2025/04/30 09:16:16 Increased receive buffer size to 14336 kiB 2025/04/30 09:16:16 Increased send buffer size to 14336 kiB 2025/04/30 09:16:16 Setting DF for IPv4 and IPv6. 2025/04/30 09:16:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:16:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:16:16 server Listening for udp connections on [::]:443 2025/04/30 09:16:17 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:16:17 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:16:17 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 Created qlog file: /logs/qlog/b00ef77e7156cbda.sqlog 2025/04/30 09:16:17 server Changing connection ID to cbb379ff. 2025/04/30 09:16:17 Adding connection IDs b00ef77e7156cbda and cbb379ff for a new connection. 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 Created qlog file: /logs/qlog/919019bc6114c87d.sqlog 2025/04/30 09:16:17 server Changing connection ID to 912de6d9. 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection b00ef77e7156cbda, Initial 2025/04/30 09:16:17 Adding connection IDs 919019bc6114c87d and 912de6d9 for a new connection. 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: b00ef77e7156cbda, SrcConnectionID: 9033af79375e0bb40d3a3a4351fcc094, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:17 Created qlog file: /logs/qlog/57ab678ef976cdb7.sqlog 2025/04/30 09:16:17 server Changing connection ID to a1bffb21. 2025/04/30 09:16:17 Adding connection IDs 57ab678ef976cdb7 and a1bffb21 for a new connection. 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection 919019bc6114c87d, Initial 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection 57ab678ef976cdb7, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 919019bc6114c87d, SrcConnectionID: eca5c308cce18f5d257e99f772eec709, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 57ab678ef976cdb7, SrcConnectionID: 8c188c3499cd350cacd5051597b56a58, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 Created qlog file: /logs/qlog/ca0a5eb4fbaf3c71.sqlog 2025/04/30 09:16:17 server Changing connection ID to ec9e41ea. 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 Adding connection IDs ca0a5eb4fbaf3c71 and ec9e41ea for a new connection. 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection ca0a5eb4fbaf3c71, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: ca0a5eb4fbaf3c71, SrcConnectionID: e60b80b326a05d8d2b98991720e82561, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 9033af79375e0bb40d3a3a4351fcc094, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 Adding connection ID b63e6bc6. 2025/04/30 09:16:17 Adding connection ID 9ee3bc63. 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: eca5c308cce18f5d257e99f772eec709, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 Adding connection ID b32df9f2. 2025/04/30 09:16:17 Adding connection ID 91dbc8e3. 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b00ef77e7156cbda 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 9033af79375e0bb40d3a3a4351fcc094, SrcConnectionID: cbb379ff, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 403, Version: v1} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 9033af79375e0bb40d3a3a4351fcc094, SrcConnectionID: cbb379ff, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:16:17 server Short Header{DestConnectionID: 9033af79375e0bb40d3a3a4351fcc094, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 919019bc6114c87d 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: eca5c308cce18f5d257e99f772eec709, SrcConnectionID: 912de6d9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 406, Version: v1} 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: eca5c308cce18f5d257e99f772eec709, SrcConnectionID: 912de6d9, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 09:16:17 server Short Header{DestConnectionID: eca5c308cce18f5d257e99f772eec709, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 8c188c3499cd350cacd5051597b56a58, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 91dbc8e3, StatelessResetToken: 0xbb42d3e3468248c36d97968ac36e2669} 2025/04/30 09:16:17 Adding connection ID 022f8f0f. 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b63e6bc6, StatelessResetToken: 0xfe3213a13e252ece63e51f8f8935d8b5} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9ee3bc63, StatelessResetToken: 0x2947ea2e881c586373acfcabe3005282} 2025/04/30 09:16:17 Adding connection ID 161ce9f6. 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b32df9f2, StatelessResetToken: 0x330e404a9313682dfac821cb34613823} 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 57ab678ef976cdb7 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 8c188c3499cd350cacd5051597b56a58, SrcConnectionID: a1bffb21, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 411, Version: v1} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 8c188c3499cd350cacd5051597b56a58, SrcConnectionID: a1bffb21, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 09:16:17 server Short Header{DestConnectionID: 8c188c3499cd350cacd5051597b56a58, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 161ce9f6, StatelessResetToken: 0x73373cbc151f5dc74f22e9d813faa2d4} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 022f8f0f, StatelessResetToken: 0x50dab67791b0a8b5f5aa8fea0a151419} 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e60b80b326a05d8d2b98991720e82561, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 Adding connection ID c181b447. 2025/04/30 09:16:17 Adding connection ID 86c4423e. 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection ca0a5eb4fbaf3c71 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: e60b80b326a05d8d2b98991720e82561, SrcConnectionID: ec9e41ea, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 406, Version: v1} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: e60b80b326a05d8d2b98991720e82561, SrcConnectionID: ec9e41ea, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 09:16:17 server Short Header{DestConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 86c4423e, StatelessResetToken: 0x67e4cecddb0f02ba7b3a584c3a34f9ca} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c181b447, StatelessResetToken: 0x91ceaba1748e0013343b6810d99940aa} 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 Created qlog file: /logs/qlog/a8a82c7728e52f1b.sqlog 2025/04/30 09:16:17 server Changing connection ID to 09785eac. 2025/04/30 09:16:17 Adding connection IDs a8a82c7728e52f1b and 09785eac for a new connection. 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection a8a82c7728e52f1b, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: a8a82c7728e52f1b, SrcConnectionID: 3b29affabe4b1a7089eae514b3a39e82, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 3b29affabe4b1a7089eae514b3a39e82, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 Adding connection ID 0c448182. 2025/04/30 09:16:17 Adding connection ID ccfe9bf4. 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection a8a82c7728e52f1b 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 3b29affabe4b1a7089eae514b3a39e82, SrcConnectionID: 09785eac, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 415, Version: v1} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 3b29affabe4b1a7089eae514b3a39e82, SrcConnectionID: 09785eac, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 09:16:17 server Short Header{DestConnectionID: 3b29affabe4b1a7089eae514b3a39e82, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ccfe9bf4, StatelessResetToken: 0x165af538862b652ec5f4c051f16592a3} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0c448182, StatelessResetToken: 0x3d6259929d1921bb31146cc67d42e48e} 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 Created qlog file: /logs/qlog/361b43c33ab9281b.sqlog 2025/04/30 09:16:17 server Changing connection ID to 5acf5010. 2025/04/30 09:16:17 Adding connection IDs 361b43c33ab9281b and 5acf5010 for a new connection. 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection 361b43c33ab9281b, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 361b43c33ab9281b, SrcConnectionID: 77085a0c36e3884f4a044de610098653, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 77085a0c36e3884f4a044de610098653, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 Adding connection ID 6f922994. 