aa2, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 36f45aa2, SrcConnectionID: 2fbc3372173805ae3459df16d6fc195c, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 9.704ms} 2025/04/30 09:21:39 server newly acked packets (1): [4] 2025/04/30 09:21:39 server updated RTT: 33.326596ms (σ: 16.663298ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID 4fe27f3c015e81f2 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 2 (315 bytes) for connection 4fe27f3c015e81f2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0ac1e30e, StatelessResetToken: 0xcc206a4b07c2c6043ab1c90f0ed13502} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d2bf1dd5, StatelessResetToken: 0x547a26b069dc228f7acc60d5d27b4ddc} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x519b5390e99114c40170e80d37eef6e3d73d0edab9ef82b572e871ec8b859e21e23631dc0da28c370c5232cc9dbb053b77dbb731288d34cdbeff19a65424b1662b7a6d9324551b5b41491f6c115d5c84a8a9b9f1c4de} 2025/04/30 09:21:39 server -> Sending packet 3 (315 bytes) for connection 4fe27f3c015e81f2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x519b5390e99114c40170e80d37eef6e3d73d0edab9ef82b572e871ec8b859e21e23631dc0da28c370c5232cc9dbb053b77dbb731288d34cdbeff19a65424b1662b7a6d9324551b5b41491f6c115d5c84a8a9b9f1c4de} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d2bf1dd5, StatelessResetToken: 0x547a26b069dc228f7acc60d5d27b4ddc} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0ac1e30e, StatelessResetToken: 0xcc206a4b07c2c6043ab1c90f0ed13502} 2025/04/30 09:21:39 server <- Reading packet 0 (45 bytes) for connection 36f45aa2, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 36f45aa2, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server -> Sending packet 4 (43 bytes) for connection 4fe27f3c015e81f2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 98.124µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 Received request: GET /jwhiseezbm 2025/04/30 09:21:39 server -> Sending packet 5 (1061 bytes) for connection 4fe27f3c015e81f2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 2fbc3372173805ae3459df16d6fc195c, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Queueing packet (43 bytes) for later decryption 2025/04/30 09:21:39 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 1 (1280 bytes) for connection f4f8751f43fbb68d, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: d9e266d4be2c587788b690257e8d4ee6, SrcConnectionID: 1c57c63c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server -> Sending packet 2 (1280 bytes) for connection f4f8751f43fbb68d, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: d9e266d4be2c587788b690257e8d4ee6, SrcConnectionID: 1c57c63c, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 4 (267 bytes) for connection d8cc1a7f0a1a9204, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: c665551c03a28d17ac248f51ac336ada, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xf0f542e5742e814dd61855237e10c45a19a27083e9143977745c80d3969f3c3d47181fa8636310699002ea1aec16e61c6ffc5b48cd15dbe7089d421252d44201bc6ae55cf791eee4e2178c4a062c76915930ae1c620a} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> Sending packet 5 (267 bytes) for connection d8cc1a7f0a1a9204, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: c665551c03a28d17ac248f51ac336ada, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xf0f542e5742e814dd61855237e10c45a19a27083e9143977745c80d3969f3c3d47181fa8636310699002ea1aec16e61c6ffc5b48cd15dbe7089d421252d44201bc6ae55cf791eee4e2178c4a062c76915930ae1c620a} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server <- Reading packet 17 (162 bytes) for connection 0c195b79, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0c195b79, PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 896µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [6] 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: e8faf6f96df1d1c503ba2d8c5d973708, StatelessResetToken: 0xd7fd91852ad52ac7ef437b1eaa10be9f} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 0e482c578cdbf3eba9e248ca06e45e9a, StatelessResetToken: 0x5d8fd14e709da4d561e0fffd37c6a0d6} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: bdc776e91dfa23f9eaa16263d1cc1f51, StatelessResetToken: 0x242adc58ffc0467c4f732aca52066cfc} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 server -> Sending packet 8 (51 bytes) for connection 072d88b9a208c550, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: e8faf6f96df1d1c503ba2d8c5d973708, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 0, AckRanges: {{Largest: 17, Smallest: 16}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 0, Smallest: 0}}, DelayTime: 296.136µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Received request: GET /pnnsswudsh 2025/04/30 09:21:39 server -> Sending packet 9 (1061 bytes) for connection 072d88b9a208c550, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: e8faf6f96df1d1c503ba2d8c5d973708, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 3 (83 bytes) for connection 706f1af477cbdccc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0cb3e0bd, StatelessResetToken: 0x9b1c3ecf6e2fd6022330c66057f045d4} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3a434476, StatelessResetToken: 0x08aee0b362e51adf531830e493dea33d} 2025/04/30 09:21:39 server Skipping packet number 2 2025/04/30 09:21:39 server -> Sending packet 4 (267 bytes) for connection 706f1af477cbdccc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xe5529d7e097aa1f228ea36f1b969c9f55a26bebcd4cdc4084c11075b8357a0990b84fef7497711470e111f337fc4aacff25636a6f822f9220b6bdcd07beb7350d9bc7135800e79b1be76972996b79a0388dea550b25a} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server <- Reading packet 17 (43 bytes) for connection e13811a6, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: e13811a6, PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 7, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}}, DelayTime: 79.32ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [9] 2025/04/30 09:21:39 server updated RTT: 63.063ms (σ: 29.189ms) 2025/04/30 09:21:39 server lost packet 8 (time threshold) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 10 (56 bytes) for connection ef1be9349c65b9e1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8dd61ac8e677ca68a9cee23fe8df1f3a, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 2, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 12, Smallest: 11}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 181.149µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 1 (1280 bytes) for connection ae51fd6706fb517e, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: f343a550fe595e5fac2810c501cfde19, SrcConnectionID: e256d62e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server -> Sending packet 2 (1280 bytes) for connection ae51fd6706fb517e, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: f343a550fe595e5fac2810c501cfde19, SrcConnectionID: e256d62e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 1: 65 bytes. Remaining: 43 bytes. 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server <- Reading packet 1 (43 bytes) for connection 36f45aa2, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 36f45aa2, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [36f45aa2 d2bf1dd5 0ac1e30e] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection 4fe27f3c015e81f2 closed. 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/be73781a35aac5b5.sqlog 2025/04/30 09:21:39 server Changing connection ID to 3876ec90. 2025/04/30 09:21:39 Adding connection IDs be73781a35aac5b5 and 3876ec90 for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection be73781a35aac5b5, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: be73781a35aac5b5, SrcConnectionID: a833e9ec4e8b5c09323a48c18c6529e9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a833e9ec4e8b5c09323a48c18c6529e9, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 35369e4e. 2025/04/30 09:21:39 Adding connection ID b7d0bdae. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection be73781a35aac5b5 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: a833e9ec4e8b5c09323a48c18c6529e9, SrcConnectionID: 3876ec90, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 417, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: a833e9ec4e8b5c09323a48c18c6529e9, SrcConnectionID: 3876ec90, PacketNumber: 0, PacketNumberLen: 2, Length: 721, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 699, Offset + Data length: 699} 2025/04/30 09:21:39 server Short Header{DestConnectionID: a833e9ec4e8b5c09323a48c18c6529e9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 35369e4e, StatelessResetToken: 0x29aaf6d320db073d0884fbac3b6a257f} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b7d0bdae, StatelessResetToken: 0xb71e6b26bb80e951db9c81755b968967} 2025/04/30 09:21:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server -> Sending packet 1 (200 bytes) for connection f8ba55f2236adf42, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 14b9e9ab44c62598c575a7b077804170, SrcConnectionID: 5fdbe6dd, PacketNumber: 1, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:21:39 server -> Sending packet 2 (200 bytes) for connection f8ba55f2236adf42, Handshake 2025/04/30 09:21:39 server -> Sending packet 1 (203 bytes) for connection f4f8751f43fbb68d, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: d9e266d4be2c587788b690257e8d4ee6, SrcConnectionID: 1c57c63c, PacketNumber: 1, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server Amplification window limited. Received 1288 bytes, already sent out 4043 bytes 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 14b9e9ab44c62598c575a7b077804170, SrcConnectionID: 5fdbe6dd, PacketNumber: 2, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:21:39 server <- Reading packet 18 (43 bytes) for connection 0c195b79, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0c195b79, PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [0c195b79 637c4cd2] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection 072d88b9a208c550 closed. 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/e634ede3f0e52346.sqlog 2025/04/30 09:21:39 server Changing connection ID to 6f72c96a. 2025/04/30 09:21:39 Adding connection IDs e634ede3f0e52346 and 6f72c96a for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection e634ede3f0e52346, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: e634ede3f0e52346, SrcConnectionID: 8f28759a2991c35437e538c0619f1e23, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 8f28759a2991c35437e538c0619f1e23, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 199d873a. 2025/04/30 09:21:39 Adding connection ID b9a85536. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e634ede3f0e52346 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 8f28759a2991c35437e538c0619f1e23, SrcConnectionID: 6f72c96a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 959, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 8f28759a2991c35437e538c0619f1e23, SrcConnectionID: 6f72c96a, PacketNumber: 0, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8f28759a2991c35437e538c0619f1e23, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: b9a85536, StatelessResetToken: 0x071529ac595a09a6bf687f1bb5932563} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 199d873a, StatelessResetToken: 0x0d3377bfe38cccb8cf7c0c0cdbbbbca4} 2025/04/30 09:21:39 server <- Reading packet 2 (43 bytes) for connection 3a434476, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 3a434476, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 568µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [3] 2025/04/30 09:21:39 server updated RTT: 36.466ms (σ: 15.046ms) 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server <- Reading packet 18 (43 bytes) for connection e13811a6, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: e13811a6, PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:39 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:39 Replacing connection for connection IDs [284e3e59 e13811a6] with a closed connection. 2025/04/30 09:21:39 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:39 server Connection ef1be9349c65b9e1 closed. 2025/04/30 09:21:39 server <- Reading packet 1 (1200 bytes) for connection e256d62e, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: e256d62e, SrcConnectionID: f343a550fe595e5fac2810c501cfde19, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 8.16ms} 2025/04/30 09:21:39 server newly acked packets (1): [2] 2025/04/30 09:21:39 server updated RTT: 35.478362ms (σ: 17.739181ms) 2025/04/30 09:21:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 1 (212 bytes) for connection ae51fd6706fb517e, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: f343a550fe595e5fac2810c501cfde19, SrcConnectionID: e256d62e, PacketNumber: 1, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 09:21:39 server -> Sending packet 2 (212 bytes) for connection ae51fd6706fb517e, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: f343a550fe595e5fac2810c501cfde19, SrcConnectionID: e256d62e, PacketNumber: 2, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:39 server <- Reading packet 1 (66 bytes) for connection 35369e4e, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 35369e4e, SrcConnectionID: a833e9ec4e8b5c09323a48c18c6529e9, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.952ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 35.695105ms (σ: 17.847552ms) 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:39 server <- Reading packet 0 (1134 bytes) for connection 35369e4e, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 35369e4e, SrcConnectionID: a833e9ec4e8b5c09323a48c18c6529e9, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.952ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 35.695ms (σ: 13.385ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID be73781a35aac5b5 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server -> Sending packet 1 (267 bytes) for connection be73781a35aac5b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: a833e9ec4e8b5c09323a48c18c6529e9, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0x5b1f67729b507cff874d42a0ca35c4b040d19b119be996e4407147abeff2195a632c5f595c261e2c467a0c81a319d0d100ec5393c74b658279cd3ad520deeffcc0ab146558ed0ef2d07254ecc273b826ce1f18dff515} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server <- Reading packet 0 (43 bytes) for connection 35369e4e, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 35369e4e, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.992ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 35.739ms (σ: 10.127ms) 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID 3876ec90 in 5s. 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server <- Reading packet 1 (45 bytes) for connection 35369e4e, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 35369e4e, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server -> Sending packet 2 (43 bytes) for connection be73781a35aac5b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: a833e9ec4e8b5c09323a48c18c6529e9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 253.351µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 Received request: GET /ubruefsjlt 2025/04/30 09:21:39 server -> Sending packet 3 (1061 bytes) for connection be73781a35aac5b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: a833e9ec4e8b5c09323a48c18c6529e9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:39 server <- Reading packet 1 (66 bytes) for connection b9a85536, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: b9a85536, SrcConnectionID: 8f28759a2991c35437e538c0619f1e23, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.72ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 36.53443ms (σ: 18.267215ms) 2025/04/30 09:21:39 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:39 server <- Reading packet 0 (1134 bytes) for connection b9a85536, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: b9a85536, SrcConnectionID: 8f28759a2991c35437e538c0619f1e23, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.72ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 36.534ms (σ: 13.7ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID e634ede3f0e52346 in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server <- Reading packet 0 (43 bytes) for connection b9a85536, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: b9a85536, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.584ms} 2025/04/30 09:21:39 server newly acked packets (1): [0] 2025/04/30 09:21:39 server updated RTT: 36.535ms (σ: 10.278ms) 2025/04/30 09:21:39 server Canceling loss detection timer. 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID 6f72c96a in 5s. 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server -> Sending packet 1 (275 bytes) for connection e634ede3f0e52346, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8f28759a2991c35437e538c0619f1e23, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 466.582µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xb83c4f2c2fd0c21b68b0918e4f81626eef1722c9f43dbd15fabde25b32b3ee64c5945029e51482640f2cffb3914cddd23d5061870e15669a67350829c0c2b97dffa29051b04ecabea5899cd676b41676f9fab224138d} 2025/04/30 09:21:39 server <- Reading packet 1 (45 bytes) for connection b9a85536, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: b9a85536, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 Received request: GET /gkeozifohm 2025/04/30 09:21:39 server -> Sending packet 2 (1070 bytes) for connection e634ede3f0e52346, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 8f28759a2991c35437e538c0619f1e23, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 574.256µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:39 server -> Sending packet 1 (203 bytes) for connection a69cb6ec2a8d1a00, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, SrcConnectionID: d5b6cd92, PacketNumber: 1, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:21:39 server -> Sending packet 2 (203 bytes) for connection a69cb6ec2a8d1a00, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, SrcConnectionID: d5b6cd92, PacketNumber: 2, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:21:39 server <- Reading packet 12 (43 bytes) for connection 6d9b0862, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6d9b0862, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 3, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 92.864ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 15 (47 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f6d5406d6bc69ecf002099d48a5c80f0, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 9, Smallest: 7}, {Largest: 3, Smallest: 2}}, DelayTime: 113.692µs, ECT0: 5, ECT1: 0, CE: 1} 2025/04/30 09:21:39 server <- Reading packet 14 (43 bytes) for connection 6d9b0862, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 6d9b0862, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 3, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 3}}, DelayTime: 92.864ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server <- &wire.PingFrame{} 2025/04/30 09:21:39 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:39 server -> Sending packet 16 (49 bytes) for connection 09aff03dcb509c02, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: f6d5406d6bc69ecf002099d48a5c80f0, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 2, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 9, Smallest: 7}, {Largest: 3, Smallest: 2}}, DelayTime: 179.326µs, ECT0: 6, ECT1: 0, CE: 1} 2025/04/30 09:21:39 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:39 server <- Reading packet 2 (139 bytes) for connection 35369e4e, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 35369e4e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 664µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [1] 2025/04/30 09:21:39 server updated RTT: 35.304ms (σ: 8.464ms) 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 56ae38e5b82019c53785bcf904691c22, StatelessResetToken: 0xa6b74e6d53f04b5edc0dde0013e55303} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 5d43fd59c9cf70b0a675121c19937997, StatelessResetToken: 0x16c398723bc1de6637413741dac2ce7c} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 513c875a5ff0364a94cd6ba80b0c2089, StatelessResetToken: 0x0015e0ee58ea31b2819dcf56299c7e5c} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 server -> Sending packet 4 (45 bytes) for connection be73781a35aac5b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 56ae38e5b82019c53785bcf904691c22, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 217.567µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 server <- Reading packet 3 (43 bytes) for connection 35369e4e, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: 35369e4e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 304µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [3] 2025/04/30 09:21:39 server updated RTT: 34.985ms (σ: 6.984ms) 2025/04/30 09:21:39 server -> Sending packet 5 (38 bytes) for connection be73781a35aac5b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 56ae38e5b82019c53785bcf904691c22, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:39 server <- Reading packet 2 (93 bytes) for connection cadf937b, Handshake 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: cadf937b, SrcConnectionID: d9e266d4be2c587788b690257e8d4ee6, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:39 server Dropping Initial keys. 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 833.008ms} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:39 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 Retiring connection ID f4f8751f43fbb68d in 5s. 2025/04/30 09:21:39 server Dropping Handshake keys. 2025/04/30 09:21:39 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:39 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:39 server -> Sending packet 2 (315 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d9e266d4be2c587788b690257e8d4ee6, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cadf937b, StatelessResetToken: 0x6187b71189b1ba03dc6965fdaa8014b0} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b7f83e70, StatelessResetToken: 0x46e56210164aa09028e62243505ee339} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xddc0d43dffd7fde18e028c64bbda95f91a3caa2bec991c93958c7adabdede0f7ad898b317af158674b19d6f436cd12bd20b54526e3e12c392a89fd55a0cc11d64a2408ca1325c471604962f67e25576190e28b519fc3} 2025/04/30 09:21:39 server -> Sending packet 3 (315 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d9e266d4be2c587788b690257e8d4ee6, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewTokenFrame{Token: 0xddc0d43dffd7fde18e028c64bbda95f91a3caa2bec991c93958c7adabdede0f7ad898b317af158674b19d6f436cd12bd20b54526e3e12c392a89fd55a0cc11d64a2408ca1325c471604962f67e25576190e28b519fc3} 2025/04/30 09:21:39 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b7f83e70, StatelessResetToken: 0x46e56210164aa09028e62243505ee339} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: cadf937b, StatelessResetToken: 0x6187b71189b1ba03dc6965fdaa8014b0} 2025/04/30 09:21:39 server <- Reading packet 0 (43 bytes) for connection cadf937b, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: cadf937b, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.864ms} 2025/04/30 09:21:39 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:39 Retiring connection ID 1c57c63c in 5s. 2025/04/30 09:21:39 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:39 server <- Reading packet 1 (45 bytes) for connection cadf937b, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: cadf937b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:39 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:39 server -> Sending packet 4 (44 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d9e266d4be2c587788b690257e8d4ee6, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 101.98072ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:39 Received request: GET /qyfrjxvfyo 2025/04/30 09:21:39 server -> Sending packet 5 (1061 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: d9e266d4be2c587788b690257e8d4ee6, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:39 server <- Received Initial packet. 2025/04/30 09:21:39 Created qlog file: /logs/qlog/71d4e99004edffad.sqlog 2025/04/30 09:21:39 server Changing connection ID to 42e40f3b. 2025/04/30 09:21:39 Adding connection IDs 71d4e99004edffad and 42e40f3b for a new connection. 2025/04/30 09:21:39 server <- Reading packet 0 (1200 bytes) for connection 71d4e99004edffad, Initial 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: 71d4e99004edffad, SrcConnectionID: d3278fca979f6318ee010d87c8b2a5e4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:39 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:39 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:39 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d3278fca979f6318ee010d87c8b2a5e4, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:39 Adding connection ID 082a0207. 2025/04/30 09:21:39 Adding connection ID 8d679426. 2025/04/30 09:21:39 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 71d4e99004edffad 2025/04/30 09:21:39 server Long Header{Type: Initial, DestConnectionID: d3278fca979f6318ee010d87c8b2a5e4, SrcConnectionID: 42e40f3b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 963, Version: v1} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:39 server Long Header{Type: Handshake, DestConnectionID: d3278fca979f6318ee010d87c8b2a5e4, SrcConnectionID: 42e40f3b, PacketNumber: 0, PacketNumberLen: 2, Length: 175, Version: v1} 2025/04/30 09:21:39 server -> &wire.CryptoFrame{Offset: 0, Data length: 153, Offset + Data length: 153} 2025/04/30 09:21:39 server Short Header{DestConnectionID: d3278fca979f6318ee010d87c8b2a5e4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8d679426, StatelessResetToken: 0x83df3647303e706c58610e69538004ff} 2025/04/30 09:21:39 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 082a0207, StatelessResetToken: 0x96c04a98dd35c1211858aaaa30798928} 2025/04/30 09:21:39 server <- Reading packet 2 (139 bytes) for connection b9a85536, 1-RTT 2025/04/30 09:21:39 server Short Header{DestConnectionID: b9a85536, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:39 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.064ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server newly acked packets (1): [1] 2025/04/30 09:21:39 server updated RTT: 36.074ms (σ: 8.629ms) 2025/04/30 09:21:39 server ECN capability confirmed. 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 0f8efe61e29980cf8e87be5d28f36f26, StatelessResetToken: 0x0fe32a93cceb42c6a7e40a16a1d7324b} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: ce13bc55a25f9841e78ad7c1de39e30c, StatelessResetToken: 0x64de88975ec46651233dd3dc0e090394} 2025/04/30 09:21:39 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 4f936d50145017916ed92338cfe27050, StatelessResetToken: 0xaea797bda89eb512c808e344580c7e22} 2025/04/30 09:21:39 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:39 server Ignoring all packets below 1. 2025/04/30 09:21:39 server -> Sending packet 3 (45 bytes) for connection e634ede3f0e52346, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:39 server Short Header{DestConnectionID: 0f8efe61e29980cf8e87be5d28f36f26, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:39 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 191.147µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:39 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:21:40 server -> Sending packet 14 (1061 bytes) for connection e2501aed128fb288, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server -> Sending packet 15 (1061 bytes) for connection e2501aed128fb288, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: d3ec576711dac1dfcea745fa45fa0cc2, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server <- Reading packet 15 (43 bytes) for connection 6d9b0862, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 6d9b0862, PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:40 Replacing connection for connection IDs [d53315bb 6d9b0862] with a closed connection. 2025/04/30 09:21:40 server Connection 09aff03dcb509c02 closed. 2025/04/30 09:21:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:40 server <- Reading packet 4 (43 bytes) for connection 35369e4e, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 35369e4e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:40 Replacing connection for connection IDs [35369e4e b7d0bdae] with a closed connection. 2025/04/30 09:21:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:40 server Connection be73781a35aac5b5 closed. 2025/04/30 09:21:40 server <- Reading packet 2 (141 bytes) for connection cadf937b, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: cadf937b, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 784µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: f7604421eb4fcd8647a499e68a9250f3, StatelessResetToken: 0x5bd93bac9771cbbebec4e01823162568} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: ac2e9a26a2f24a91a3cfa29337bf87df, StatelessResetToken: 0x9ef930c8fbc9caee1b5c40fbd64bcfa6} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: a327ed47bc6e34e45545743dfd6991c2, StatelessResetToken: 0x1650b3853da8760d84d8ce142f70a498} 2025/04/30 09:21:40 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:40 server -> Sending packet 6 (45 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 133.399µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 server <- Reading packet 3 (43 bytes) for connection cadf937b, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: cadf937b, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 464µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (2): [3 5] 2025/04/30 09:21:40 server updated RTT: 32.907159ms (σ: 16.453579ms) 2025/04/30 09:21:40 server ECN capability confirmed. 2025/04/30 09:21:40 server -> Sending packet 7 (38 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 6 (267 bytes) for connection 706f1af477cbdccc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0xe5529d7e097aa1f228ea36f1b969c9f55a26bebcd4cdc4084c11075b8357a0990b84fef7497711470e111f337fc4aacff25636a6f822f9220b6bdcd07beb7350d9bc7135800e79b1be76972996b79a0388dea550b25a} 2025/04/30 09:21:40 server -> Sending packet 7 (267 bytes) for connection 706f1af477cbdccc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0xe5529d7e097aa1f228ea36f1b969c9f55a26bebcd4cdc4084c11075b8357a0990b84fef7497711470e111f337fc4aacff25636a6f822f9220b6bdcd07beb7350d9bc7135800e79b1be76972996b79a0388dea550b25a} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server -> Sending packet 8 (1366 bytes) for connection 706f1af477cbdccc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.PingFrame{} 2025/04/30 09:21:40 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:40 server <- Reading packet 1 (66 bytes) for connection 8d679426, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 8d679426, SrcConnectionID: d3278fca979f6318ee010d87c8b2a5e4, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.576ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 35.742794ms (σ: 17.871397ms) 2025/04/30 09:21:40 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:40 server <- Reading packet 0 (1134 bytes) for connection 8d679426, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 8d679426, SrcConnectionID: d3278fca979f6318ee010d87c8b2a5e4, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:40 server Dropping Initial keys. 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.576ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 35.742ms (σ: 13.403ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 Retiring connection ID 71d4e99004edffad in 5s. 2025/04/30 09:21:40 server Dropping Handshake keys. 2025/04/30 09:21:40 server <- Reading packet 0 (43 bytes) for connection 8d679426, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8d679426, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.944ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 35.743ms (σ: 10.055ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 Retiring connection ID 42e40f3b in 5s. 2025/04/30 09:21:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:40 server -> Sending packet 1 (275 bytes) for connection 71d4e99004edffad, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: d3278fca979f6318ee010d87c8b2a5e4, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 498.251µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0x0c19def5df777595c9bf33e162aff00158f89b447f0add959978c53b13ae4b5c2fa84afb0a7040dcd1d823dee2ec5ca15ad4dd44bb5b0b604e8802a73b7f346d402576d7fe2a082485853fc2cb2cf5d74d4b3a334939} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 1 (1280 bytes) for connection 2e4c7276166402d0, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, SrcConnectionID: 246078b8, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server -> Sending packet 2 (1280 bytes) for connection 2e4c7276166402d0, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, SrcConnectionID: 246078b8, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:40 server <- Reading packet 3 (43 bytes) for connection b9a85536, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: b9a85536, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 24.848ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [3] 2025/04/30 09:21:40 server updated RTT: 38.61ms (σ: 11.544ms) 2025/04/30 09:21:40 server lost packet 2 (time threshold) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server Ignoring all packets below 3. 2025/04/30 09:21:40 server -> Sending packet 4 (1061 bytes) for connection e634ede3f0e52346, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 0f8efe61e29980cf8e87be5d28f36f26, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server <- Reading packet 6 (43 bytes) for connection 8bd59e7a, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8bd59e7a, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 133.64ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:40 server -> Sending packet 6 (1366 bytes) for connection d8cc1a7f0a1a9204, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: c665551c03a28d17ac248f51ac336ada, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.PingFrame{} 2025/04/30 09:21:40 server -> Sending packet 7 (45 bytes) for connection d8cc1a7f0a1a9204, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: c665551c03a28d17ac248f51ac336ada, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 162.954µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- Reading packet 1 (1200 bytes) for connection 246078b8, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 246078b8, SrcConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 9.088ms} 2025/04/30 09:21:40 server newly acked packets (1): [2] 2025/04/30 09:21:40 server updated RTT: 36.659349ms (σ: 18.329674ms) 2025/04/30 09:21:40 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 1 (203 bytes) for connection 2e4c7276166402d0, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, SrcConnectionID: 246078b8, PacketNumber: 1, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:21:40 server -> Sending packet 2 (203 bytes) for connection 2e4c7276166402d0, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, SrcConnectionID: 246078b8, PacketNumber: 2, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:21:40 server <- Reading packet 8 (43 bytes) for connection 3a434476, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 3a434476, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 12.84ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:40 server -> Sending packet 9 (45 bytes) for connection 706f1af477cbdccc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 045ba8b851072955cbdf669c3fcf441a, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 2, Smallest: 2}}, DelayTime: 80.21µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- Reading packet 4 (43 bytes) for connection b9a85536, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: b9a85536, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:40 Replacing connection for connection IDs [199d873a b9a85536] with a closed connection. 2025/04/30 09:21:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:40 server Connection e634ede3f0e52346 closed. 2025/04/30 09:21:40 server <- Reading packet 7 (43 bytes) for connection 8bd59e7a, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8bd59e7a, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 528µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [6] 2025/04/30 09:21:40 server updated RTT: 36.497ms (σ: 8.793ms) 2025/04/30 09:21:40 server ECN capability confirmed. 2025/04/30 09:21:40 server lost packet 5 (time threshold) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server -> Sending packet 8 (267 bytes) for connection d8cc1a7f0a1a9204, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: c665551c03a28d17ac248f51ac336ada, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0xf0f542e5742e814dd61855237e10c45a19a27083e9143977745c80d3969f3c3d47181fa8636310699002ea1aec16e61c6ffc5b48cd15dbe7089d421252d44201bc6ae55cf791eee4e2178c4a062c76915930ae1c620a} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:40 server <- Reading packet 9 (164 bytes) for connection 3a434476, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 3a434476, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 9, DelayTime: 592µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 7aad6b93f78a9c461ccbe7b2fb570e98, StatelessResetToken: 0x5be81fc10047a1c99e0fc8a5cf7b4f2c} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 205f4b161b9072986f05fc7f41acc4ff, StatelessResetToken: 0x0519bdc54736b5c52cf597e7c3c3834e} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: dd95f005f6bd8dd6dbcbd129568630f3, StatelessResetToken: 0x805cac172fb2a319eae88a1ade39769f} 2025/04/30 09:21:40 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 Retiring connection ID 27df7594 in 5s. 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:40 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:40 server -> Sending packet 10 (47 bytes) for connection 706f1af477cbdccc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 7aad6b93f78a9c461ccbe7b2fb570e98, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 2, Smallest: 2}}, DelayTime: 269.882µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 Received request: GET /nsklnnqcjp 2025/04/30 09:21:40 server -> Sending packet 11 (1061 bytes) for connection 706f1af477cbdccc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 7aad6b93f78a9c461ccbe7b2fb570e98, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server <- Reading packet 8 (43 bytes) for connection 8bd59e7a, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8bd59e7a, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 536µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [8] 2025/04/30 09:21:40 server updated RTT: 36.001ms (σ: 7.585ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 3 (267 bytes) for connection 71d4e99004edffad, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: d3278fca979f6318ee010d87c8b2a5e4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0x0c19def5df777595c9bf33e162aff00158f89b447f0add959978c53b13ae4b5c2fa84afb0a7040dcd1d823dee2ec5ca15ad4dd44bb5b0b604e8802a73b7f346d402576d7fe2a082485853fc2cb2cf5d74d4b3a334939} 2025/04/30 09:21:40 server -> Sending packet 4 (267 bytes) for connection 71d4e99004edffad, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: d3278fca979f6318ee010d87c8b2a5e4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0x0c19def5df777595c9bf33e162aff00158f89b447f0add959978c53b13ae4b5c2fa84afb0a7040dcd1d823dee2ec5ca15ad4dd44bb5b0b604e8802a73b7f346d402576d7fe2a082485853fc2cb2cf5d74d4b3a334939} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server <- Reading packet 10 (43 bytes) for connection 3a434476, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 3a434476, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:40 Replacing connection for connection IDs [3a434476 0cb3e0bd] with a closed connection. 2025/04/30 09:21:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:40 server Connection 706f1af477cbdccc closed. 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 9 (37 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 server Skipping packet number 8 2025/04/30 09:21:40 server -> Sending packet 10 (38 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:40 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:40 server -> Sending packet 3 (212 bytes) for connection ae51fd6706fb517e, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: f343a550fe595e5fac2810c501cfde19, SrcConnectionID: e256d62e, PacketNumber: 3, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 09:21:40 server -> Sending packet 4 (212 bytes) for connection ae51fd6706fb517e, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: f343a550fe595e5fac2810c501cfde19, SrcConnectionID: e256d62e, PacketNumber: 4, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 09:21:40 server <- Reading packet 4 (43 bytes) for connection 6a57bb87, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 6a57bb87, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:40 Replacing connection for connection IDs [f3fd5f99 6a57bb87] with a closed connection. 