2025/04/30 09:16:17 Adding connection ID 6b11bd31. 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 361b43c33ab9281b 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 77085a0c36e3884f4a044de610098653, SrcConnectionID: 5acf5010, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 412, Version: v1} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 77085a0c36e3884f4a044de610098653, SrcConnectionID: 5acf5010, PacketNumber: 0, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 09:16:17 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6b11bd31, StatelessResetToken: 0x20aa1055278da2c15a5a1ea47f9a5cf4} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6f922994, StatelessResetToken: 0x11696c34c1cf345ebcbea3f8581e8390} 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 Created qlog file: /logs/qlog/2ea59512a7c0eb2d.sqlog 2025/04/30 09:16:17 server Changing connection ID to ca377306. 2025/04/30 09:16:17 Adding connection IDs 2ea59512a7c0eb2d and ca377306 for a new connection. 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection 2ea59512a7c0eb2d, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 2ea59512a7c0eb2d, SrcConnectionID: 80a91020825f2722a453ee6758e451ed, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 80a91020825f2722a453ee6758e451ed, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 Adding connection ID 536565e6. 2025/04/30 09:16:17 Adding connection ID ea489489. 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2ea59512a7c0eb2d 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 80a91020825f2722a453ee6758e451ed, SrcConnectionID: ca377306, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 416, Version: v1} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 80a91020825f2722a453ee6758e451ed, SrcConnectionID: ca377306, PacketNumber: 0, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 09:16:17 server Short Header{DestConnectionID: 80a91020825f2722a453ee6758e451ed, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 536565e6, StatelessResetToken: 0xd747a32809c3daa40d8978ca2e887868} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea489489, StatelessResetToken: 0x48e163a068f9d6c90531c62e579e8c62} 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 Created qlog file: /logs/qlog/5c2c656f0265f3b8.sqlog 2025/04/30 09:16:17 server Changing connection ID to 3426baee. 2025/04/30 09:16:17 Adding connection IDs 5c2c656f0265f3b8 and 3426baee for a new connection. 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection 5c2c656f0265f3b8, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 5c2c656f0265f3b8, SrcConnectionID: a526da0e0fd968cdbc5a50ab93ad4b21, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a526da0e0fd968cdbc5a50ab93ad4b21, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 Adding connection ID 6ee5af31. 2025/04/30 09:16:17 Adding connection ID bd25437c. 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5c2c656f0265f3b8 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: a526da0e0fd968cdbc5a50ab93ad4b21, SrcConnectionID: 3426baee, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 403, Version: v1} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: a526da0e0fd968cdbc5a50ab93ad4b21, SrcConnectionID: 3426baee, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:16:17 server Short Header{DestConnectionID: a526da0e0fd968cdbc5a50ab93ad4b21, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6ee5af31, StatelessResetToken: 0xcf9eadd64a92dc9625ce876f8095668c} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: bd25437c, StatelessResetToken: 0x29ee105aeec54d538262a4ae1707b8f8} 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 Created qlog file: /logs/qlog/239b72c345ee7832.sqlog 2025/04/30 09:16:17 server Changing connection ID to a79af2a0. 2025/04/30 09:16:17 Adding connection IDs 239b72c345ee7832 and a79af2a0 for a new connection. 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection 239b72c345ee7832, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 239b72c345ee7832, SrcConnectionID: e2f884704e9b4f56b5379f94390ae1d3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e2f884704e9b4f56b5379f94390ae1d3, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 Adding connection ID a03ca1e0. 2025/04/30 09:16:17 Adding connection ID d7e157b3. 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 239b72c345ee7832 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, SrcConnectionID: a79af2a0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 408, Version: v1} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, SrcConnectionID: a79af2a0, PacketNumber: 0, PacketNumberLen: 2, Length: 730, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 708, Offset + Data length: 708} 2025/04/30 09:16:17 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a03ca1e0, StatelessResetToken: 0x2f25256907c02e9cb28310db04d3caa1} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d7e157b3, StatelessResetToken: 0x634aae294488391a2c0d034498c4bb6f} 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 Created qlog file: /logs/qlog/d52a7d49a0992d4d.sqlog 2025/04/30 09:16:17 server Changing connection ID to 3f71ac0c. 2025/04/30 09:16:17 Adding connection IDs d52a7d49a0992d4d and 3f71ac0c for a new connection. 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection d52a7d49a0992d4d, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: d52a7d49a0992d4d, SrcConnectionID: f8eab3a72d8e5ae389154b7029939245, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: f8eab3a72d8e5ae389154b7029939245, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 Adding connection ID 28aba658. 2025/04/30 09:16:17 Adding connection ID 18389604. 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d52a7d49a0992d4d 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: f8eab3a72d8e5ae389154b7029939245, SrcConnectionID: 3f71ac0c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 404, Version: v1} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: f8eab3a72d8e5ae389154b7029939245, SrcConnectionID: 3f71ac0c, PacketNumber: 0, PacketNumberLen: 2, Length: 734, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 712, Offset + Data length: 712} 2025/04/30 09:16:17 server Short Header{DestConnectionID: f8eab3a72d8e5ae389154b7029939245, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 18389604, StatelessResetToken: 0xb080aafd229512a38cada5001826648e} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 28aba658, StatelessResetToken: 0x2152f34439578f35d751b06d590ed2db} 2025/04/30 09:16:17 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:16:17 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:17 server <- Reading packet 1 (66 bytes) for connection 161ce9f6, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 161ce9f6, SrcConnectionID: 8c188c3499cd350cacd5051597b56a58, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 45.176ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 45.38715ms (σ: 22.693575ms) 2025/04/30 09:16:17 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:17 server <- Reading packet 0 (1134 bytes) for connection 161ce9f6, Handshake 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 161ce9f6, SrcConnectionID: 8c188c3499cd350cacd5051597b56a58, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:17 server Dropping Initial keys. 