2025/04/30 09:21:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:40 server Connection e2501aed128fb288 closed. 2025/04/30 09:21:40 server <- Reading packet 5 (43 bytes) for connection 8d679426, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8d679426, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 27.408ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [4] 2025/04/30 09:21:40 server updated RTT: 38.783ms (σ: 13.621ms) 2025/04/30 09:21:40 server ECN capability confirmed. 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:40 server -> Sending packet 5 (45 bytes) for connection 71d4e99004edffad, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: d3278fca979f6318ee010d87c8b2a5e4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 164.757µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- Received Initial packet. 2025/04/30 09:21:40 Created qlog file: /logs/qlog/7d80f5e188046738.sqlog 2025/04/30 09:21:40 server Changing connection ID to fe10060e. 2025/04/30 09:21:40 Adding connection IDs 7d80f5e188046738 and fe10060e for a new connection. 2025/04/30 09:21:40 server <- Reading packet 2 (1200 bytes) for connection 7d80f5e188046738, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 7d80f5e188046738, SrcConnectionID: 341832630cd2801b40977b639c87ef90, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 444, Offset + Data length: 444} 2025/04/30 09:21:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 341832630cd2801b40977b639c87ef90, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:40 Adding connection ID 181216ef. 2025/04/30 09:21:40 Adding connection ID e36c2440. 2025/04/30 09:21:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7d80f5e188046738 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 341832630cd2801b40977b639c87ef90, SrcConnectionID: fe10060e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 959, Version: v1} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 341832630cd2801b40977b639c87ef90, SrcConnectionID: fe10060e, PacketNumber: 0, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 157, Offset + Data length: 157} 2025/04/30 09:21:40 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 181216ef, StatelessResetToken: 0x31edee3897af992952095e758d369577} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e36c2440, StatelessResetToken: 0xad1683afd83af38cdcb8355c43dc31e8} 2025/04/30 09:21:40 server <- Reading packet 4 (1200 bytes) for connection 7d80f5e188046738, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 7d80f5e188046738, SrcConnectionID: 341832630cd2801b40977b639c87ef90, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 444, Offset + Data length: 444} 2025/04/30 09:21:40 server -> Sending packet 1 (58 bytes) for connection 7d80f5e188046738, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 341832630cd2801b40977b639c87ef90, SrcConnectionID: fe10060e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server Queueing packet (43 bytes) for later decryption 2025/04/30 09:21:40 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:40 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:40 server -> Sending packet 3 (203 bytes) for connection 2e4c7276166402d0, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, SrcConnectionID: 246078b8, PacketNumber: 3, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:21:40 server -> Sending packet 4 (203 bytes) for connection 2e4c7276166402d0, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, SrcConnectionID: 246078b8, PacketNumber: 4, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:21:40 server <- Received Initial packet. 2025/04/30 09:21:40 Created qlog file: /logs/qlog/cb073c71c2cf2037.sqlog 2025/04/30 09:21:40 server Changing connection ID to 9491f379. 2025/04/30 09:21:40 Adding connection IDs cb073c71c2cf2037 and 9491f379 for a new connection. 2025/04/30 09:21:40 server <- Reading packet 4 (1200 bytes) for connection cb073c71c2cf2037, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: cb073c71c2cf2037, SrcConnectionID: 77b2ed8abeed15637cc881b85331e3cc, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 77b2ed8abeed15637cc881b85331e3cc, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:40 Adding connection ID 77cf5696. 2025/04/30 09:21:40 Adding connection ID 5d3229a4. 2025/04/30 09:21:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection cb073c71c2cf2037 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 77b2ed8abeed15637cc881b85331e3cc, SrcConnectionID: 9491f379, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 960, Version: v1} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 77b2ed8abeed15637cc881b85331e3cc, SrcConnectionID: 9491f379, PacketNumber: 0, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 09:21:40 server Short Header{DestConnectionID: 77b2ed8abeed15637cc881b85331e3cc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 77cf5696, StatelessResetToken: 0x6298d54f24863755fa15475e32f267ec} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 5d3229a4, StatelessResetToken: 0x6607723631de55038027c593a5d37175} 2025/04/30 09:21:40 server <- Reading packet 10 (43 bytes) for connection 8bd59e7a, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8bd59e7a, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 201.28ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:40 server <- Reading packet 12 (43 bytes) for connection 8bd59e7a, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8bd59e7a, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 201.28ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server -> Sending packet 9 (1409 bytes) for connection d8cc1a7f0a1a9204, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: c665551c03a28d17ac248f51ac336ada, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.PingFrame{} 2025/04/30 09:21:40 server -> Sending packet 10 (49 bytes) for connection d8cc1a7f0a1a9204, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: c665551c03a28d17ac248f51ac336ada, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 231.913µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- Reading packet 1 (65 bytes) for connection 246078b8, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 246078b8, SrcConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:40 server Dropping Initial keys. 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 2.48ms} 2025/04/30 09:21:40 server newly acked packets (1): [4] 2025/04/30 09:21:40 server updated RTT: 36.103ms (σ: 14.858ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- Received Initial packet. 2025/04/30 09:21:40 Created qlog file: /logs/qlog/359af0026eea2e16.sqlog 2025/04/30 09:21:40 server Changing connection ID to 42ab6cc2. 2025/04/30 09:21:40 Adding connection IDs 359af0026eea2e16 and 42ab6cc2 for a new connection. 2025/04/30 09:21:40 server <- Reading packet 4 (1200 bytes) for connection 359af0026eea2e16, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 359af0026eea2e16, SrcConnectionID: 115cd486102b7a406eaff44bfa46c4a7, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 115cd486102b7a406eaff44bfa46c4a7, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:40 Adding connection ID bf2bdcf7. 2025/04/30 09:21:40 Adding connection ID 82b5f32a. 2025/04/30 09:21:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 359af0026eea2e16 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, SrcConnectionID: 42ab6cc2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 958, Version: v1} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, SrcConnectionID: 42ab6cc2, PacketNumber: 0, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 09:21:40 server Short Header{DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 82b5f32a, StatelessResetToken: 0xf5d672706de33a2ea48226878e38ec14} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bf2bdcf7, StatelessResetToken: 0x22144d8cb9c952669a10ab5918d41821} 2025/04/30 09:21:40 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:40 server <- Reading packet 5 (66 bytes) for connection 77cf5696, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 77cf5696, SrcConnectionID: 77b2ed8abeed15637cc881b85331e3cc, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 17.584ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 37.024102ms (σ: 18.512051ms) 2025/04/30 09:21:40 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:40 server <- Reading packet 0 (1134 bytes) for connection 77cf5696, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 77cf5696, SrcConnectionID: 77b2ed8abeed15637cc881b85331e3cc, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:40 server Dropping Initial keys. 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 17.584ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 37.024ms (σ: 13.884ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 Retiring connection ID cb073c71c2cf2037 in 5s. 2025/04/30 09:21:40 server Dropping Handshake keys. 2025/04/30 09:21:40 server <- Reading packet 12 (43 bytes) for connection 37a9cec4, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 37a9cec4, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 784.432ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- Reading packet 0 (43 bytes) for connection 77cf5696, 1-RTT 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server Short Header{DestConnectionID: 77cf5696, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.192ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 37.027ms (σ: 10.42ms) 2025/04/30 09:21:40 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:40 server <- Reading packet 14 (43 bytes) for connection 37a9cec4, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 37a9cec4, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 784.432ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server -> Sending packet 11 (51 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 0, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 180.057µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 Retiring connection ID 9491f379 in 5s. 2025/04/30 09:21:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:40 server -> Sending packet 1 (276 bytes) for connection cb073c71c2cf2037, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 77b2ed8abeed15637cc881b85331e3cc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 604.935µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0x582fe5613c9dd7407351a3ec58434900a622292cbed858cba8e19f091bf20ec5f4802711473cdbfc807848d3d241feea47f8982d39941205af985133fd68aa749fd14c7954618394b297e96aa365c4f498b8cfd7b97d} 2025/04/30 09:21:40 server <- Reading packet 1 (45 bytes) for connection 77cf5696, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 77cf5696, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:40 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:40 Received request: GET /kmjqwopqlf 2025/04/30 09:21:40 server -> Sending packet 2 (1070 bytes) for connection cb073c71c2cf2037, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 77b2ed8abeed15637cc881b85331e3cc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 569.144µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server <- Reading packet 13 (162 bytes) for connection 8bd59e7a, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8bd59e7a, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 9, DelayTime: 960µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [9] 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 6e80f86af537838e66cf3def6f35f122, StatelessResetToken: 0x58ac7e1492adeb22211508219de0c001} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 5c261fe6046783e1bf5eee25948a6afa, StatelessResetToken: 0x2747ff192eaa44f0a4be9676c8fdec65} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 11b14badf562e156e102e274c8b33a67, StatelessResetToken: 0x900b4792e1af86fa954b9756bd4a4d9a} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:40 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:40 server -> Sending packet 11 (51 bytes) for connection d8cc1a7f0a1a9204, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 6e80f86af537838e66cf3def6f35f122, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 126.977µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 Received request: GET /pcinyssdja 2025/04/30 09:21:40 server -> Sending packet 12 (1061 bytes) for connection d8cc1a7f0a1a9204, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 6e80f86af537838e66cf3def6f35f122, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server <- Reading packet 2 (93 bytes) for connection 181216ef, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 181216ef, SrcConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:40 server Dropping Initial keys. 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 868.096ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 141.723159ms (σ: 70.861579ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 Retiring connection ID 7d80f5e188046738 in 5s. 2025/04/30 09:21:40 server Dropping Handshake keys. 2025/04/30 09:21:40 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:40 server -> Sending packet 1 (267 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0xef459ec2664addeae5ad714647f4001f6ba365a5a27f125fda66a8e7f6f26157fa4bd6aacd42d1df5621c784aefc46cea970719193063d079c158152723bf6015791c5bc456dc3533c52380e33778783d68e12438b63} 2025/04/30 09:21:40 server <- Reading packet 0 (43 bytes) for connection 181216ef, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 181216ef, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.024ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 128.568ms (σ: 79.455ms) 2025/04/30 09:21:40 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 Retiring connection ID fe10060e in 5s. 2025/04/30 09:21:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:40 server <- Reading packet 1 (45 bytes) for connection 181216ef, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 181216ef, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:40 server -> Sending packet 2 (44 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 105.880949ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 Received request: GET /jsmacyatdu 2025/04/30 09:21:40 server -> Sending packet 3 (1061 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server <- Reading packet 2 (139 bytes) for connection 77cf5696, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 77cf5696, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.144ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [1] 2025/04/30 09:21:40 server updated RTT: 36.569ms (σ: 8.729ms) 2025/04/30 09:21:40 server ECN capability confirmed. 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 0e608d3ee7bf1e32f4eb3fd965725fe9, StatelessResetToken: 0x3a330285f19cef8cf0e4599e38d59e3a} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: cd123dca6d877206677ea7bee16ddce5, StatelessResetToken: 0x7d4bbda3c36ab8889faab974ebb546a0} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 78a19008850a8f4d5546fe584fb14ed9, StatelessResetToken: 0x527cba814a8b9ebcacd25796a1982199} 2025/04/30 09:21:40 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:40 server Ignoring all packets below 1. 2025/04/30 09:21:40 server -> Sending packet 3 (45 bytes) for connection cb073c71c2cf2037, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 0e608d3ee7bf1e32f4eb3fd965725fe9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 222.145µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 server <- Reading packet 3 (43 bytes) for connection 77cf5696, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 77cf5696, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:40 Replacing connection for connection IDs [77cf5696 5d3229a4] with a closed connection. 2025/04/30 09:21:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:40 server Connection cb073c71c2cf2037 closed. 2025/04/30 09:21:40 server <- Reading packet 14 (43 bytes) for connection 8bd59e7a, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8bd59e7a, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:40 Replacing connection for connection IDs [51611844 8bd59e7a] with a closed connection. 2025/04/30 09:21:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:40 server Connection d8cc1a7f0a1a9204 closed. 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:21:40 server -> Sending packet 12 (37 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 server Skipping packet number 11 2025/04/30 09:21:40 server -> Sending packet 13 (38 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:40 server -> Sending packet 14 (1366 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.PingFrame{} 2025/04/30 09:21:40 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 09:21:40 server -> Sending packet 3 (1280 bytes) for connection f8ba55f2236adf42, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 14b9e9ab44c62598c575a7b077804170, SrcConnectionID: 5fdbe6dd, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server -> Sending packet 4 (1280 bytes) for connection f8ba55f2236adf42, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 14b9e9ab44c62598c575a7b077804170, SrcConnectionID: 5fdbe6dd, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server <- Received Initial packet. 2025/04/30 09:21:40 Created qlog file: /logs/qlog/63d1b493978387c5.sqlog 2025/04/30 09:21:40 server Changing connection ID to 4795df13. 2025/04/30 09:21:40 Adding connection IDs 63d1b493978387c5 and 4795df13 for a new connection. 2025/04/30 09:21:40 server <- Reading packet 4 (1200 bytes) for connection 63d1b493978387c5, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 63d1b493978387c5, SrcConnectionID: 224a71df81d912cc26109209be675912, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 224a71df81d912cc26109209be675912, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:40 Adding connection ID bc496778. 2025/04/30 09:21:40 Adding connection ID 14ae4885. 2025/04/30 09:21:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 63d1b493978387c5 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 224a71df81d912cc26109209be675912, SrcConnectionID: 4795df13, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 956, Version: v1} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 224a71df81d912cc26109209be675912, SrcConnectionID: 4795df13, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:21:40 server Short Header{DestConnectionID: 224a71df81d912cc26109209be675912, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 14ae4885, StatelessResetToken: 0xcb530850a1a37b7401fe4755db29a85d} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bc496778, StatelessResetToken: 0x5a2443a09e904cee30932962cfe82e78} 2025/04/30 09:21:40 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 1 (1280 bytes) for connection 359af0026eea2e16, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, SrcConnectionID: 42ab6cc2, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server -> Sending packet 2 (1280 bytes) for connection 359af0026eea2e16, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, SrcConnectionID: 42ab6cc2, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 13 (1061 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: f85aee58ec759369e23f45153431bb72, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server -> Sending packet 14 (1061 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: f85aee58ec759369e23f45153431bb72, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 1 (1280 bytes) for connection 63d1b493978387c5, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 224a71df81d912cc26109209be675912, SrcConnectionID: 4795df13, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server -> Sending packet 2 (1280 bytes) for connection 63d1b493978387c5, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 224a71df81d912cc26109209be675912, SrcConnectionID: 4795df13, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:21:40 server <- Reading packet 15 (43 bytes) for connection 090090e0, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 090090e0, PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 5, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 10, Smallest: 10}, {Largest: 5, Smallest: 5}}, DelayTime: 592µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> Sending packet 15 (1409 bytes) for connection ff617083fcf5b115, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: f85aee58ec759369e23f45153431bb72, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.PingFrame{} 2025/04/30 09:21:40 server <- Reading packet 5 (1200 bytes) for connection 4795df13, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 4795df13, SrcConnectionID: 224a71df81d912cc26109209be675912, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 8.192ms} 2025/04/30 09:21:40 server <- Reading packet 14 (43 bytes) for connection 8d679426, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8d679426, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 340.544ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:40 server -> Sending packet 6 (1366 bytes) for connection 71d4e99004edffad, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: d3278fca979f6318ee010d87c8b2a5e4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.PingFrame{} 2025/04/30 09:21:40 server -> Sending packet 7 (47 bytes) for connection 71d4e99004edffad, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: d3278fca979f6318ee010d87c8b2a5e4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 14, LowestAcked: 0, AckRanges: {{Largest: 14, Smallest: 14}, {Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 233.787µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:40 server -> Sending packet 1 (211 bytes) for connection 63d1b493978387c5, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 224a71df81d912cc26109209be675912, SrcConnectionID: 4795df13, PacketNumber: 1, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:21:40 server -> Sending packet 2 (211 bytes) for connection 63d1b493978387c5, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 224a71df81d912cc26109209be675912, SrcConnectionID: 4795df13, PacketNumber: 2, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:21:40 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 09:21:40 server -> Sending packet 3 (1280 bytes) for connection a69cb6ec2a8d1a00, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, SrcConnectionID: d5b6cd92, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server -> Sending packet 4 (1280 bytes) for connection a69cb6ec2a8d1a00, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, SrcConnectionID: d5b6cd92, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 09:21:40 server -> Sending packet 5 (212 bytes) for connection ae51fd6706fb517e, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: f343a550fe595e5fac2810c501cfde19, SrcConnectionID: e256d62e, PacketNumber: 5, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 09:21:40 server -> Sending packet 6 (212 bytes) for connection ae51fd6706fb517e, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: f343a550fe595e5fac2810c501cfde19, SrcConnectionID: e256d62e, PacketNumber: 6, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 09:21:40 server <- Reading packet 17 (164 bytes) for connection 8d679426, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8d679426, PacketNumber: 17, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 1.152ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [6] 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 24ed47ba3dfb8611f4f843a44b885390, StatelessResetToken: 0x2871f418cda9521818836e22fe639259} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 0e0d5e2d8a841b5541097152bf2508bc, StatelessResetToken: 0x944cad120977b95f0be97d15d148177e} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 390b916fd2fb0f006b2847bf57e7abf8, StatelessResetToken: 0x118ada6821f53cfad94f97d48b06abc0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:40 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:40 server -> Sending packet 8 (51 bytes) for connection 71d4e99004edffad, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 24ed47ba3dfb8611f4f843a44b885390, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 17, LowestAcked: 0, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 14, Smallest: 14}, {Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 262.089µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 Received request: GET /gaatlycsyl 2025/04/30 09:21:40 server -> Sending packet 9 (1061 bytes) for connection 71d4e99004edffad, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 24ed47ba3dfb8611f4f843a44b885390, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server <- Reading packet 16 (43 bytes) for connection 090090e0, 1-RTT 2025/04/30 09:21:40 server <- Reading packet 0 (91 bytes) for connection 4795df13, Handshake 2025/04/30 09:21:40 server Short Header{DestConnectionID: 090090e0, PacketNumber: 16, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 4795df13, SrcConnectionID: 224a71df81d912cc26109209be675912, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:21:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:40 server Dropping Initial keys. 2025/04/30 09:21:40 Replacing connection for connection IDs [6bfd4661 090090e0] with a closed connection. 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 8.048ms} 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Connection ff617083fcf5b115 closed. 2025/04/30 09:21:40 Retiring connection ID 63d1b493978387c5 in 5s. 2025/04/30 09:21:40 server Dropping Handshake keys. 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 2 (315 bytes) for connection 63d1b493978387c5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 224a71df81d912cc26109209be675912, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0x3067d1b0bda3f5b2121878553cf704caa012cc3fa3cbfe254427ba86ebfa6781cb30c8468d2313da43016e981ae3e48b4330b12559eae6a26a88f6a713372dfea5f99f20009a7c6b1d5cc54738b9bdb8a02bb41843ab} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 14ae4885, StatelessResetToken: 0xcb530850a1a37b7401fe4755db29a85d} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bc496778, StatelessResetToken: 0x5a2443a09e904cee30932962cfe82e78} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> Sending packet 3 (315 bytes) for connection 63d1b493978387c5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 224a71df81d912cc26109209be675912, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bc496778, StatelessResetToken: 0x5a2443a09e904cee30932962cfe82e78} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0x3067d1b0bda3f5b2121878553cf704caa012cc3fa3cbfe254427ba86ebfa6781cb30c8468d2313da43016e981ae3e48b4330b12559eae6a26a88f6a713372dfea5f99f20009a7c6b1d5cc54738b9bdb8a02bb41843ab} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 14ae4885, StatelessResetToken: 0xcb530850a1a37b7401fe4755db29a85d} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:21:40 server <- Received Initial packet. 2025/04/30 09:21:40 Created qlog file: /logs/qlog/e9906fd9346d0167.sqlog 2025/04/30 09:21:40 server Changing connection ID to 81e4eb41. 2025/04/30 09:21:40 Adding connection IDs e9906fd9346d0167 and 81e4eb41 for a new connection. 2025/04/30 09:21:40 server <- Reading packet 4 (1200 bytes) for connection e9906fd9346d0167, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: e9906fd9346d0167, SrcConnectionID: 667c08a70b623833a73e4743399be20f, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 667c08a70b623833a73e4743399be20f, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:40 Adding connection ID 22cfe924. 2025/04/30 09:21:40 Adding connection ID 21f84675. 2025/04/30 09:21:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e9906fd9346d0167 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 667c08a70b623833a73e4743399be20f, SrcConnectionID: 81e4eb41, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 958, Version: v1} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 667c08a70b623833a73e4743399be20f, SrcConnectionID: 81e4eb41, PacketNumber: 0, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 09:21:40 server Short Header{DestConnectionID: 667c08a70b623833a73e4743399be20f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 21f84675, StatelessResetToken: 0xaa8f8a6b7778acdbddff4789a5ce87bb} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 22cfe924, StatelessResetToken: 0x52bcc3ba2d37d8acfee2b7c5c0695314} 2025/04/30 09:21:40 server <- Reading packet 2 (65 bytes) for connection e256d62e, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: e256d62e, SrcConnectionID: f343a550fe595e5fac2810c501cfde19, PacketNumber: 2, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:40 server Dropping Initial keys. 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 2.776ms} 2025/04/30 09:21:40 server <- Reading packet 3 (65 bytes) for connection e256d62e, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: e256d62e, SrcConnectionID: f343a550fe595e5fac2810c501cfde19, PacketNumber: 3, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 1.432ms} 2025/04/30 09:21:40 server newly acked packets (1): [6] 2025/04/30 09:21:40 server updated RTT: 35.164ms (σ: 13.931ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- Reading packet 1 (141 bytes) for connection bc496778, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: bc496778, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 1.032ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [3] 2025/04/30 09:21:40 server updated RTT: 33.23462ms (σ: 16.61731ms) 2025/04/30 09:21:40 server ECN capability confirmed. 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 2a53e19edbc81c3fdbe87e3b6904ec79, StatelessResetToken: 0x989fda6cbb72bd1bead8e1726b70496d} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: d5e95eec1a99be62c86030bc72848245, StatelessResetToken: 0xee901cc4d6213618cbe09d72e93e083b} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 37eed4e23b0496fb79bd84d2133c8868, StatelessResetToken: 0x5e52f399626d9b616f0d40a4e85dc9cf} 2025/04/30 09:21:40 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 Retiring connection ID 4795df13 in 5s. 2025/04/30 09:21:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:40 server -> Sending packet 4 (45 bytes) for connection 63d1b493978387c5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 2a53e19edbc81c3fdbe87e3b6904ec79, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 268.141µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:40 server <- Reading packet 5 (66 bytes) for connection 21f84675, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 21f84675, SrcConnectionID: 667c08a70b623833a73e4743399be20f, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.112ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 35.924157ms (σ: 17.962078ms) 2025/04/30 09:21:40 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:40 server <- Reading packet 0 (1134 bytes) for connection 21f84675, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 21f84675, SrcConnectionID: 667c08a70b623833a73e4743399be20f, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:40 server Dropping Initial keys. 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.112ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 35.924ms (σ: 13.471ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 Retiring connection ID e9906fd9346d0167 in 5s. 2025/04/30 09:21:40 server Dropping Handshake keys. 2025/04/30 09:21:40 server -> Sending packet 1 (267 bytes) for connection e9906fd9346d0167, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 667c08a70b623833a73e4743399be20f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0xc46175b6248afff3350e60f7c0cc5df4673ecf6a7a51cc460e0ec8be9b6aeb53f246fd626f3eaf1fec7f9bf6beffb8aabda17744851266ad91f364b16ec0dd2d98747e6bed33cf9250ae0bb31f9618214657c09b16b3} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server <- Reading packet 0 (43 bytes) for connection 21f84675, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 21f84675, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.888ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 35.949ms (σ: 10.154ms) 2025/04/30 09:21:40 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 Retiring connection ID 81e4eb41 in 5s. 2025/04/30 09:21:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:40 server -> Sending packet 2 (43 bytes) for connection e9906fd9346d0167, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 667c08a70b623833a73e4743399be20f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 461.42µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- Reading packet 18 (43 bytes) for connection 8d679426, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8d679426, PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 25.496ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [8] 2025/04/30 09:21:40 server updated RTT: 41.045ms (σ: 14.74ms) 2025/04/30 09:21:40 server Ignoring all packets below 18. 2025/04/30 09:21:40 server <- Reading packet 2 (54 bytes) for connection bc496778, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: bc496778, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 648µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [4] 2025/04/30 09:21:40 server updated RTT: 33.093ms (σ: 12.744ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:40 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:40 server Ignoring all packets below 2. 2025/04/30 09:21:40 Received request: GET /patdunjewr 2025/04/30 09:21:40 server -> Sending packet 5 (1069 bytes) for connection 63d1b493978387c5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 2a53e19edbc81c3fdbe87e3b6904ec79, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 443.87µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server <- Received Initial packet. 2025/04/30 09:21:40 Created qlog file: /logs/qlog/8c65faf3160cd0d4.sqlog 2025/04/30 09:21:40 server Changing connection ID to 4f45bd3b. 2025/04/30 09:21:40 Adding connection IDs 8c65faf3160cd0d4 and 4f45bd3b for a new connection. 2025/04/30 09:21:40 server <- Reading packet 2 (1200 bytes) for connection 8c65faf3160cd0d4, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 8c65faf3160cd0d4, SrcConnectionID: b84e285929e901966c3bc7819c7f049b, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:21:40 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: b84e285929e901966c3bc7819c7f049b, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:40 Adding connection ID 20b95aae. 2025/04/30 09:21:40 Adding connection ID 69700e46. 2025/04/30 09:21:40 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8c65faf3160cd0d4 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: b84e285929e901966c3bc7819c7f049b, SrcConnectionID: 4f45bd3b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 965, Version: v1} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: b84e285929e901966c3bc7819c7f049b, SrcConnectionID: 4f45bd3b, PacketNumber: 0, PacketNumberLen: 2, Length: 173, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 151, Offset + Data length: 151} 2025/04/30 09:21:40 server Short Header{DestConnectionID: b84e285929e901966c3bc7819c7f049b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 20b95aae, StatelessResetToken: 0xb020cc3cbe791af96c970fbe0a04c45a} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 69700e46, StatelessResetToken: 0xc8e671df16bf771012a8e37d827e3d2e} 2025/04/30 09:21:40 server <- Reading packet 2 (139 bytes) for connection 21f84675, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 21f84675, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.176ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [1] 2025/04/30 09:21:40 server ECN capability confirmed. 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 9a6aefb560963a4cf0b45d8b822ecc6b, StatelessResetToken: 0x534bb9c20376733fc17170f0a0bfa977} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: fab7abdcb6129ee7333f4732c31658a4, StatelessResetToken: 0x8b231f1564d7a7d61c093497d09c469b} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: cd9664f1edec4efd9814291bc7c5fc68, StatelessResetToken: 0xa0a2b2a1f9380bac58cc52ef122a882a} 2025/04/30 09:21:40 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:40 server -> Sending packet 3 (47 bytes) for connection e9906fd9346d0167, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 9a6aefb560963a4cf0b45d8b822ecc6b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 239.207µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:40 server <- Reading packet 5 (66 bytes) for connection 20b95aae, Initial 2025/04/30 09:21:40 server Long Header{Type: Initial, DestConnectionID: 20b95aae, SrcConnectionID: b84e285929e901966c3bc7819c7f049b, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 17.152ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 36.277685ms (σ: 18.138842ms) 2025/04/30 09:21:40 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:40 server <- Reading packet 0 (1134 bytes) for connection 20b95aae, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 20b95aae, SrcConnectionID: b84e285929e901966c3bc7819c7f049b, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:40 server Dropping Initial keys. 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 17.152ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 36.277ms (σ: 13.603ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 Retiring connection ID 8c65faf3160cd0d4 in 5s. 2025/04/30 09:21:40 server Dropping Handshake keys. 2025/04/30 09:21:40 server <- Reading packet 0 (43 bytes) for connection 20b95aae, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 20b95aae, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.144ms} 2025/04/30 09:21:40 server newly acked packets (1): [0] 2025/04/30 09:21:40 server updated RTT: 36.28ms (σ: 10.209ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 Retiring connection ID 4f45bd3b in 5s. 2025/04/30 09:21:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:40 server -> Sending packet 1 (275 bytes) for connection 8c65faf3160cd0d4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: b84e285929e901966c3bc7819c7f049b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 496.919µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0x65bc0531ad29a043e0d32dbda2856888c4a984a98da8d3d481a0967fcce792b8a793febbc028825e427315d1de58d5d630cb910c4f29f4f3a91f2b59c268b09ec8126a3bbeef1216ca53a7e3745e81f38db36afa8dee} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server <- Reading packet 3 (54 bytes) for connection 21f84675, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 21f84675, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 624µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [3] 2025/04/30 09:21:40 server updated RTT: 35.463ms (σ: 8.585ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:40 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:40 server Ignoring all packets below 3. 2025/04/30 09:21:40 Received request: GET /cdscomjpie 2025/04/30 09:21:40 server -> Sending packet 4 (1069 bytes) for connection e9906fd9346d0167, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 9a6aefb560963a4cf0b45d8b822ecc6b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 377.315µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 11 (1061 bytes) for connection 71d4e99004edffad, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 24ed47ba3dfb8611f4f843a44b885390, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server -> Sending packet 12 (1061 bytes) for connection 71d4e99004edffad, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 24ed47ba3dfb8611f4f843a44b885390, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server <- Reading packet 2 (139 bytes) for connection 20b95aae, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 20b95aae, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.224ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [1] 2025/04/30 09:21:40 server updated RTT: 35.876ms (σ: 8.463ms) 2025/04/30 09:21:40 server ECN capability confirmed. 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 186d0c120d0de97c9ed0516caf90469b, StatelessResetToken: 0x9bb1b273da5543e0820409896be2387c} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 2017b57ddd6b46b82028714eb971aa3e, StatelessResetToken: 0x9cf7e62aa81e2adcd2481b2528029ee3} 2025/04/30 09:21:40 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: cd8d77bfb0ba3da6506c2074a85c2d12, StatelessResetToken: 0xb6a6f171bad3fc00f9a028e55b3e08b5} 2025/04/30 09:21:40 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:40 server Ignoring all packets below 1. 