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 45.176ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 45.387ms (σ: 17.019ms) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 Retiring connection ID 57ab678ef976cdb7 in 5s. 2025/04/30 09:16:17 server Dropping Handshake keys. 2025/04/30 09:16:17 server -> Sending packet 1 (267 bytes) for connection 57ab678ef976cdb7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 8c188c3499cd350cacd5051597b56a58, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0x1f3cc18e5195534cd63699188ed1c7a64f2df312e8248fdfb2375abe0f3b3f7ea46804ab0d57ae5603ddbb077a6e9746fa93f4fec084bc4a1609575d73f723c2bede80739d18f253ac40b2918c2e0f1027784bf6f089} 2025/04/30 09:16:17 server <- Reading packet 0 (43 bytes) for connection 161ce9f6, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 161ce9f6, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 5.64ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 45.401ms (σ: 12.794ms) 2025/04/30 09:16:17 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:17 Retiring connection ID a1bffb21 in 5s. 2025/04/30 09:16:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:17 server -> Sending packet 2 (43 bytes) for connection 57ab678ef976cdb7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 8c188c3499cd350cacd5051597b56a58, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 443.034µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:17 server <- Reading packet 1 (66 bytes) for connection 86c4423e, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 86c4423e, SrcConnectionID: e60b80b326a05d8d2b98991720e82561, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 45.176ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 46.012818ms (σ: 23.006409ms) 2025/04/30 09:16:17 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:17 server <- Reading packet 0 (1134 bytes) for connection 86c4423e, Handshake 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 86c4423e, SrcConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:17 server Dropping Initial keys. 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 45.176ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 46.012ms (σ: 17.254ms) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 Retiring connection ID ca0a5eb4fbaf3c71 in 5s. 2025/04/30 09:16:17 server Dropping Handshake keys. 2025/04/30 09:16:17 server -> Sending packet 1 (267 bytes) for connection ca0a5eb4fbaf3c71, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0x84b7de2d136743ccd07099155d0d393dd22b7882c825c33567d23e95058b7b8e1fa3c8ab49fc98996b4de8f4d85e7d67a43b82074a9b63a8307b663e494111707f6b8f46a2ce93414fcb15eb2538b59a2c029f75e5af} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server Queueing packet (43 bytes) for later decryption 2025/04/30 09:16:17 server <- Reading packet 1 (45 bytes) for connection 161ce9f6, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 161ce9f6, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:17 server <- Reading packet 1 (45 bytes) for connection 86c4423e, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 86c4423e, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:17 Received request: GET /cfeizdxfsf 2025/04/30 09:16:17 Received request: GET /jjzagbxlnd 2025/04/30 09:16:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:17 server -> Sending packet 2 (43 bytes) for connection ca0a5eb4fbaf3c71, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 209.359µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> Sending packet 3 (1070 bytes) for connection 57ab678ef976cdb7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 8c188c3499cd350cacd5051597b56a58, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 555.368µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:17 server -> Sending packet 3 (1061 bytes) for connection ca0a5eb4fbaf3c71, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:17 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:17 server <- Reading packet 1 (66 bytes) for connection 6ee5af31, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 6ee5af31, SrcConnectionID: a526da0e0fd968cdbc5a50ab93ad4b21, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 38.64ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 44.696848ms (σ: 22.348424ms) 2025/04/30 09:16:17 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:17 server <- Reading packet 0 (1134 bytes) for connection 6ee5af31, Handshake 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 6ee5af31, SrcConnectionID: a526da0e0fd968cdbc5a50ab93ad4b21, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:17 server Dropping Initial keys. 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 38.64ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 44.696ms (σ: 16.761ms) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 Retiring connection ID 5c2c656f0265f3b8 in 5s. 2025/04/30 09:16:17 server Dropping Handshake keys. 2025/04/30 09:16:17 server <- Reading packet 0 (43 bytes) for connection 6ee5af31, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 6ee5af31, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.824ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 44.698ms (σ: 12.575ms) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:17 Retiring connection ID 3426baee in 5s. 2025/04/30 09:16:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:17 server -> Sending packet 1 (275 bytes) for connection 5c2c656f0265f3b8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: a526da0e0fd968cdbc5a50ab93ad4b21, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 443.098µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0x879bae76e95a8bcc3099983dbf6b77898697802d35223cd4150c3a9a0820e254939498adbc39e540e0d479df43b7c12e9775531631f8720c23a60d932e257f4009f686dde735f7ffffcf73f5a6dcdc3819dd225e308a} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:17 server <- Reading packet 1 (66 bytes) for connection a03ca1e0, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: a03ca1e0, SrcConnectionID: e2f884704e9b4f56b5379f94390ae1d3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 38.64ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 43.796921ms (σ: 21.89846ms) 2025/04/30 09:16:17 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:17 server <- Reading packet 0 (1134 bytes) for connection a03ca1e0, Handshake 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: a03ca1e0, SrcConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:17 server Dropping Initial keys. 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 38.64ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 43.796ms (σ: 16.423ms) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 Retiring connection ID 239b72c345ee7832 in 5s. 2025/04/30 09:16:17 server Dropping Handshake keys. 2025/04/30 09:16:17 server -> Sending packet 1 (267 bytes) for connection 239b72c345ee7832, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0x061ac6b7d35ec32854a934ec0a3f4e405942b5c559b0660006abf8ed7e0d48894918df2a7567f4df2c26f84fbf1aeb001a141ea4320e1a307c9da407500c9511fe0c159b41a15ee23fa879e8521bb45f7751d1680f92} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server <- Reading packet 0 (43 bytes) for connection a03ca1e0, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: a03ca1e0, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.824ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 43.821ms (σ: 12.368ms) 2025/04/30 09:16:17 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:17 Retiring connection ID a79af2a0 in 5s. 2025/04/30 09:16:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:17 server -> Sending packet 2 (43 bytes) for connection 239b72c345ee7832, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 218.706µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:17 server <- Reading packet 1 (66 bytes) for connection 18389604, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 18389604, SrcConnectionID: f8eab3a72d8e5ae389154b7029939245, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 38.64ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 43.934921ms (σ: 21.96746ms) 2025/04/30 09:16:17 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:17 server <- Reading packet 0 (1134 bytes) for connection 18389604, Handshake 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 18389604, SrcConnectionID: f8eab3a72d8e5ae389154b7029939245, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:17 server Dropping Initial keys. 2025/04/30 09:16:17 server <- Reading packet 1 (45 bytes) for connection 6ee5af31, 1-RTT 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 38.64ms} 2025/04/30 09:16:17 server Short Header{DestConnectionID: 6ee5af31, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:17 server <- Reading packet 1 (45 bytes) for connection a03ca1e0, 1-RTT 2025/04/30 09:16:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:17 server Short Header{DestConnectionID: a03ca1e0, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 43.934ms (σ: 16.475ms) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:17 Received request: GET /hvhbkowimi 2025/04/30 