2025/04/30 09:21:40 server -> Sending packet 2 (45 bytes) for connection 8c65faf3160cd0d4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 186d0c120d0de97c9ed0516caf90469b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 234.398µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 server <- Reading packet 4 (43 bytes) for connection 21f84675, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 21f84675, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:40 Replacing connection for connection IDs [22cfe924 21f84675] with a closed connection. 2025/04/30 09:21:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:40 server Connection e9906fd9346d0167 closed. 2025/04/30 09:21:40 server <- Reading packet 19 (43 bytes) for connection 8d679426, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8d679426, PacketNumber: 19, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 8, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 8}}, DelayTime: 224µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- Reading packet 20 (43 bytes) for connection 8d679426, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 8d679426, PacketNumber: 20, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:40 Replacing connection for connection IDs [082a0207 8d679426] with a closed connection. 2025/04/30 09:21:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:40 server Connection 71d4e99004edffad closed. 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 7 (1061 bytes) for connection 63d1b493978387c5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 2a53e19edbc81c3fdbe87e3b6904ec79, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server -> Sending packet 8 (1061 bytes) for connection 63d1b493978387c5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 2a53e19edbc81c3fdbe87e3b6904ec79, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server -> Sending packet 9 (1366 bytes) for connection 63d1b493978387c5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 2a53e19edbc81c3fdbe87e3b6904ec79, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.PingFrame{} 2025/04/30 09:21:40 server <- Reading packet 1 (65 bytes) for connection 5fdbe6dd, Handshake 2025/04/30 09:21:40 server <- Reading packet 3 (54 bytes) for connection 20b95aae, 1-RTT 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 5fdbe6dd, SrcConnectionID: 14b9e9ab44c62598c575a7b077804170, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:40 server Short Header{DestConnectionID: 20b95aae, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server Dropping Initial keys. 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 848µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [2] 2025/04/30 09:21:40 server -> Sending packet 3 (208 bytes) for connection f8ba55f2236adf42, Handshake 2025/04/30 09:21:40 server updated RTT: 35.479ms (σ: 7.139ms) 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 14b9e9ab44c62598c575a7b077804170, SrcConnectionID: 5fdbe6dd, PacketNumber: 3, PacketNumberLen: 2, Length: 179, Version: v1} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:40 server -> Sending packet 4 (200 bytes) for connection f8ba55f2236adf42, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 14b9e9ab44c62598c575a7b077804170, SrcConnectionID: 5fdbe6dd, PacketNumber: 4, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:40 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:40 server Ignoring all packets below 3. 2025/04/30 09:21:40 Received request: GET /ujnxfakuur 2025/04/30 09:21:40 server -> Sending packet 3 (1069 bytes) for connection 8c65faf3160cd0d4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 186d0c120d0de97c9ed0516caf90469b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 417.12µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server <- Reading packet 4 (43 bytes) for connection bc496778, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: bc496778, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 123.448ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:40 server <- Reading packet 6 (43 bytes) for connection bc496778, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: bc496778, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 123.448ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server -> Sending packet 10 (47 bytes) for connection 63d1b493978387c5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 2a53e19edbc81c3fdbe87e3b6904ec79, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 251.918µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- Reading packet 7 (43 bytes) for connection bc496778, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: bc496778, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 432µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:40 server <- Reading packet 1 (65 bytes) for connection d5b6cd92, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: d5b6cd92, SrcConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:40 server Dropping Initial keys. 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 3 (211 bytes) for connection a69cb6ec2a8d1a00, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, SrcConnectionID: d5b6cd92, PacketNumber: 3, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:21:40 server -> Sending packet 4 (203 bytes) for connection a69cb6ec2a8d1a00, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, SrcConnectionID: d5b6cd92, PacketNumber: 4, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:21:40 server <- Reading packet 8 (43 bytes) for connection bc496778, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: bc496778, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:40 Replacing connection for connection IDs [bc496778 14ae4885] with a closed connection. 2025/04/30 09:21:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:40 server Connection 63d1b493978387c5 closed. 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 5 (267 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0xef459ec2664addeae5ad714647f4001f6ba365a5a27f125fda66a8e7f6f26157fa4bd6aacd42d1df5621c784aefc46cea970719193063d079c158152723bf6015791c5bc456dc3533c52380e33778783d68e12438b63} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server Skipping packet number 4 2025/04/30 09:21:40 server -> Sending packet 6 (1061 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 5 (1061 bytes) for connection 8c65faf3160cd0d4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 186d0c120d0de97c9ed0516caf90469b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server -> Sending packet 6 (1061 bytes) for connection 8c65faf3160cd0d4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 186d0c120d0de97c9ed0516caf90469b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 09:21:40 server -> Sending packet 16 (37 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:40 server Skipping packet number 15 2025/04/30 09:21:40 server -> Sending packet 17 (38 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:40 server <- Reading packet 5 (43 bytes) for connection 20b95aae, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 20b95aae, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 117.712ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:40 server -> Sending packet 7 (1366 bytes) for connection 8c65faf3160cd0d4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 186d0c120d0de97c9ed0516caf90469b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.PingFrame{} 2025/04/30 09:21:40 server <- Reading packet 7 (43 bytes) for connection 20b95aae, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 20b95aae, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 117.712ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- &wire.PingFrame{} 2025/04/30 09:21:40 server -> Sending packet 8 (47 bytes) for connection 8c65faf3160cd0d4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 186d0c120d0de97c9ed0516caf90469b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 3, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 269.647µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server <- Reading packet 4 (93 bytes) for connection 5fdbe6dd, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: 5fdbe6dd, SrcConnectionID: 14b9e9ab44c62598c575a7b077804170, PacketNumber: 4, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 811.296ms} 2025/04/30 09:21:40 server newly acked packets (1): [4] 2025/04/30 09:21:40 server updated RTT: 133.988687ms (σ: 66.994343ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 Retiring connection ID f8ba55f2236adf42 in 5s. 2025/04/30 09:21:40 server Dropping Handshake keys. 2025/04/30 09:21:40 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 2 (315 bytes) for connection f8ba55f2236adf42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 14b9e9ab44c62598c575a7b077804170, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0x860820a7966fa30762ab78a10a1bed2a69da07e38bffccfb10981cc12eea8d4b5402508f913ec74e6cb9092cad494716b9c07c7f6de48ab8b3f53df7ca52e4b64476ed7b9f38b2745367142107734b584412fb358855} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3910c5c3, StatelessResetToken: 0x9485a633e70c81d8655eb8ab3b1b0e4d} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: df1f5008, StatelessResetToken: 0xcde0bea99737e212a235dede32463b2c} 2025/04/30 09:21:40 server -> Sending packet 3 (315 bytes) for connection f8ba55f2236adf42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 14b9e9ab44c62598c575a7b077804170, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3910c5c3, StatelessResetToken: 0x9485a633e70c81d8655eb8ab3b1b0e4d} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: df1f5008, StatelessResetToken: 0xcde0bea99737e212a235dede32463b2c} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0x860820a7966fa30762ab78a10a1bed2a69da07e38bffccfb10981cc12eea8d4b5402508f913ec74e6cb9092cad494716b9c07c7f6de48ab8b3f53df7ca52e4b64476ed7b9f38b2745367142107734b584412fb358855} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server <- Reading packet 0 (45 bytes) for connection 5fdbe6dd, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 5fdbe6dd, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:40 server -> Sending packet 4 (44 bytes) for connection f8ba55f2236adf42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 14b9e9ab44c62598c575a7b077804170, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 100.332441ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 Received request: GET /mpoqlgpyqd 2025/04/30 09:21:40 server -> Sending packet 5 (1061 bytes) for connection f8ba55f2236adf42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 14b9e9ab44c62598c575a7b077804170, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server <- Reading packet 9 (43 bytes) for connection 20b95aae, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 20b95aae, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}}, DelayTime: 25.672ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (1): [6] 2025/04/30 09:21:40 server updated RTT: 35.449ms (σ: 5.413ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server -> Sending packet 9 (38 bytes) for connection 8c65faf3160cd0d4, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 186d0c120d0de97c9ed0516caf90469b, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:40 server <- Reading packet 10 (43 bytes) for connection 20b95aae, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: 20b95aae, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:40 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:40 Replacing connection for connection IDs [20b95aae 69700e46] with a closed connection. 2025/04/30 09:21:40 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:40 server Connection 8c65faf3160cd0d4 closed. 2025/04/30 09:21:40 server <- Reading packet 6 (93 bytes) for connection d5b6cd92, Handshake 2025/04/30 09:21:40 server Long Header{Type: Handshake, DestConnectionID: d5b6cd92, SrcConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, PacketNumber: 6, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 787.616ms} 2025/04/30 09:21:40 server newly acked packets (1): [4] 2025/04/30 09:21:40 server updated RTT: 130.730977ms (σ: 65.365488ms) 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:40 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:40 Retiring connection ID a69cb6ec2a8d1a00 in 5s. 2025/04/30 09:21:40 server Dropping Handshake keys. 2025/04/30 09:21:40 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:40 server -> Sending packet 2 (315 bytes) for connection a69cb6ec2a8d1a00, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e7314f78, StatelessResetToken: 0x44c3762f909658b24e1cf40db665e1d5} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0xcccb743e7d0ae9f0a2a18ae83a2e55b4dfe5f9be77a6b590a75c90d817d96892d99fd2784818c8f0693a0f3b358a11473324b87bbe8346642c4430f9cb8e880b40add21f29e20a15e59b6f683fd5ff5a790ae20abdcd} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8ff3b0d2, StatelessResetToken: 0xa039db53cdd730e065e96b55e696544c} 2025/04/30 09:21:40 server -> Sending packet 3 (315 bytes) for connection a69cb6ec2a8d1a00, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8ff3b0d2, StatelessResetToken: 0xa039db53cdd730e065e96b55e696544c} 2025/04/30 09:21:40 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:40 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:40 server -> &wire.NewTokenFrame{Token: 0xcccb743e7d0ae9f0a2a18ae83a2e55b4dfe5f9be77a6b590a75c90d817d96892d99fd2784818c8f0693a0f3b358a11473324b87bbe8346642c4430f9cb8e880b40add21f29e20a15e59b6f683fd5ff5a790ae20abdcd} 2025/04/30 09:21:40 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e7314f78, StatelessResetToken: 0x44c3762f909658b24e1cf40db665e1d5} 2025/04/30 09:21:40 server <- Reading packet 0 (45 bytes) for connection d5b6cd92, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: d5b6cd92, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:40 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:40 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:40 server -> Sending packet 4 (44 bytes) for connection a69cb6ec2a8d1a00, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 97.264666ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:40 Received request: GET /nfmekmrgdw 2025/04/30 09:21:40 server -> Sending packet 5 (1061 bytes) for connection a69cb6ec2a8d1a00, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:40 server <- Reading packet 2 (43 bytes) for connection e7314f78, 1-RTT 2025/04/30 09:21:40 server Short Header{DestConnectionID: e7314f78, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:40 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 792µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:40 server newly acked packets (2): [3 5] 2025/04/30 09:21:40 server updated RTT: 118.79ms (σ: 72.902ms) 2025/04/30 09:21:40 server ECN capability confirmed. 2025/04/30 09:21:40 server Canceling loss detection timer. 2025/04/30 09:21:40 server -> Sending packet 6 (38 bytes) for connection a69cb6ec2a8d1a00, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:40 server Short Header{DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:40 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:41 Tracking 196 connection IDs and 2 reset tokens. 2025/04/30 09:21:41 server <- Reading packet 3 (43 bytes) for connection e7314f78, 1-RTT 2025/04/30 09:21:41 server Short Header{DestConnectionID: e7314f78, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:41 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 26.28ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:41 server newly acked packets (1): [6] 2025/04/30 09:21:41 server updated RTT: 111.217ms (σ: 69.821ms) 2025/04/30 09:21:41 server Canceling loss detection timer. 2025/04/30 09:21:41 server <- Reading packet 5 (43 bytes) for connection e7314f78, 1-RTT 2025/04/30 09:21:41 server Short Header{DestConnectionID: e7314f78, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:41 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 89.44ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:41 server <- &wire.PingFrame{} 2025/04/30 09:21:41 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:41 server -> Sending packet 7 (47 bytes) for connection a69cb6ec2a8d1a00, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:41 server Short Header{DestConnectionID: 96ca5fee27bd86e4cfcc4b23062036e9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:41 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 187.361µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:41 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:41 server <- Reading packet 8 (43 bytes) for connection e7314f78, 1-RTT 2025/04/30 09:21:41 server Short Header{DestConnectionID: e7314f78, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:41 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:41 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:41 Replacing connection for connection IDs [d5b6cd92 e7314f78 8ff3b0d2] with a closed connection. 2025/04/30 09:21:41 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:41 server Connection a69cb6ec2a8d1a00 closed. 2025/04/30 09:21:41 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:41 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:41 server <- Reading packet 1 (65 bytes) for connection 42ab6cc2, Handshake 2025/04/30 09:21:41 server Long Header{Type: Handshake, DestConnectionID: 42ab6cc2, SrcConnectionID: 115cd486102b7a406eaff44bfa46c4a7, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:41 server Dropping Initial keys. 2025/04/30 09:21:41 server <- &wire.PingFrame{} 2025/04/30 09:21:41 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:21:41 server -> Sending packet 1 (217 bytes) for connection 359af0026eea2e16, Handshake 2025/04/30 09:21:41 server Long Header{Type: Handshake, DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, SrcConnectionID: 42ab6cc2, PacketNumber: 1, PacketNumberLen: 2, Length: 188, Version: v1} 2025/04/30 09:21:41 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 09:21:41 server -> Sending packet 2 (209 bytes) for connection 359af0026eea2e16, Handshake 2025/04/30 09:21:41 server Long Header{Type: Handshake, DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, SrcConnectionID: 42ab6cc2, PacketNumber: 2, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 09:21:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 09:21:41 server <- Reading packet 18 (43 bytes) for connection acbe6295, 1-RTT 2025/04/30 09:21:41 server Short Header{DestConnectionID: acbe6295, PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:41 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 1, AckRanges: {{Largest: 7, Smallest: 5}, {Largest: 2, Smallest: 1}}, DelayTime: 2.49956s, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:41 server <- &wire.PingFrame{} 2025/04/30 09:21:41 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:41 server -> Sending packet 9 (1409 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:41 server Short Header{DestConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:21:41 server -> &wire.PingFrame{} 2025/04/30 09:21:41 server -> Sending packet 7 (315 bytes) for connection f8ba55f2236adf42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:41 server Short Header{DestConnectionID: 14b9e9ab44c62598c575a7b077804170, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:41 server -> &wire.NewTokenFrame{Token: 0x860820a7966fa30762ab78a10a1bed2a69da07e38bffccfb10981cc12eea8d4b5402508f913ec74e6cb9092cad494716b9c07c7f6de48ab8b3f53df7ca52e4b64476ed7b9f38b2745367142107734b584412fb358855} 2025/04/30 09:21:41 server -> Sending packet 10 (53 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:41 server Short Header{DestConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:41 server -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 0, AckRanges: {{Largest: 18, Smallest: 18}, {Largest: 12, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 336.576µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3910c5c3, StatelessResetToken: 0x9485a633e70c81d8655eb8ab3b1b0e4d} 2025/04/30 09:21:41 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: df1f5008, StatelessResetToken: 0xcde0bea99737e212a235dede32463b2c} 2025/04/30 09:21:41 server Skipping packet number 6 2025/04/30 09:21:41 server -> Sending packet 8 (1061 bytes) for connection f8ba55f2236adf42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:41 server Short Header{DestConnectionID: 14b9e9ab44c62598c575a7b077804170, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:41 server -> Sending packet 9 (1366 bytes) for connection f8ba55f2236adf42, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:41 server Short Header{DestConnectionID: 14b9e9ab44c62598c575a7b077804170, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:41 server -> &wire.PingFrame{} 2025/04/30 09:21:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:21:41 server -> Sending packet 8 (267 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:41 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:41 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:41 server -> &wire.NewTokenFrame{Token: 0xef459ec2664addeae5ad714647f4001f6ba365a5a27f125fda66a8e7f6f26157fa4bd6aacd42d1df5621c784aefc46cea970719193063d079c158152723bf6015791c5bc456dc3533c52380e33778783d68e12438b63} 2025/04/30 09:21:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:41 server Skipping packet number 7 2025/04/30 09:21:41 server -> Sending packet 9 (1061 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:41 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:41 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:41 server -> Sending packet 10 (1366 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:41 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:41 server -> &wire.PingFrame{} 2025/04/30 09:21:41 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:21:41 server -> Sending packet 3 (209 bytes) for connection 359af0026eea2e16, Handshake 2025/04/30 09:21:41 server Long Header{Type: Handshake, DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, SrcConnectionID: 42ab6cc2, PacketNumber: 3, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 09:21:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 09:21:41 server -> Sending packet 4 (209 bytes) for connection 359af0026eea2e16, Handshake 2025/04/30 09:21:41 server Long Header{Type: Handshake, DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, SrcConnectionID: 42ab6cc2, PacketNumber: 4, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 09:21:41 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 09:21:41 server <- Reading packet 2 (43 bytes) for connection 3910c5c3, 1-RTT 2025/04/30 09:21:41 server Short Header{DestConnectionID: 3910c5c3, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:41 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:41 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:41 Replacing connection for connection IDs [5fdbe6dd 3910c5c3 df1f5008] with a closed connection. 2025/04/30 09:21:41 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:41 server Connection f8ba55f2236adf42 closed. 2025/04/30 09:21:41 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:21:41 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 09:21:41 server -> Sending packet 19 (37 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:41 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:41 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:41 server Skipping packet number 18 2025/04/30 09:21:41 server -> Sending packet 20 (38 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:41 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:41 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:42 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 09:21:42 server -> Sending packet 5 (209 bytes) for connection 359af0026eea2e16, Handshake 2025/04/30 09:21:42 server Long Header{Type: Handshake, DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, SrcConnectionID: 42ab6cc2, PacketNumber: 5, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 09:21:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 09:21:42 server -> Sending packet 6 (209 bytes) for connection 359af0026eea2e16, Handshake 2025/04/30 09:21:42 server Long Header{Type: Handshake, DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, SrcConnectionID: 42ab6cc2, PacketNumber: 6, PacketNumberLen: 2, Length: 180, Version: v1} 2025/04/30 09:21:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 158, Offset + Data length: 158} 2025/04/30 09:21:42 server <- Reading packet 29 (43 bytes) for connection acbe6295, 1-RTT 2025/04/30 09:21:42 server Short Header{DestConnectionID: acbe6295, PacketNumber: 29, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:42 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 5, AckRanges: {{Largest: 10, Smallest: 9}, {Largest: 7, Smallest: 5}}, DelayTime: 561.776ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:21:42 server newly acked packets (1): [9] 2025/04/30 09:21:42 server <- &wire.PingFrame{} 2025/04/30 09:21:42 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:42 server -> Sending packet 11 (1430 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:42 server Short Header{DestConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:42 server -> &wire.PingFrame{} 2025/04/30 09:21:42 server -> Sending packet 12 (55 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:42 server Short Header{DestConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:42 server -> &wire.AckFrame{LargestAcked: 29, LowestAcked: 0, AckRanges: {{Largest: 29, Smallest: 29}, {Largest: 18, Smallest: 18}, {Largest: 12, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 270.766µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:42 server <- Reading packet 3 (65 bytes) for connection 42ab6cc2, Handshake 2025/04/30 09:21:42 server Long Header{Type: Handshake, DestConnectionID: 42ab6cc2, SrcConnectionID: 115cd486102b7a406eaff44bfa46c4a7, PacketNumber: 3, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:42 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 2.656ms} 2025/04/30 09:21:42 server newly acked packets (1): [6] 2025/04/30 09:21:42 server updated RTT: 32.644876ms (σ: 16.322438ms) 2025/04/30 09:21:42 server Canceling loss detection timer. 2025/04/30 09:21:42 server <- Reading packet 30 (43 bytes) for connection acbe6295, 1-RTT 2025/04/30 09:21:42 server Short Header{DestConnectionID: acbe6295, PacketNumber: 30, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:42 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 5, AckRanges: {{Largest: 11, Smallest: 9}, {Largest: 7, Smallest: 5}}, DelayTime: 27.112ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 09:21:42 server newly acked packets (1): [11] 2025/04/30 09:21:42 server updated RTT: 101.973ms (σ: 65.752ms) 2025/04/30 09:21:42 server <- Reading packet 7 (93 bytes) for connection 35f27e56, Handshake 2025/04/30 09:21:42 server Long Header{Type: Handshake, DestConnectionID: 35f27e56, SrcConnectionID: 0ab8012bb2ebffb514a0f926e429c294, PacketNumber: 7, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:21:42 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 23.971888s} 2025/04/30 09:21:42 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:42 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:42 Retiring connection ID 7415fa14cece7c21 in 5s. 2025/04/30 09:21:42 server Dropping Handshake keys. 2025/04/30 09:21:42 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:42 server -> Sending packet 2 (315 bytes) for connection 7415fa14cece7c21, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:42 server Short Header{DestConnectionID: 0ab8012bb2ebffb514a0f926e429c294, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f7f864e9, StatelessResetToken: 0xe3a1919c993b37e58ba58e65a1f4c84a} 2025/04/30 09:21:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5979d439, StatelessResetToken: 0x1ba4ad8de1b5f43969e140d402f584f6} 2025/04/30 09:21:42 server -> &wire.NewTokenFrame{Token: 0xe1bd69fe0f49a4ed0de8e3072fb121e51f9b1770185d039acf8a43a646983b4de1917c4b8bd54bedf8a039ea410109ed3ac645e51a009e2f301fa111bb28a4f0f053d3eb7b1a289120cfed0aa3a1f3b7d10fe4f4cd43} 2025/04/30 09:21:42 server -> Sending packet 3 (315 bytes) for connection 7415fa14cece7c21, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:42 server Short Header{DestConnectionID: 0ab8012bb2ebffb514a0f926e429c294, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f7f864e9, StatelessResetToken: 0xe3a1919c993b37e58ba58e65a1f4c84a} 2025/04/30 09:21:42 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5979d439, StatelessResetToken: 0x1ba4ad8de1b5f43969e140d402f584f6} 2025/04/30 09:21:42 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:42 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:42 server -> &wire.NewTokenFrame{Token: 0xe1bd69fe0f49a4ed0de8e3072fb121e51f9b1770185d039acf8a43a646983b4de1917c4b8bd54bedf8a039ea410109ed3ac645e51a009e2f301fa111bb28a4f0f053d3eb7b1a289120cfed0aa3a1f3b7d10fe4f4cd43} 2025/04/30 09:21:42 server <- Reading packet 0 (45 bytes) for connection 35f27e56, 1-RTT 2025/04/30 09:21:42 server Short Header{DestConnectionID: 35f27e56, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:42 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:42 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:42 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:42 server -> Sending packet 4 (46 bytes) for connection 7415fa14cece7c21, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:42 server Short Header{DestConnectionID: 0ab8012bb2ebffb514a0f926e429c294, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:42 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.998642373s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:42 Received request: GET /gbtwozjxdo 2025/04/30 09:21:42 server -> Sending packet 5 (1061 bytes) for connection 7415fa14cece7c21, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:42 server Short Header{DestConnectionID: 0ab8012bb2ebffb514a0f926e429c294, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:42 server <- Reading packet 1 (141 bytes) for connection f7f864e9, 1-RTT 2025/04/30 09:21:42 server Short Header{DestConnectionID: f7f864e9, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:42 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 1.584ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:42 server newly acked packets (1): [3] 2025/04/30 09:21:42 server ECN capability confirmed. 2025/04/30 09:21:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 0fb005920cf6691e8f4af80868cd5591, StatelessResetToken: 0x87866e5b8b1905e89f9d4e983b521bff} 2025/04/30 09:21:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 49043ca29adb68612f864f7a3a0c6cfb, StatelessResetToken: 0x92cc3e7df2b0259e19b5537867fba353} 2025/04/30 09:21:42 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: ebbe52da505d5d06e6c9ecaed5c42aa0, StatelessResetToken: 0x948df8bac947a13cde6d206fcd3d021b} 2025/04/30 09:21:42 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:42 Retiring connection ID 35f27e56 in 5s. 2025/04/30 09:21:42 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:42 server -> Sending packet 6 (45 bytes) for connection 7415fa14cece7c21, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:42 server Short Header{DestConnectionID: 0fb005920cf6691e8f4af80868cd5591, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:42 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 234.198µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:42 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:42 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:42 server -> Sending packet 8 (1061 bytes) for connection 7415fa14cece7c21, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:42 server Short Header{DestConnectionID: 0fb005920cf6691e8f4af80868cd5591, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:42 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:42 server Skipping packet number 7 2025/04/30 09:21:42 server -> Sending packet 9 (37 bytes) for connection 7415fa14cece7c21, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:42 server Short Header{DestConnectionID: 0fb005920cf6691e8f4af80868cd5591, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:42 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:42 server <- Reading packet 3 (43 bytes) for connection f7f864e9, 1-RTT 2025/04/30 09:21:42 server Short Header{DestConnectionID: f7f864e9, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:42 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 6, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 736µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:42 server newly acked packets (2): [8 9] 2025/04/30 09:21:42 server updated RTT: 35.133ms (σ: 13.592ms) 2025/04/30 09:21:42 server Canceling loss detection timer. 2025/04/30 09:21:42 server -> Sending packet 10 (1366 bytes) for connection 7415fa14cece7c21, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:42 server Short Header{DestConnectionID: 0fb005920cf6691e8f4af80868cd5591, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:42 server -> &wire.PingFrame{} 2025/04/30 09:21:42 server -> Sending packet 11 (38 bytes) for connection 7415fa14cece7c21, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:42 server Short Header{DestConnectionID: 0fb005920cf6691e8f4af80868cd5591, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:42 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:42 server <- Reading packet 4 (43 bytes) for connection f7f864e9, 1-RTT 2025/04/30 09:21:42 server Short Header{DestConnectionID: f7f864e9, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:42 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:42 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:42 Replacing connection for connection IDs [5979d439 f7f864e9] with a closed connection. 2025/04/30 09:21:42 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:42 server Connection 7415fa14cece7c21 closed. 2025/04/30 09:21:43 Tracking 196 connection IDs and 2 reset tokens. 2025/04/30 09:21:43 server <- Reading packet 7 (95 bytes) for connection 246078b8, Handshake 2025/04/30 09:21:43 server Long Header{Type: Handshake, DestConnectionID: 246078b8, SrcConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, PacketNumber: 7, PacketNumberLen: 1, Length: 66, Version: v1} 2025/04/30 09:21:43 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 22.230024s} 2025/04/30 09:21:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:43 Retiring connection ID 2e4c7276166402d0 in 5s. 2025/04/30 09:21:43 server Dropping Handshake keys. 2025/04/30 09:21:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:43 server -> Sending packet 2 (315 bytes) for connection 2e4c7276166402d0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c2443724, StatelessResetToken: 0xfabeed1925449d74b3c32bf5cf1e640d} 2025/04/30 09:21:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1368d547, StatelessResetToken: 0x64652c75c7c9d1f5c5eb9af6e316be3b} 2025/04/30 09:21:43 server -> &wire.NewTokenFrame{Token: 0xa1bd8a77ed81b9acef3e37e18f31d3514e9cb3ff864a659863caf765f781b1b8da07559757542b642ccbc92a1374a4628dd26e3932e9bee827e6963b0f934fd15601a1d8d9f35b759e04f5b20677ac5083c8d1ed85e9} 2025/04/30 09:21:43 server -> Sending packet 3 (315 bytes) for connection 2e4c7276166402d0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c2443724, StatelessResetToken: 0xfabeed1925449d74b3c32bf5cf1e640d} 2025/04/30 09:21:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:43 server -> &wire.NewTokenFrame{Token: 0xa1bd8a77ed81b9acef3e37e18f31d3514e9cb3ff864a659863caf765f781b1b8da07559757542b642ccbc92a1374a4628dd26e3932e9bee827e6963b0f934fd15601a1d8d9f35b759e04f5b20677ac5083c8d1ed85e9} 2025/04/30 09:21:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1368d547, StatelessResetToken: 0x64652c75c7c9d1f5c5eb9af6e316be3b} 2025/04/30 09:21:43 server <- Reading packet 0 (45 bytes) for connection 246078b8, 1-RTT 2025/04/30 09:21:43 server Short Header{DestConnectionID: 246078b8, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:43 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:43 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:43 server -> Sending packet 4 (46 bytes) for connection 2e4c7276166402d0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.999116458s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:43 Received request: GET /mhdwculpjf 2025/04/30 09:21:43 server -> Sending packet 5 (1061 bytes) for connection 2e4c7276166402d0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:43 server <- Reading packet 34 (43 bytes) for connection acbe6295, 1-RTT 2025/04/30 09:21:43 server Short Header{DestConnectionID: acbe6295, PacketNumber: 34, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:43 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 5, AckRanges: {{Largest: 11, Smallest: 9}, {Largest: 7, Smallest: 5}}, DelayTime: 710.912ms, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 09:21:43 server <- &wire.PingFrame{} 2025/04/30 09:21:43 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:43 server -> Sending packet 13 (1441 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.PingFrame{} 2025/04/30 09:21:43 server -> Sending packet 14 (57 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.AckFrame{LargestAcked: 34, LowestAcked: 0, AckRanges: {{Largest: 34, Smallest: 34}, {Largest: 30, Smallest: 29}, {Largest: 18, Smallest: 18}, {Largest: 12, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 140.113µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:21:43 Removing connection ID ce37a9d0 after it has been retired. 2025/04/30 09:21:43 Removing connection ID aa80af060c84d68f after it has been retired. 2025/04/30 09:21:43 server <- Reading packet 35 (54 bytes) for connection acbe6295, 1-RTT 2025/04/30 09:21:43 server Short Header{DestConnectionID: acbe6295, PacketNumber: 35, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:43 server <- &wire.AckFrame{LargestAcked: 14, LowestAcked: 14, DelayTime: 792µs, ECT0: 9, ECT1: 0, CE: 0} 2025/04/30 09:21:43 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:43 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:43 Received request: GET /qzpintibes 2025/04/30 09:21:43 server -> Sending packet 15 (1083 bytes) for connection 40bbfb046db4d45c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 5e6cd73a9d53a9613b2c0b0923225468, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.AckFrame{LargestAcked: 35, LowestAcked: 0, AckRanges: {{Largest: 35, Smallest: 34}, {Largest: 30, Smallest: 29}, {Largest: 18, Smallest: 18}, {Largest: 12, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 327.643µs, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:21:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:43 Removing connection ID b915abb1 after it has been retired. 2025/04/30 09:21:43 Removing connection ID 55ab69b83eb6ef83 after it has been retired. 2025/04/30 09:21:43 Removing connection ID ac0168a9d1a2ba36 after it has been retired. 2025/04/30 09:21:43 Removing connection ID 226cca1740348987 after it has been retired. 2025/04/30 09:21:43 Removing connection ID 8d64d098 after it has been retired. 2025/04/30 09:21:43 Removing connection ID 13ec6cad3dc00557 after it has been retired. 2025/04/30 09:21:43 Removing connection ID 4871ab7c after it has been retired. 2025/04/30 09:21:43 Removing connection ID 0673282f3216e3fd after it has been retired. 2025/04/30 09:21:43 Removing connection ID 3364e27c after it has been retired. 2025/04/30 09:21:43 Removing connection ID 4b59879a after it has been retired. 2025/04/30 09:21:43 Removing connection ID 33af4a20c088fdf7 after it has been retired. 2025/04/30 09:21:43 server <- Reading packet 36 (43 bytes) for connection acbe6295, 1-RTT 2025/04/30 09:21:43 server Short Header{DestConnectionID: acbe6295, PacketNumber: 36, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:43 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:43 Replacing connection for connection IDs [acbe6295 ccc6dee7] with a closed connection. 2025/04/30 09:21:43 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:43 server Connection 40bbfb046db4d45c closed. 2025/04/30 09:21:43 Removing connection IDs [91b42f88 a8207e69] for a closed connection after it has been retired. 2025/04/30 09:21:43 Removing connection ID e9bae830 after it has been retired. 2025/04/30 09:21:43 Removing connection ID a3fe4aa400102af5 after it has been retired. 2025/04/30 09:21:43 Removing connection IDs [652fa97c 0fc384e3] for a closed connection after it has been retired. 2025/04/30 09:21:43 Removing connection ID 9108d06f after it has been retired. 2025/04/30 09:21:43 Removing connection ID 8148dac8fc4e1535 after it has been retired. 2025/04/30 09:21:43 Removing connection ID bf46aa81dbcd04f0 after it has been retired. 