09:16:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 Retiring connection ID d52a7d49a0992d4d in 5s. 2025/04/30 09:16:17 server Dropping Handshake keys. 2025/04/30 09:16:17 server -> Sending packet 2 (1069 bytes) for connection 5c2c656f0265f3b8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: a526da0e0fd968cdbc5a50ab93ad4b21, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:17 server -> Sending packet 1 (267 bytes) for connection d52a7d49a0992d4d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:17 server Short Header{DestConnectionID: f8eab3a72d8e5ae389154b7029939245, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0xe06bcc561835830de6c15edfdda83d67ca3326dc55eea4bc9b43bf1a6c7650515e0e882137fdb4dc87c1b83b564f349e78e434b580d12e8406ebdb0edff519cb78d5583a45dc7276913866a7a1bbb0e817fbcae6fc49} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server <- Reading packet 0 (43 bytes) for connection 18389604, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 18389604, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 187.146µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:17 Received request: GET /xyifauwted 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 4.824ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server -> Sending packet 3 (1069 bytes) for connection 239b72c345ee7832, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server updated RTT: 43.943ms (σ: 12.375ms) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:17 Retiring connection ID 3f71ac0c in 5s. 2025/04/30 09:16:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:17 server -> Sending packet 2 (43 bytes) for connection d52a7d49a0992d4d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: f8eab3a72d8e5ae389154b7029939245, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 328.386µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 478.322µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:17 server <- Reading packet 2 (139 bytes) for connection 161ce9f6, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 161ce9f6, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 888µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [1] 2025/04/30 09:16:17 server updated RTT: 43.844ms (σ: 12.709ms) 2025/04/30 09:16:17 server ECN capability confirmed. 2025/04/30 09:16:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 47176c3ad6380d5f78e17947924ebdd1, StatelessResetToken: 0xf077526934cb32fc810d0af26d16d525} 2025/04/30 09:16:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 5636f965bbb4ad9fa864b876061045b5, StatelessResetToken: 0x31266cee5c429f3b01c7f9a86a9e88f3} 2025/04/30 09:16:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: aeb21287db41f87e9868d0515681ba78, StatelessResetToken: 0x4d2dee91f831307fefbc194937708e6f} 2025/04/30 09:16:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:17 server -> Sending packet 4 (45 bytes) for connection 57ab678ef976cdb7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 47176c3ad6380d5f78e17947924ebdd1, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 183.063µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:17 server <- Reading packet 3 (43 bytes) for connection 161ce9f6, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 161ce9f6, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 472µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [3] 2025/04/30 09:16:17 server updated RTT: 42.426ms (σ: 12.366ms) 2025/04/30 09:16:17 server Ignoring all packets below 2. 2025/04/30 09:16:17 server -> Sending packet 5 (38 bytes) for connection 57ab678ef976cdb7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 47176c3ad6380d5f78e17947924ebdd1, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:17 server <- Reading packet 2 (139 bytes) for connection 6ee5af31, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 6ee5af31, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 968µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [1] 2025/04/30 09:16:17 server updated RTT: 43.182ms (σ: 12.462ms) 2025/04/30 09:16:17 server ECN capability confirmed. 2025/04/30 09:16:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 5f654b865d26dfb48787b2b89375ebc0, StatelessResetToken: 0xf54df7ad1a212dd3d149c8765dd8a363} 2025/04/30 09:16:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 69ffbb7b9d1b5bf1d9f422a095fe32f8, StatelessResetToken: 0x647b9becbd92d870e21acfd741a1afb5} 2025/04/30 09:16:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: acb54708616c3e924c510405fed12312, StatelessResetToken: 0x111ffd97be271b72432c7bf5392ce1ad} 2025/04/30 09:16:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:17 server Ignoring all packets below 1. 2025/04/30 09:16:17 server -> Sending packet 3 (45 bytes) for connection 5c2c656f0265f3b8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 5f654b865d26dfb48787b2b89375ebc0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 236.041µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:17 server <- Reading packet 2 (43 bytes) for connection 86c4423e, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 86c4423e, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 18.816ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server setting loss timer for packet 1 (1-RTT) to 51.76442ms (in 2025-04-30 09:16:17.675482415 +0000 UTC m=+1.191776052) 2025/04/30 09:16:17 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:17 Retiring connection ID ec9e41ea in 5s. 2025/04/30 09:16:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:17 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:16:17.675482415 +0000 UTC m=+1.191776052 2025/04/30 09:16:17 server lost packet 1 (time threshold) 2025/04/30 09:16:17 server -> Sending packet 4 (276 bytes) for connection ca0a5eb4fbaf3c71, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.273442ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0x84b7de2d136743ccd07099155d0d393dd22b7882c825c33567d23e95058b7b8e1fa3c8ab49fc98996b4de8f4d85e7d67a43b82074a9b63a8307b663e494111707f6b8f46a2ce93414fcb15eb2538b59a2c029f75e5af} 2025/04/30 09:16:17 server <- Reading packet 3 (43 bytes) for connection 6ee5af31, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 6ee5af31, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 26.008ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [3] 2025/04/30 09:16:17 server updated RTT: 44.966ms (σ: 12.916ms) 2025/04/30 09:16:17 server lost packet 2 (time threshold) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server Ignoring all packets below 3. 2025/04/30 09:16:17 server -> Sending packet 4 (1061 bytes) for connection 5c2c656f0265f3b8, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 5f654b865d26dfb48787b2b89375ebc0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:17 server <- Reading packet 4 (43 bytes) for connection 161ce9f6, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 161ce9f6, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:17 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:17 Replacing connection for connection IDs [022f8f0f 161ce9f6] with a closed connection. 2025/04/30 09:16:17 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:17 server Connection 57ab678ef976cdb7 closed. 2025/04/30 09:16:17 server <- Reading packet 2 (93 bytes) for connection b63e6bc6, Handshake 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: b63e6bc6, SrcConnectionID: 9033af79375e0bb40d3a3a4351fcc094, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:16:17 server Dropping Initial keys. 