2025/04/30 09:21:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:21:43 server -> Sending packet 7 (315 bytes) for connection 2e4c7276166402d0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c2443724, StatelessResetToken: 0xfabeed1925449d74b3c32bf5cf1e640d} 2025/04/30 09:21:43 server -> &wire.NewTokenFrame{Token: 0xa1bd8a77ed81b9acef3e37e18f31d3514e9cb3ff864a659863caf765f781b1b8da07559757542b642ccbc92a1374a4628dd26e3932e9bee827e6963b0f934fd15601a1d8d9f35b759e04f5b20677ac5083c8d1ed85e9} 2025/04/30 09:21:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 1368d547, StatelessResetToken: 0x64652c75c7c9d1f5c5eb9af6e316be3b} 2025/04/30 09:21:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:43 server Skipping packet number 6 2025/04/30 09:21:43 server -> Sending packet 8 (1061 bytes) for connection 2e4c7276166402d0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:43 server -> Sending packet 9 (1366 bytes) for connection 2e4c7276166402d0, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 933b71b9aab68885a83d26f4c5a8cb67, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.PingFrame{} 2025/04/30 09:21:43 Removing connection ID 072d88b9a208c550 after it has been retired. 2025/04/30 09:21:43 Removing connection ID e21969b048f05653 after it has been retired. 2025/04/30 09:21:43 Removing connection ID ff617083fcf5b115 after it has been retired. 2025/04/30 09:21:43 Removing connection ID d12e1708 after it has been retired. 2025/04/30 09:21:43 Removing connection ID 874a008efe949583 after it has been retired. 2025/04/30 09:21:43 server <- Reading packet 2 (43 bytes) for connection c2443724, 1-RTT 2025/04/30 09:21:43 server Short Header{DestConnectionID: c2443724, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:43 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 2, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 648µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:43 server newly acked packets (1): [7] 2025/04/30 09:21:43 server updated RTT: 35.65ms (σ: 12.048ms) 2025/04/30 09:21:43 server ECN capability confirmed. 2025/04/30 09:21:43 server <- Reading packet 3 (43 bytes) for connection c2443724, 1-RTT 2025/04/30 09:21:43 server Short Header{DestConnectionID: c2443724, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:43 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:43 Replacing connection for connection IDs [246078b8 1368d547 c2443724] with a closed connection. 2025/04/30 09:21:43 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:43 server Connection 2e4c7276166402d0 closed. 2025/04/30 09:21:43 Removing connection IDs [a48a6cd2 0150a0c6] for a closed connection after it has been retired. 2025/04/30 09:21:43 Removing connection ID ac0472bf after it has been retired. 2025/04/30 09:21:43 Removing connection ID 396d117f after it has been retired. 2025/04/30 09:21:43 Removing connection IDs [9cf90b9a d13beb5c] for a closed connection after it has been retired. 2025/04/30 09:21:43 Removing connection IDs [bf362d96 a81a3c41] for a closed connection after it has been retired. 2025/04/30 09:21:43 Removing connection ID 2c0cfeb3 after it has been retired. 2025/04/30 09:21:43 Removing connection IDs [cb61eee6 1775ef6b] for a closed connection after it has been retired. 2025/04/30 09:21:43 Removing connection ID 4d60efc2d057faea after it has been retired. 2025/04/30 09:21:43 Removing connection ID ef1be9349c65b9e1 after it has been retired. 2025/04/30 09:21:43 Removing connection IDs [3d9d2cc2 5f8405ed 377ff026] for a closed connection after it has been retired. 2025/04/30 09:21:43 Removing connection ID 51a20b6e after it has been retired. 2025/04/30 09:21:43 Removing connection ID 40bbfb046db4d45c after it has been retired. 2025/04/30 09:21:43 Removing connection IDs [f8e78c7a f1aa8357] for a closed connection after it has been retired. 2025/04/30 09:21:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 09:21:43 server -> Sending packet 12 (267 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:43 server -> &wire.NewTokenFrame{Token: 0xef459ec2664addeae5ad714647f4001f6ba365a5a27f125fda66a8e7f6f26157fa4bd6aacd42d1df5621c784aefc46cea970719193063d079c158152723bf6015791c5bc456dc3533c52380e33778783d68e12438b63} 2025/04/30 09:21:43 server Skipping packet number 11 2025/04/30 09:21:43 server -> Sending packet 13 (1061 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:43 Removing connection IDs [e36ec78f 9c4a3632] for a closed connection after it has been retired. 2025/04/30 09:21:43 Removing connection ID ddbd08e3093b2af4 after it has been retired. 2025/04/30 09:21:43 Removing connection IDs [c7ecd684 c8628b71 476520ee] for a closed connection after it has been retired. 2025/04/30 09:21:43 server <- Reading packet 5 (95 bytes) for connection 42ab6cc2, Handshake 2025/04/30 09:21:43 server Long Header{Type: Handshake, DestConnectionID: 42ab6cc2, SrcConnectionID: 115cd486102b7a406eaff44bfa46c4a7, PacketNumber: 5, PacketNumberLen: 1, Length: 66, Version: v1} 2025/04/30 09:21:43 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 4, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 11.516432s} 2025/04/30 09:21:43 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:43 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:43 Retiring connection ID 359af0026eea2e16 in 5s. 2025/04/30 09:21:43 server Dropping Handshake keys. 2025/04/30 09:21:43 server Dropping %!s(logging.PacketType=1) packet (95 bytes) because we already dropped the keys. 2025/04/30 09:21:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:43 server -> Sending packet 2 (315 bytes) for connection 359af0026eea2e16, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 82b5f32a, StatelessResetToken: 0xf5d672706de33a2ea48226878e38ec14} 2025/04/30 09:21:43 server -> &wire.NewTokenFrame{Token: 0x20d2dd454877492b91ffe93c4ac8b8f0a2d2c971971968759246b5ae9dde72f9aa8d14c2f6e45a2ed267d4cfd4fea31a92970d0d682cc704b22c7e5beae25c0c05c426184a1969bf0c27962e5d5bb90ca941b4e2bb11} 2025/04/30 09:21:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bf2bdcf7, StatelessResetToken: 0x22144d8cb9c952669a10ab5918d41821} 2025/04/30 09:21:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:43 server -> Sending packet 3 (315 bytes) for connection 359af0026eea2e16, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.NewTokenFrame{Token: 0x20d2dd454877492b91ffe93c4ac8b8f0a2d2c971971968759246b5ae9dde72f9aa8d14c2f6e45a2ed267d4cfd4fea31a92970d0d682cc704b22c7e5beae25c0c05c426184a1969bf0c27962e5d5bb90ca941b4e2bb11} 2025/04/30 09:21:43 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 82b5f32a, StatelessResetToken: 0xf5d672706de33a2ea48226878e38ec14} 2025/04/30 09:21:43 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:43 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: bf2bdcf7, StatelessResetToken: 0x22144d8cb9c952669a10ab5918d41821} 2025/04/30 09:21:43 server <- Reading packet 0 (45 bytes) for connection 42ab6cc2, 1-RTT 2025/04/30 09:21:43 server Short Header{DestConnectionID: 42ab6cc2, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:43 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:43 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:43 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:43 server -> Sending packet 4 (46 bytes) for connection 359af0026eea2e16, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.999548948s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:43 Received request: GET /wyballralz 2025/04/30 09:21:43 server -> Sending packet 5 (1061 bytes) for connection 359af0026eea2e16, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 115cd486102b7a406eaff44bfa46c4a7, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:43 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 09:21:43 server -> Sending packet 22 (37 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:43 server Skipping packet number 21 2025/04/30 09:21:43 server -> Sending packet 23 (38 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:43 Removing connection ID 9db3bee0 after it has been retired. 2025/04/30 09:21:43 server <- Reading packet 1 (141 bytes) for connection 82b5f32a, 1-RTT 2025/04/30 09:21:43 server Short Header{DestConnectionID: 82b5f32a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:43 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 1.576ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:43 server newly acked packets (1): [3] 2025/04/30 09:21:43 server ECN capability confirmed. 2025/04/30 09:21:43 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 0b6b96eb7358e0e57e140afefeeeb3b5, StatelessResetToken: 0x5db0bdd5856cb26775771bfb51e67275} 2025/04/30 09:21:43 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: d2878d4f57f25bf701812f8d98540492, StatelessResetToken: 0x7abd7c662928db58756064c374679b49} 2025/04/30 09:21:43 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 0d5dd8a299ab861b2fa937f47431ae30, StatelessResetToken: 0xd38615b5a483645ba4d0a1804c80f8fe} 2025/04/30 09:21:43 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:43 Retiring connection ID 42ab6cc2 in 5s. 2025/04/30 09:21:43 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:43 server -> Sending packet 6 (45 bytes) for connection 359af0026eea2e16, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:43 server Short Header{DestConnectionID: 0b6b96eb7358e0e57e140afefeeeb3b5, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:43 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 212.427µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:43 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:43 server <- Reading packet 2 (43 bytes) for connection 82b5f32a, 1-RTT 2025/04/30 09:21:43 server Short Header{DestConnectionID: 82b5f32a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:43 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:43 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:43 Replacing connection for connection IDs [bf2bdcf7 82b5f32a] with a closed connection. 2025/04/30 09:21:43 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:43 server Connection 359af0026eea2e16 closed. 2025/04/30 09:21:44 Removing connection ID a18a0d5bd0205eaf after it has been retired. 2025/04/30 09:21:44 Removing connection ID 9618efb4 after it has been retired. 2025/04/30 09:21:44 Removing connection ID f58609aa after it has been retired. 2025/04/30 09:21:44 Removing connection ID effb1374b15b553b after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [efb27675 7a128ad4] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection ID 34aaed880e0104b3 after it has been retired. 2025/04/30 09:21:44 Removing connection ID e7bb776f21e0d390 after it has been retired. 2025/04/30 09:21:44 Removing connection ID 0bff59d0 after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [292fa9fd 4160bbcc] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection ID 6d87784948e64867 after it has been retired. 2025/04/30 09:21:44 Removing connection ID 8e45749f after it has been retired. 2025/04/30 09:21:44 Removing connection ID f25083d98837c071 after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [a803e185 2d9a6e11 0fa42d47] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [d30ff9c1 ec1983d5] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection ID a15049ea6c4a1b38 after it has been retired. 2025/04/30 09:21:44 Removing connection ID adc93156 after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [ec34bad6 0eec5a76] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection ID 44bc9ec4 after it has been retired. 2025/04/30 09:21:44 Removing connection ID 1e0bac2497bc4802 after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [d0872b8a 2ec746b4] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [13b62f09 34798cec] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [36c00588 4857d571] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection ID e2501aed128fb288 after it has been retired. 2025/04/30 09:21:44 Removing connection ID e99fa0cb after it has been retired. 2025/04/30 09:21:44 Removing connection ID fef22c25d7e0ddf4 after it has been retired. 2025/04/30 09:21:44 Removing connection ID a9ccd6fc9b88f19b after it has been retired. 2025/04/30 09:21:44 Removing connection ID 09aff03dcb509c02 after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [97a4264a b40871fe ebdbdb24] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection ID 097294eaa3b0d938 after it has been retired. 2025/04/30 09:21:44 Removing connection ID 4de520d7 after it has been retired. 2025/04/30 09:21:44 Removing connection ID 36684893 after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [b620f76b 2924d457] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [f43812fb 97d1ee0d 77a8a245] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [6a32fe24 edd77dca] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [124fba0d 9d4c868a 6644e98c] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection ID 706f1af477cbdccc after it has been retired. 2025/04/30 09:21:44 Removing connection ID bdf137cb after it has been retired. 2025/04/30 09:21:44 Removing connection ID d8cc1a7f0a1a9204 after it has been retired. 2025/04/30 09:21:44 Removing connection ID dda66dd1 after it has been retired. 2025/04/30 09:21:44 Removing connection ID c1857bc7 after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [d5993c7e 6edb26e9] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection ID 4fe27f3c015e81f2 after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [36f45aa2 d2bf1dd5 0ac1e30e] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [0c195b79 637c4cd2] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection IDs [284e3e59 e13811a6] for a closed connection after it has been retired. 2025/04/30 09:21:44 Removing connection ID 3876ec90 after it has been retired. 2025/04/30 09:21:44 Removing connection ID be73781a35aac5b5 after it has been retired. 2025/04/30 09:21:44 Removing connection ID 6f72c96a after it has been retired. 2025/04/30 09:21:44 Removing connection ID e634ede3f0e52346 after it has been retired. 2025/04/30 09:21:44 Removing connection ID 1c57c63c after it has been retired. 2025/04/30 09:21:44 Removing connection ID f4f8751f43fbb68d after it has been retired. 2025/04/30 09:21:45 Tracking 69 connection IDs and 1 reset tokens. 2025/04/30 09:21:45 Removing connection IDs [d53315bb 6d9b0862] for a closed connection after it has been retired. 2025/04/30 09:21:45 Removing connection IDs [35369e4e b7d0bdae] for a closed connection after it has been retired. 2025/04/30 09:21:45 Removing connection ID 42e40f3b after it has been retired. 2025/04/30 09:21:45 Removing connection ID 71d4e99004edffad after it has been retired. 2025/04/30 09:21:45 Removing connection IDs [199d873a b9a85536] for a closed connection after it has been retired. 2025/04/30 09:21:45 server <- Received Initial packet. 2025/04/30 09:21:45 Created qlog file: /logs/qlog/8eb5242f3809c492.sqlog 2025/04/30 09:21:45 server Changing connection ID to 75da12ea. 2025/04/30 09:21:45 Adding connection IDs 8eb5242f3809c492 and 75da12ea for a new connection. 2025/04/30 09:21:45 server <- Reading packet 10 (1200 bytes) for connection 8eb5242f3809c492, Initial 2025/04/30 09:21:45 server Long Header{Type: Initial, DestConnectionID: 8eb5242f3809c492, SrcConnectionID: 41ecf0298693a50ca4b7812671ac57b2, Token: (empty), PacketNumber: 10, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:45 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:45 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:45 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:45 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 41ecf0298693a50ca4b7812671ac57b2, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:21:45 Adding connection ID 3e90302f. 2025/04/30 09:21:45 Adding connection ID 07ae24e7. 2025/04/30 09:21:45 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8eb5242f3809c492 2025/04/30 09:21:45 server Long Header{Type: Initial, DestConnectionID: 41ecf0298693a50ca4b7812671ac57b2, SrcConnectionID: 75da12ea, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 412, Version: v1} 2025/04/30 09:21:45 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:21:45 server Long Header{Type: Handshake, DestConnectionID: 41ecf0298693a50ca4b7812671ac57b2, SrcConnectionID: 75da12ea, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 09:21:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 09:21:45 server Short Header{DestConnectionID: 41ecf0298693a50ca4b7812671ac57b2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 07ae24e7, StatelessResetToken: 0x44438d351076b780fd57bef0a2713e39} 2025/04/30 09:21:45 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e90302f, StatelessResetToken: 0x0022fb32d9ece461f31df7c11f90266d} 2025/04/30 09:21:45 server <- Reading packet 12 (1200 bytes) for connection 8eb5242f3809c492, Initial 2025/04/30 09:21:45 server Long Header{Type: Initial, DestConnectionID: 8eb5242f3809c492, SrcConnectionID: 41ecf0298693a50ca4b7812671ac57b2, Token: (empty), PacketNumber: 12, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:21:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:21:45 server -> Sending packet 1 (58 bytes) for connection 8eb5242f3809c492, Initial 2025/04/30 09:21:45 server Long Header{Type: Initial, DestConnectionID: 41ecf0298693a50ca4b7812671ac57b2, SrcConnectionID: 75da12ea, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:21:45 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 10, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:45 Removing connection ID 27df7594 after it has been retired. 2025/04/30 09:21:45 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:21:45 server <- Reading packet 13 (66 bytes) for connection 07ae24e7, Initial 2025/04/30 09:21:45 server Long Header{Type: Initial, DestConnectionID: 07ae24e7, SrcConnectionID: 41ecf0298693a50ca4b7812671ac57b2, Token: (empty), PacketNumber: 13, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:21:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.168ms} 2025/04/30 09:21:45 server newly acked packets (1): [0] 2025/04/30 09:21:45 server updated RTT: 36.853542ms (σ: 18.426771ms) 2025/04/30 09:21:45 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:21:45 server <- Reading packet 0 (1134 bytes) for connection 07ae24e7, Handshake 2025/04/30 09:21:45 server Long Header{Type: Handshake, DestConnectionID: 07ae24e7, SrcConnectionID: 41ecf0298693a50ca4b7812671ac57b2, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:21:45 server Dropping Initial keys. 2025/04/30 09:21:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 20.168ms} 2025/04/30 09:21:45 server newly acked packets (1): [0] 2025/04/30 09:21:45 server updated RTT: 36.853ms (σ: 13.819ms) 2025/04/30 09:21:45 server Canceling loss detection timer. 2025/04/30 09:21:45 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:21:45 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:21:45 Retiring connection ID 8eb5242f3809c492 in 5s. 2025/04/30 09:21:45 server Dropping Handshake keys. 2025/04/30 09:21:45 server <- Reading packet 0 (43 bytes) for connection 07ae24e7, 1-RTT 2025/04/30 09:21:45 server Short Header{DestConnectionID: 07ae24e7, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:45 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.52ms} 2025/04/30 09:21:45 server newly acked packets (1): [0] 2025/04/30 09:21:45 server updated RTT: 36.856ms (σ: 10.371ms) 2025/04/30 09:21:45 server Canceling loss detection timer. 2025/04/30 09:21:45 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:45 Retiring connection ID 75da12ea in 5s. 2025/04/30 09:21:45 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:21:45 server -> Sending packet 1 (276 bytes) for connection 8eb5242f3809c492, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:45 server Short Header{DestConnectionID: 41ecf0298693a50ca4b7812671ac57b2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:45 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 649.354µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:45 server -> &wire.NewTokenFrame{Token: 0x62a590f7022ff4de21bc0e6f66703931528ad4c64e9bb8b458b5f58215f3235a54cece248596c768c94307d9d11b1606b4ee0eba1f5b111ea28f3934e9ecfd1e70087987436bca30f49446d526a3513a00cfc5c2067e} 2025/04/30 09:21:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:45 server <- Reading packet 1 (45 bytes) for connection 07ae24e7, 1-RTT 2025/04/30 09:21:45 server Short Header{DestConnectionID: 07ae24e7, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:45 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:45 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:45 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:45 Received request: GET /hboimtgoca 2025/04/30 09:21:45 server -> Sending packet 2 (1070 bytes) for connection 8eb5242f3809c492, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:45 server Short Header{DestConnectionID: 41ecf0298693a50ca4b7812671ac57b2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:45 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 832.458µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:45 Removing connection IDs [3a434476 0cb3e0bd] for a closed connection after it has been retired. 2025/04/30 09:21:45 Removing connection IDs [f3fd5f99 6a57bb87] for a closed connection after it has been retired. 2025/04/30 09:21:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:45 server -> Sending packet 4 (267 bytes) for connection 8eb5242f3809c492, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:45 server Short Header{DestConnectionID: 41ecf0298693a50ca4b7812671ac57b2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:45 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:45 server -> &wire.NewTokenFrame{Token: 0x62a590f7022ff4de21bc0e6f66703931528ad4c64e9bb8b458b5f58215f3235a54cece248596c768c94307d9d11b1606b4ee0eba1f5b111ea28f3934e9ecfd1e70087987436bca30f49446d526a3513a00cfc5c2067e} 2025/04/30 09:21:45 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:45 server Skipping packet number 3 2025/04/30 09:21:45 server -> Sending packet 5 (1061 bytes) for connection 8eb5242f3809c492, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:45 server Short Header{DestConnectionID: 41ecf0298693a50ca4b7812671ac57b2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:45 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:45 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:45 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:21:45 server <- Reading packet 2 (141 bytes) for connection 07ae24e7, 1-RTT 2025/04/30 09:21:45 server Short Header{DestConnectionID: 07ae24e7, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:45 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 984µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:45 server newly acked packets (1): [4] 2025/04/30 09:21:45 server updated RTT: 36.433ms (σ: 8.622ms) 2025/04/30 09:21:45 server ECN capability confirmed. 2025/04/30 09:21:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 4025dfe806a37f54be5b0843dbb77547, StatelessResetToken: 0x838a66fb36d08d2b83c50ad87bff3f4b} 2025/04/30 09:21:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: b3f58e2986c79a7ef93a98be794a10fa, StatelessResetToken: 0xb9e3a2925a13510fa3632c58fef42d8d} 2025/04/30 09:21:45 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: eff03d02f578f0baaaffa9914651251c, StatelessResetToken: 0xa9a183ce9e37c9302c1d57fbfbfe70ce} 2025/04/30 09:21:45 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:45 server -> Sending packet 6 (45 bytes) for connection 8eb5242f3809c492, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:45 server Short Header{DestConnectionID: 4025dfe806a37f54be5b0843dbb77547, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:45 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 254.376µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:45 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:45 server <- Reading packet 3 (43 bytes) for connection 07ae24e7, 1-RTT 2025/04/30 09:21:45 server Short Header{DestConnectionID: 07ae24e7, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:45 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 26.264ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:45 server newly acked packets (1): [5] 2025/04/30 09:21:45 server updated RTT: 36.302ms (σ: 6.727ms) 2025/04/30 09:21:45 server -> Sending packet 7 (38 bytes) for connection 8eb5242f3809c492, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:45 server Short Header{DestConnectionID: 4025dfe806a37f54be5b0843dbb77547, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:45 Removing connection ID 9491f379 after it has been retired. 2025/04/30 09:21:45 Removing connection ID cb073c71c2cf2037 after it has been retired. 2025/04/30 09:21:45 Removing connection ID fe10060e after it has been retired. 2025/04/30 09:21:45 Removing connection ID 7d80f5e188046738 after it has been retired. 2025/04/30 09:21:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:45 server -> Sending packet 9 (37 bytes) for connection 8eb5242f3809c492, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:45 server Short Header{DestConnectionID: 4025dfe806a37f54be5b0843dbb77547, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:45 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:45 server Skipping packet number 8 2025/04/30 09:21:45 server -> Sending packet 10 (38 bytes) for connection 8eb5242f3809c492, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:45 server Short Header{DestConnectionID: 4025dfe806a37f54be5b0843dbb77547, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:45 server -> Sending packet 11 (1366 bytes) for connection 8eb5242f3809c492, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:45 server Short Header{DestConnectionID: 4025dfe806a37f54be5b0843dbb77547, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:45 server -> &wire.PingFrame{} 2025/04/30 09:21:45 Removing connection IDs [51611844 8bd59e7a] for a closed connection after it has been retired. 2025/04/30 09:21:45 Removing connection IDs [77cf5696 5d3229a4] for a closed connection after it has been retired. 2025/04/30 09:21:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:21:45 server -> Sending packet 13 (37 bytes) for connection 8eb5242f3809c492, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:45 server Short Header{DestConnectionID: 4025dfe806a37f54be5b0843dbb77547, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:45 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:45 server Skipping packet number 12 2025/04/30 09:21:45 server -> Sending packet 14 (38 bytes) for connection 8eb5242f3809c492, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:45 server Short Header{DestConnectionID: 4025dfe806a37f54be5b0843dbb77547, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:45 Removing connection ID 63d1b493978387c5 after it has been retired. 2025/04/30 09:21:45 Removing connection IDs [6bfd4661 090090e0] for a closed connection after it has been retired. 2025/04/30 09:21:45 server Destroying connection: timeout: no recent network activity 2025/04/30 09:21:45 Removing connection ID ae51fd6706fb517e. 2025/04/30 09:21:45 Removing connection ID e256d62e. 2025/04/30 09:21:45 Removing connection ID 666195e9. 2025/04/30 09:21:45 Removing connection ID e512d63b. 2025/04/30 09:21:45 Error accepting stream: timeout: no recent network activity 2025/04/30 09:21:45 server Connection ae51fd6706fb517e closed. 2025/04/30 09:21:45 server <- Reading packet 4 (43 bytes) for connection 07ae24e7, 1-RTT 2025/04/30 09:21:45 server Short Header{DestConnectionID: 07ae24e7, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:45 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:45 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:45 Replacing connection for connection IDs [3e90302f 07ae24e7] with a closed connection. 2025/04/30 09:21:45 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:45 server Connection 8eb5242f3809c492 closed. 2025/04/30 09:21:45 Removing connection ID 4795df13 after it has been retired. 2025/04/30 09:21:45 Removing connection ID 81e4eb41 after it has been retired. 2025/04/30 09:21:45 Removing connection ID e9906fd9346d0167 after it has been retired. 2025/04/30 09:21:45 Removing connection ID 4f45bd3b after it has been retired. 2025/04/30 09:21:45 Removing connection ID 8c65faf3160cd0d4 after it has been retired. 2025/04/30 09:21:45 Removing connection IDs [22cfe924 21f84675] for a closed connection after it has been retired. 2025/04/30 09:21:45 Removing connection IDs [082a0207 8d679426] for a closed connection after it has been retired. 2025/04/30 09:21:45 Removing connection IDs [bc496778 14ae4885] for a closed connection after it has been retired. 2025/04/30 09:21:45 Removing connection ID f8ba55f2236adf42 after it has been retired. 2025/04/30 09:21:45 Removing connection IDs [20b95aae 69700e46] for a closed connection after it has been retired. 2025/04/30 09:21:45 Removing connection ID a69cb6ec2a8d1a00 after it has been retired. 2025/04/30 09:21:46 Removing connection IDs [d5b6cd92 e7314f78 8ff3b0d2] for a closed connection after it has been retired. 2025/04/30 09:21:46 Removing connection IDs [5fdbe6dd 3910c5c3 df1f5008] for a closed connection after it has been retired. 2025/04/30 09:21:46 server Dropping long header packet of type Handshake (95 bytes) 2025/04/30 09:21:47 Tracking 24 connection IDs and 1 reset tokens. 2025/04/30 09:21:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 09:21:47 server -> Sending packet 15 (267 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: Not-ECT) 2025/04/30 09:21:47 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:47 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:47 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:47 server -> &wire.NewTokenFrame{Token: 0xef459ec2664addeae5ad714647f4001f6ba365a5a27f125fda66a8e7f6f26157fa4bd6aacd42d1df5621c784aefc46cea970719193063d079c158152723bf6015791c5bc456dc3533c52380e33778783d68e12438b63} 2025/04/30 09:21:47 server Skipping packet number 14 2025/04/30 09:21:47 server -> Sending packet 16 (1061 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: Not-ECT) 2025/04/30 09:21:47 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:47 Removing connection ID 7415fa14cece7c21 after it has been retired. 2025/04/30 09:21:47 Removing connection ID 35f27e56 after it has been retired. 2025/04/30 09:21:47 server <- Reading packet 24 (43 bytes) for connection 37a9cec4, 1-RTT 2025/04/30 09:21:47 server Short Header{DestConnectionID: 37a9cec4, PacketNumber: 24, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:47 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 8.09812s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:47 server <- &wire.PingFrame{} 2025/04/30 09:21:47 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:47 server -> Sending packet 12 (53 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:47 server Short Header{DestConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:47 server -> &wire.AckFrame{LargestAcked: 24, LowestAcked: 0, AckRanges: {{Largest: 24, Smallest: 24}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 166.481µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:47 server <- Reading packet 26 (43 bytes) for connection 37a9cec4, 1-RTT 2025/04/30 09:21:47 server Short Header{DestConnectionID: 37a9cec4, PacketNumber: 26, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:47 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 8.09812s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:21:47 server <- &wire.PingFrame{} 2025/04/30 09:21:47 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:21:47 server -> Sending packet 13 (55 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:47 server Short Header{DestConnectionID: 7368339336cfdf19c210c7316d477c22, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:47 server -> &wire.AckFrame{LargestAcked: 26, LowestAcked: 0, AckRanges: {{Largest: 26, Smallest: 26}, {Largest: 24, Smallest: 24}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 184.52µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:21:47 server <- Reading packet 27 (162 bytes) for connection 37a9cec4, 1-RTT 2025/04/30 09:21:47 server Short Header{DestConnectionID: 37a9cec4, PacketNumber: 27, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:47 server <- &wire.AckFrame{LargestAcked: 13, LowestAcked: 13, DelayTime: 1.416ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:21:47 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 73bc7dce72a1cc70f3e102db80773653, StatelessResetToken: 0x27f52e4bcf5b1d2e8b66979df3ea5742} 2025/04/30 09:21:47 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 0a28ca04c9cf29a3e2169bfaccc5244a, StatelessResetToken: 0xe839082431900f2aed4b1708e339594c} 2025/04/30 09:21:47 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: f446c1cd5bc2dc5d491c627d3b9280a5, StatelessResetToken: 0x160ef4460009a9005dff6856a85a7bf3} 2025/04/30 09:21:47 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:21:47 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:21:47 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:21:47 server -> Sending packet 14 (57 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:47 server Short Header{DestConnectionID: 73bc7dce72a1cc70f3e102db80773653, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:47 server -> &wire.AckFrame{LargestAcked: 27, LowestAcked: 0, AckRanges: {{Largest: 27, Smallest: 26}, {Largest: 24, Smallest: 24}, {Largest: 14, Smallest: 14}, {Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 260.707µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:21:47 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:47 Received request: GET /dsaqhvedxk 2025/04/30 09:21:47 server -> Sending packet 15 (1061 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:47 server Short Header{DestConnectionID: 73bc7dce72a1cc70f3e102db80773653, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:21:47 server -> Sending packet 17 (37 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:47 server Short Header{DestConnectionID: 73bc7dce72a1cc70f3e102db80773653, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:47 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:47 server Skipping packet number 16 2025/04/30 09:21:47 server -> Sending packet 18 (1061 bytes) for connection e7bb776f21e0d390, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:47 server Short Header{DestConnectionID: 73bc7dce72a1cc70f3e102db80773653, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 09:21:47 server -> Sending packet 25 (37 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:47 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 25, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:47 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:47 server Skipping packet number 24 2025/04/30 09:21:47 server -> Sending packet 26 (38 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:47 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 26, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:47 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:47 server <- Reading packet 28 (43 bytes) for connection 37a9cec4, 1-RTT 2025/04/30 09:21:47 server Short Header{DestConnectionID: 37a9cec4, PacketNumber: 28, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:21:47 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:21:47 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:21:47 Replacing connection for connection IDs [37a9cec4 bcc956ff] with a closed connection. 2025/04/30 09:21:47 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:21:47 server Connection e7bb776f21e0d390 closed. 2025/04/30 09:21:47 Removing connection IDs [5979d439 f7f864e9] for a closed connection after it has been retired. 2025/04/30 09:21:48 Removing connection ID 2e4c7276166402d0 after it has been retired. 2025/04/30 09:21:48 Removing connection IDs [acbe6295 ccc6dee7] for a closed connection after it has been retired. 2025/04/30 09:21:48 Removing connection IDs [246078b8 1368d547 c2443724] for a closed connection after it has been retired. 2025/04/30 09:21:48 Removing connection ID 359af0026eea2e16 after it has been retired. 2025/04/30 09:21:48 Removing connection ID 42ab6cc2 after it has been retired. 2025/04/30 09:21:48 Removing connection IDs [bf2bdcf7 82b5f32a] for a closed connection after it has been retired. 2025/04/30 09:21:49 Tracking 10 connection IDs and 1 reset tokens. 2025/04/30 09:21:50 Removing connection ID 75da12ea after it has been retired. 2025/04/30 09:21:50 Removing connection ID 8eb5242f3809c492 after it has been retired. 2025/04/30 09:21:50 Removing connection IDs [3e90302f 07ae24e7] for a closed connection after it has been retired. 2025/04/30 09:21:51 Tracking 6 connection IDs and 1 reset tokens. 2025/04/30 09:21:52 Removing connection IDs [37a9cec4 bcc956ff] for a closed connection after it has been retired. 2025/04/30 09:21:53 Tracking 4 connection IDs and 1 reset tokens. 2025/04/30 09:21:54 server Dropping long header packet of type Handshake (95 bytes) 2025/04/30 09:21:54 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 09:21:54 server -> Sending packet 18 (267 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: Not-ECT) 2025/04/30 09:21:54 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:54 server -> &wire.NewTokenFrame{Token: 0xef459ec2664addeae5ad714647f4001f6ba365a5a27f125fda66a8e7f6f26157fa4bd6aacd42d1df5621c784aefc46cea970719193063d079c158152723bf6015791c5bc456dc3533c52380e33778783d68e12438b63} 2025/04/30 09:21:54 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:21:54 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:21:54 server Skipping packet number 17 2025/04/30 09:21:54 server -> Sending packet 19 (1061 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: Not-ECT) 2025/04/30 09:21:54 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:54 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:21:55 Tracking 4 connection IDs and 1 reset tokens. 2025/04/30 09:21:55 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 09:21:55 server -> Sending packet 28 (37 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:55 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 28, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:55 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:21:55 server Skipping packet number 27 2025/04/30 09:21:55 server -> Sending packet 29 (38 bytes) for connection f4f8751f43fbb68d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:21:55 server Short Header{DestConnectionID: f7604421eb4fcd8647a499e68a9250f3, PacketNumber: 29, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:21:55 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:21:57 Tracking 4 connection IDs and 1 reset tokens. 2025/04/30 09:21:59 Tracking 4 connection IDs and 1 reset tokens. 2025/04/30 09:22:01 Tracking 4 connection IDs and 1 reset tokens. 2025/04/30 09:22:03 Tracking 4 connection IDs and 1 reset tokens. 2025/04/30 09:22:05 Tracking 4 connection IDs and 1 reset tokens. 2025/04/30 09:22:07 Tracking 4 connection IDs and 1 reset tokens. 2025/04/30 09:22:09 Tracking 4 connection IDs and 1 reset tokens. 2025/04/30 09:22:10 server Destroying connection: timeout: no recent network activity 2025/04/30 09:22:10 Removing connection ID b7f83e70. 2025/04/30 09:22:10 Removing connection ID cadf937b. 2025/04/30 09:22:10 server Connection f4f8751f43fbb68d closed. 2025/04/30 09:22:10 Error accepting stream: timeout: no recent network activity 2025/04/30 09:22:10 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 09:22:10 server -> Sending packet 21 (267 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: Not-ECT) 2025/04/30 09:22:10 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:22:10 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:22:10 server -> &wire.NewTokenFrame{Token: 0xef459ec2664addeae5ad714647f4001f6ba365a5a27f125fda66a8e7f6f26157fa4bd6aacd42d1df5621c784aefc46cea970719193063d079c158152723bf6015791c5bc456dc3533c52380e33778783d68e12438b63} 2025/04/30 09:22:10 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:22:10 server Skipping packet number 20 2025/04/30 09:22:10 server -> Sending packet 22 (1061 bytes) for connection 7d80f5e188046738, 1-RTT (ECN: Not-ECT) 2025/04/30 09:22:10 server Short Header{DestConnectionID: 341832630cd2801b40977b639c87ef90, PacketNumber: 22, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:22:10 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:22:10 server Destroying connection: timeout: no recent network activity 2025/04/30 09:22:10 Removing connection ID 181216ef. 2025/04/30 09:22:10 Removing connection ID e36c2440. 2025/04/30 09:22:10 Error accepting stream: timeout: no recent network activity 2025/04/30 09:22:10 server Connection 7d80f5e188046738 closed. 2025/04/30 09:22:10 server Dropping long header packet of type Handshake (95 bytes) 2025/04/30 09:22:11 Tracking 0 connection IDs and 0 reset tokens.