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.081s} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 168.319798ms (σ: 84.159899ms) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 Retiring connection ID b00ef77e7156cbda in 5s. 2025/04/30 09:16:17 server Dropping Handshake keys. 2025/04/30 09:16:17 server -> Sending packet 1 (267 bytes) for connection b00ef77e7156cbda, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 9033af79375e0bb40d3a3a4351fcc094, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0x727ab7334a28466103683c6e2972cf011807822e78d9f18042163638fb634e14f712841c7616e5eff9376233a6b7c53cf8d7f0ab1fa78476d9d6a4baa7bd10a9bbb58e7d046d8d4c0508bdf6b820c797bece090e3f14} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server <- Reading packet 1 (45 bytes) for connection b63e6bc6, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: b63e6bc6, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:17 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:17 server -> Sending packet 2 (46 bytes) for connection b00ef77e7156cbda, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 9033af79375e0bb40d3a3a4351fcc094, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 131.984543ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 Received request: GET /vokyccjrtk 2025/04/30 09:16:17 server -> Sending packet 3 (1061 bytes) for connection b00ef77e7156cbda, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 9033af79375e0bb40d3a3a4351fcc094, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:17 server -> Sending packet 5 (267 bytes) for connection 239b72c345ee7832, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server -> Sending packet 4 (267 bytes) for connection d52a7d49a0992d4d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: f8eab3a72d8e5ae389154b7029939245, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0xe06bcc561835830de6c15edfdda83d67ca3326dc55eea4bc9b43bf1a6c7650515e0e882137fdb4dc87c1b83b564f349e78e434b580d12e8406ebdb0edff519cb78d5583a45dc7276913866a7a1bbb0e817fbcae6fc49} 2025/04/30 09:16:17 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0x061ac6b7d35ec32854a934ec0a3f4e405942b5c559b0660006abf8ed7e0d48894918df2a7567f4df2c26f84fbf1aeb001a141ea4320e1a307c9da407500c9511fe0c159b41a15ee23fa879e8521bb45f7751d1680f92} 2025/04/30 09:16:17 server Skipping packet number 4 2025/04/30 09:16:17 server -> Sending packet 5 (267 bytes) for connection d52a7d49a0992d4d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: f8eab3a72d8e5ae389154b7029939245, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0xe06bcc561835830de6c15edfdda83d67ca3326dc55eea4bc9b43bf1a6c7650515e0e882137fdb4dc87c1b83b564f349e78e434b580d12e8406ebdb0edff519cb78d5583a45dc7276913866a7a1bbb0e817fbcae6fc49} 2025/04/30 09:16:17 server -> Sending packet 6 (1061 bytes) for connection 239b72c345ee7832, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:17 server <- Reading packet 4 (43 bytes) for connection 6ee5af31, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 6ee5af31, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:17 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:17 Replacing connection for connection IDs [6ee5af31 bd25437c] with a closed connection. 2025/04/30 09:16:17 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:17 server Connection 5c2c656f0265f3b8 closed. 2025/04/30 09:16:17 server <- Reading packet 4 (93 bytes) for connection ccfe9bf4, Handshake 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: ccfe9bf4, SrcConnectionID: 3b29affabe4b1a7089eae514b3a39e82, PacketNumber: 4, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:16:17 server Dropping Initial keys. 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.21516s} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 185.74389ms (σ: 92.871945ms) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:17 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 Retiring connection ID a8a82c7728e52f1b in 5s. 2025/04/30 09:16:17 server Dropping Handshake keys. 2025/04/30 09:16:17 server -> Sending packet 1 (267 bytes) for connection a8a82c7728e52f1b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 3b29affabe4b1a7089eae514b3a39e82, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0xcce3928bb0fe7548a0c21a3ea29d38758496f33a9a1cf2fdc61aa154b311bb468327f06e8cde465d34782f35a61a0b7482982a40eb984166eed2a301307192b13f16a90a7aec2fe8fccbc13010b17207855e2775b731} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server <- Reading packet 0 (43 bytes) for connection ccfe9bf4, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: ccfe9bf4, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 5.64ms} 2025/04/30 09:16:17 server newly acked packets (1): [0] 2025/04/30 09:16:17 server updated RTT: 167.996ms (σ: 105.145ms) 2025/04/30 09:16:17 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:17 Retiring connection ID 09785eac in 5s. 2025/04/30 09:16:17 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:17 server -> Sending packet 2 (46 bytes) for connection a8a82c7728e52f1b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 3b29affabe4b1a7089eae514b3a39e82, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 142.445597ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:17 server -> Sending packet 1 (1280 bytes) for connection 919019bc6114c87d, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: eca5c308cce18f5d257e99f772eec709, SrcConnectionID: 912de6d9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server -> Sending packet 2 (1280 bytes) for connection 919019bc6114c87d, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: eca5c308cce18f5d257e99f772eec709, SrcConnectionID: 912de6d9, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:17 server <- Reading packet 2 (139 bytes) for connection b63e6bc6, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: b63e6bc6, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 864µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (2): [0 1] 2025/04/30 09:16:17 server updated RTT: 151.35ms (σ: 97.057ms) 2025/04/30 09:16:17 server ECN capability confirmed. 2025/04/30 09:16:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 0b10782a213ed768210b719f53b48abc, StatelessResetToken: 0x9de8064c5168845e5945c30829a61dba} 2025/04/30 09:16:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 54dade8e8e70fef442f190903f2eb338, StatelessResetToken: 0xa4f9fae9d87310b40a83e2537fa32256} 2025/04/30 09:16:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: db3881026e7c8157e2a095e48f8b145b, StatelessResetToken: 0x19f500c2f497a358667d18590a0f73a3} 2025/04/30 09:16:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:17 server -> Sending packet 4 (45 bytes) for connection b00ef77e7156cbda, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 0b10782a213ed768210b719f53b48abc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 123.672µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:17 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:17 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:17 server -> Sending packet 1 (1280 bytes) for connection 361b43c33ab9281b, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 77085a0c36e3884f4a044de610098653, SrcConnectionID: 5acf5010, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server -> Sending packet 2 (1280 bytes) for connection 361b43c33ab9281b, Initial 2025/04/30 09:16:17 server -> Sending packet 1 (1280 bytes) for connection 2ea59512a7c0eb2d, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 77085a0c36e3884f4a044de610098653, SrcConnectionID: 5acf5010, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 80a91020825f2722a453ee6758e451ed, SrcConnectionID: ca377306, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:17 server -> Sending packet 2 (1280 bytes) for connection 2ea59512a7c0eb2d, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 80a91020825f2722a453ee6758e451ed, SrcConnectionID: ca377306, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:17 server <- Reading packet 2 (43 bytes) for connection a03ca1e0, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: a03ca1e0, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 568µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [6] 2025/04/30 09:16:17 server updated RTT: 42.523ms (σ: 11.87ms) 2025/04/30 09:16:17 server ECN capability confirmed. 2025/04/30 09:16:17 server setting loss timer for packet 5 (1-RTT) to 47.838375ms (in 2025-04-30 09:16:17.801014496 +0000 UTC m=+1.317308133) 2025/04/30 09:16:17 server -> Sending packet 7 (38 bytes) for connection 239b72c345ee7832, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:17 server <- Reading packet 2 (139 bytes) for connection ccfe9bf4, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: ccfe9bf4, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.024ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [1] 2025/04/30 09:16:17 server ECN capability confirmed. 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 2488cadec3f83b713144c2fd11c20913, StatelessResetToken: 0x9f826b4f412adde8d6e8f1f162cc38fd} 2025/04/30 09:16:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 04bda2e536aeb5424681d29388ada749, StatelessResetToken: 0x6de105ecdc48c2a2f3f7cf784adff835} 2025/04/30 09:16:17 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 1557ae2e4eeaa64661af62a110c69242, StatelessResetToken: 0x10531d39e140cfb3bcf00e9708be188c} 2025/04/30 09:16:17 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:17 server -> Sending packet 3 (47 bytes) for connection a8a82c7728e52f1b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 2488cadec3f83b713144c2fd11c20913, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 179.735µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:17 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:16:17.801014496 +0000 UTC m=+1.317308133 2025/04/30 09:16:17 server lost packet 5 (time threshold) 2025/04/30 09:16:17 server -> Sending packet 8 (267 bytes) for connection 239b72c345ee7832, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0x061ac6b7d35ec32854a934ec0a3f4e405942b5c559b0660006abf8ed7e0d48894918df2a7567f4df2c26f84fbf1aeb001a141ea4320e1a307c9da407500c9511fe0c159b41a15ee23fa879e8521bb45f7751d1680f92} 2025/04/30 09:16:17 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:17 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:17 server -> Sending packet 6 (1061 bytes) for connection ca0a5eb4fbaf3c71, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:17 server Skipping packet number 5 2025/04/30 09:16:17 server -> Sending packet 7 (267 bytes) for connection ca0a5eb4fbaf3c71, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0x84b7de2d136743ccd07099155d0d393dd22b7882c825c33567d23e95058b7b8e1fa3c8ab49fc98996b4de8f4d85e7d67a43b82074a9b63a8307b663e494111707f6b8f46a2ce93414fcb15eb2538b59a2c029f75e5af} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server <- Reading packet 1 (1200 bytes) for connection 5acf5010, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 5acf5010, SrcConnectionID: 77085a0c36e3884f4a044de610098653, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 5.432ms} 2025/04/30 09:16:17 server <- Reading packet 1 (1200 bytes) for connection ca377306, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: ca377306, SrcConnectionID: 80a91020825f2722a453ee6758e451ed, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 4.304ms} 2025/04/30 09:16:17 server <- Reading packet 3 (54 bytes) for connection ccfe9bf4, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: ccfe9bf4, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 680µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [3] 2025/04/30 09:16:17 server updated RTT: 150.997ms (σ: 112.854ms) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:17 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:17 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:17 server Ignoring all packets below 3. 2025/04/30 09:16:17 Received request: GET /gakofpllyc 2025/04/30 09:16:17 server -> Sending packet 4 (1069 bytes) for connection a8a82c7728e52f1b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 2488cadec3f83b713144c2fd11c20913, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 294.37µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:17 server <- Reading packet 4 (43 bytes) for connection 86c4423e, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 86c4423e, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 336µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [7] 2025/04/30 09:16:17 server updated RTT: 44.362ms (σ: 16.239ms) 2025/04/30 09:16:17 server ECN capability confirmed. 2025/04/30 09:16:17 server setting loss timer for packet 6 (1-RTT) to 49.90725ms (in 2025-04-30 09:16:17.867494605 +0000 UTC m=+1.383788232) 2025/04/30 09:16:17 server -> Sending packet 8 (1366 bytes) for connection ca0a5eb4fbaf3c71, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.PingFrame{} 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 Created qlog file: /logs/qlog/47da095ad5cddb1a.sqlog 2025/04/30 09:16:17 server Changing connection ID to b4602a63. 2025/04/30 09:16:17 Adding connection IDs 47da095ad5cddb1a and b4602a63 for a new connection. 2025/04/30 09:16:17 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:16:17.867494605 +0000 UTC m=+1.383788232 2025/04/30 09:16:17 server lost packet 6 (time threshold) 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection 47da095ad5cddb1a, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 47da095ad5cddb1a, SrcConnectionID: 345f84be78ed673be1c626126a818762, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server -> Sending packet 9 (1061 bytes) for connection ca0a5eb4fbaf3c71, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 345f84be78ed673be1c626126a818762, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 Adding connection ID df11895e. 2025/04/30 09:16:17 Adding connection ID f00f35f3. 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 47da095ad5cddb1a 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 345f84be78ed673be1c626126a818762, SrcConnectionID: b4602a63, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 956, Version: v1} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 345f84be78ed673be1c626126a818762, SrcConnectionID: b4602a63, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:16:17 server Short Header{DestConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f00f35f3, StatelessResetToken: 0x89a8ad5b7b97ce1e596add5dda247efa} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df11895e, StatelessResetToken: 0x5c961b5f566ceb5785e388e88aa58a0d} 2025/04/30 09:16:17 server <- Reading packet 6 (43 bytes) for connection 86c4423e, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 86c4423e, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 31.88ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server <- &wire.PingFrame{} 2025/04/30 09:16:17 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:17 server -> Sending packet 10 (47 bytes) for connection ca0a5eb4fbaf3c71, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 98.965µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server <- Reading packet 8 (43 bytes) for connection 86c4423e, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 86c4423e, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 31.88ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server <- &wire.PingFrame{} 2025/04/30 09:16:17 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:17 server -> Sending packet 11 (49 bytes) for connection ca0a5eb4fbaf3c71, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 1}}, DelayTime: 133.296µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server <- Reading packet 9 (43 bytes) for connection 86c4423e, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 86c4423e, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 4, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}}, DelayTime: 272µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [9] 2025/04/30 09:16:17 server updated RTT: 42.879ms (σ: 15.144ms) 2025/04/30 09:16:17 server lost packet 8 (time threshold) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server -> Sending packet 12 (38 bytes) for connection ca0a5eb4fbaf3c71, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e60b80b326a05d8d2b98991720e82561, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:17 server <- Reading packet 10 (43 bytes) for connection 86c4423e, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 86c4423e, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:17 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:17 Replacing connection for connection IDs [c181b447 86c4423e] with a closed connection. 2025/04/30 09:16:17 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:17 server Connection ca0a5eb4fbaf3c71 closed. 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 Created qlog file: /logs/qlog/0c3276f8d7457497.sqlog 2025/04/30 09:16:17 server Changing connection ID to e5d7a671. 2025/04/30 09:16:17 Adding connection IDs 0c3276f8d7457497 and e5d7a671 for a new connection. 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection 0c3276f8d7457497, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 0c3276f8d7457497, SrcConnectionID: 8920bff9dd9bba67b20cb66bb43f934f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 8920bff9dd9bba67b20cb66bb43f934f, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 Adding connection ID d57ab261. 2025/04/30 09:16:17 Adding connection ID 3f03f47f. 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 0c3276f8d7457497 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 8920bff9dd9bba67b20cb66bb43f934f, SrcConnectionID: e5d7a671, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 964, Version: v1} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 8920bff9dd9bba67b20cb66bb43f934f, SrcConnectionID: e5d7a671, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:16:17 server Short Header{DestConnectionID: 8920bff9dd9bba67b20cb66bb43f934f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3f03f47f, StatelessResetToken: 0x7ed97822e5597c6bd987f455d3515ac2} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d57ab261, StatelessResetToken: 0x7ec85ed834f32dd4009c01186965a383} 2025/04/30 09:16:17 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:17 server -> Sending packet 10 (38 bytes) for connection 239b72c345ee7832, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:17 server Skipping packet number 9 2025/04/30 09:16:17 server -> Sending packet 11 (267 bytes) for connection 239b72c345ee7832, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:17 server -> &wire.NewTokenFrame{Token: 0x061ac6b7d35ec32854a934ec0a3f4e405942b5c559b0660006abf8ed7e0d48894918df2a7567f4df2c26f84fbf1aeb001a141ea4320e1a307c9da407500c9511fe0c159b41a15ee23fa879e8521bb45f7751d1680f92} 2025/04/30 09:16:17 server -> Sending packet 12 (1366 bytes) for connection 239b72c345ee7832, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.PingFrame{} 2025/04/30 09:16:17 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:17 server -> Sending packet 1 (1280 bytes) for connection 0c3276f8d7457497, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 8920bff9dd9bba67b20cb66bb43f934f, SrcConnectionID: e5d7a671, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:17 server -> Sending packet 2 (1280 bytes) for connection 0c3276f8d7457497, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 8920bff9dd9bba67b20cb66bb43f934f, SrcConnectionID: e5d7a671, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:17 server <- Reading packet 4 (43 bytes) for connection a03ca1e0, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: a03ca1e0, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 304µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [10] 2025/04/30 09:16:17 server updated RTT: 41.165ms (σ: 11.616ms) 2025/04/30 09:16:17 server <- Reading packet 5 (43 bytes) for connection b63e6bc6, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: b63e6bc6, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 145.752ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [4] 2025/04/30 09:16:17 server updated RTT: 151.726ms (σ: 73.545ms) 2025/04/30 09:16:17 server lost packet 3 (time threshold) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.PingFrame{} 2025/04/30 09:16:17 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:17 server Ignoring all packets below 3. 2025/04/30 09:16:17 server -> Sending packet 5 (1069 bytes) for connection b00ef77e7156cbda, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 0b10782a213ed768210b719f53b48abc, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 202.29µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:17 server <- Reading packet 5 (43 bytes) for connection a03ca1e0, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: a03ca1e0, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 10}, {Largest: 8, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 24.712ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (2): [11 12] 2025/04/30 09:16:17 server updated RTT: 40.136ms (σ: 10.769ms) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:17 server -> Sending packet 1 (755 bytes) for connection 361b43c33ab9281b, Handshake 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 77085a0c36e3884f4a044de610098653, SrcConnectionID: 5acf5010, PacketNumber: 1, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 09:16:17 server -> Sending packet 2 (755 bytes) for connection 361b43c33ab9281b, Handshake 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 77085a0c36e3884f4a044de610098653, SrcConnectionID: 5acf5010, PacketNumber: 2, PacketNumberLen: 2, Length: 726, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 704, Offset + Data length: 704} 2025/04/30 09:16:17 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:17 server -> Sending packet 1 (751 bytes) for connection 2ea59512a7c0eb2d, Handshake 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 80a91020825f2722a453ee6758e451ed, SrcConnectionID: ca377306, PacketNumber: 1, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 09:16:17 server -> Sending packet 2 (751 bytes) for connection 2ea59512a7c0eb2d, Handshake 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 80a91020825f2722a453ee6758e451ed, SrcConnectionID: ca377306, PacketNumber: 2, PacketNumberLen: 2, Length: 722, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 700, Offset + Data length: 700} 2025/04/30 09:16:17 server <- Reading packet 7 (43 bytes) for connection 18389604, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: 18389604, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 201.728ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [5] 2025/04/30 09:16:17 server updated RTT: 64.708ms (σ: 50.811ms) 2025/04/30 09:16:17 server ECN capability confirmed. 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.PingFrame{} 2025/04/30 09:16:17 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:17 server -> Sending packet 6 (1366 bytes) for connection d52a7d49a0992d4d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: f8eab3a72d8e5ae389154b7029939245, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.PingFrame{} 2025/04/30 09:16:17 server -> Sending packet 7 (45 bytes) for connection d52a7d49a0992d4d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: f8eab3a72d8e5ae389154b7029939245, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 0, Smallest: 0}}, DelayTime: 161.582µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server <- Reading packet 8 (43 bytes) for connection b63e6bc6, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: b63e6bc6, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 4, DelayTime: 616µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server newly acked packets (1): [5] 2025/04/30 09:16:17 server updated RTT: 136.858ms (σ: 84.892ms) 2025/04/30 09:16:17 server Canceling loss detection timer. 2025/04/30 09:16:17 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:17 Retiring connection ID cbb379ff in 5s. 2025/04/30 09:16:17 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:17 server Ignoring all packets below 6. 2025/04/30 09:16:17 server -> Sending packet 6 (46 bytes) for connection b00ef77e7156cbda, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:17 server Short Header{DestConnectionID: 0b10782a213ed768210b719f53b48abc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 144.26µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:17 server <- Reading packet 9 (43 bytes) for connection b63e6bc6, 1-RTT 2025/04/30 09:16:17 server Short Header{DestConnectionID: b63e6bc6, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:17 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:17 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:17 Replacing connection for connection IDs [9ee3bc63 b63e6bc6] with a closed connection. 2025/04/30 09:16:17 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:17 server Connection b00ef77e7156cbda closed. 2025/04/30 09:16:17 server <- Received Initial packet. 2025/04/30 09:16:17 Created qlog file: /logs/qlog/83383ad88193b5ea.sqlog 2025/04/30 09:16:17 server Changing connection ID to d75f080c. 2025/04/30 09:16:17 Adding connection IDs 83383ad88193b5ea and d75f080c for a new connection. 2025/04/30 09:16:17 server <- Reading packet 0 (1200 bytes) for connection 83383ad88193b5ea, Initial 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 83383ad88193b5ea, SrcConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:17 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:17 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:17 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:17 Adding connection ID ec2a3824. 2025/04/30 09:16:17 Adding connection ID 464d7906. 2025/04/30 09:16:17 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 83383ad88193b5ea 2025/04/30 09:16:17 server Long Header{Type: Initial, DestConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, SrcConnectionID: d75f080c, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 957, Version: v1} 2025/04/30 09:16:17 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:17 server Long Header{Type: Handshake, DestConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, SrcConnectionID: d75f080c, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 09:16:17 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 09:16:17 server Short Header{DestConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec2a3824, StatelessResetToken: 0xa538801a4857748ca73df7c3160841aa} 2025/04/30 09:16:17 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 464d7906, StatelessResetToken: 0x4d21d457a1474a58a986215771a99b95} 2025/04/30 09:16:18 server <- Reading packet 0 (91 bytes) for connection 5acf5010, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 5acf5010, SrcConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 12.16ms} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 361b43c33ab9281b in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 2 (312 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x362f59465492e3802f8347b5cb0ce16b684be641a3d6dd1e0a4408195eb89a5eeab7002c563e36e4445dac0c3f67a459245b041dbb7956b4ae5416bc4d18ef1176bc8f407e29f0315e0f64c55e11fa15ec22d3703da4} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6b11bd31, StatelessResetToken: 0x20aa1055278da2c15a5a1ea47f9a5cf4} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6f922994, StatelessResetToken: 0x11696c34c1cf345ebcbea3f8581e8390} 2025/04/30 09:16:18 server -> Sending packet 3 (312 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x362f59465492e3802f8347b5cb0ce16b684be641a3d6dd1e0a4408195eb89a5eeab7002c563e36e4445dac0c3f67a459245b041dbb7956b4ae5416bc4d18ef1176bc8f407e29f0315e0f64c55e11fa15ec22d3703da4} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6b11bd31, StatelessResetToken: 0x20aa1055278da2c15a5a1ea47f9a5cf4} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6f922994, StatelessResetToken: 0x11696c34c1cf345ebcbea3f8581e8390} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> Sending packet 4 (1366 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.PingFrame{} 2025/04/30 09:16:18 server <- Reading packet 0 (45 bytes) for connection 5acf5010, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 5acf5010, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 5 (43 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 109.314µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 Received request: GET /qdtksilsrx 2025/04/30 09:16:18 server -> Sending packet 6 (1061 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 0 (91 bytes) for connection ca377306, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: ca377306, SrcConnectionID: 80a91020825f2722a453ee6758e451ed, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 8.08ms} 2025/04/30 09:16:18 server newly acked packets (1): [2] 2025/04/30 09:16:18 server updated RTT: 34.628933ms (σ: 17.314466ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 2ea59512a7c0eb2d in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 2 (315 bytes) for connection 2ea59512a7c0eb2d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 80a91020825f2722a453ee6758e451ed, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 536565e6, StatelessResetToken: 0xd747a32809c3daa40d8978ca2e887868} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x03978aad9d8b8e405b804433864ca22822d7a356ae04b2fdcc51bfce6a611511783e6a708629c4b0257f59da0a59e6c51afad701296d56b5b46c2cb34d34f5bdb560d3d1285d9ac796c63b1d5e236f9480b801c638eb} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea489489, StatelessResetToken: 0x48e163a068f9d6c90531c62e579e8c62} 2025/04/30 09:16:18 server -> Sending packet 3 (315 bytes) for connection 2ea59512a7c0eb2d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 80a91020825f2722a453ee6758e451ed, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 536565e6, StatelessResetToken: 0xd747a32809c3daa40d8978ca2e887868} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x03978aad9d8b8e405b804433864ca22822d7a356ae04b2fdcc51bfce6a611511783e6a708629c4b0257f59da0a59e6c51afad701296d56b5b46c2cb34d34f5bdb560d3d1285d9ac796c63b1d5e236f9480b801c638eb} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea489489, StatelessResetToken: 0x48e163a068f9d6c90531c62e579e8c62} 2025/04/30 09:16:18 server <- Reading packet 0 (45 bytes) for connection ca377306, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: ca377306, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 4 (43 bytes) for connection 2ea59512a7c0eb2d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 80a91020825f2722a453ee6758e451ed, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 112.15µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 Received request: GET /gznckefblf 2025/04/30 09:16:18 server -> Sending packet 5 (1061 bytes) for connection 2ea59512a7c0eb2d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 80a91020825f2722a453ee6758e451ed, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 7 (43 bytes) for connection a03ca1e0, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: a03ca1e0, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 10}, {Largest: 8, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 84.76ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 13 (47 bytes) for connection 239b72c345ee7832, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 92.153µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Reading packet 9 (43 bytes) for connection a03ca1e0, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: a03ca1e0, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 2, AckRanges: {{Largest: 12, Smallest: 10}, {Largest: 8, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 84.76ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 14 (49 bytes) for connection 239b72c345ee7832, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: e2f884704e9b4f56b5379f94390ae1d3, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 119.253µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (1280 bytes) for connection 47da095ad5cddb1a, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 345f84be78ed673be1c626126a818762, SrcConnectionID: b4602a63, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection 47da095ad5cddb1a, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 345f84be78ed673be1c626126a818762, SrcConnectionID: b4602a63, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:18 server <- Reading packet 2 (93 bytes) for connection 3f03f47f, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 3f03f47f, SrcConnectionID: 8920bff9dd9bba67b20cb66bb43f934f, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 839.04ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 137.527768ms (σ: 68.763884ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 0c3276f8d7457497 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server -> Sending packet 1 (267 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8920bff9dd9bba67b20cb66bb43f934f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x8a79a0d1ec4204476633caa7c3282b3e49a01194f998b01351e6cc8dc41561b9cb47de4bed2519e58d9143fdf9adc591c72f70680f5911de2e47df45f0ba33103bdc74ab52773a3f34f814fda5f3dd9b070b7fb4c194} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server <- Reading packet 1 (141 bytes) for connection 536565e6, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 536565e6, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 1.4ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [3] 2025/04/30 09:16:18 server updated RTT: 34.596ms (σ: 13.048ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: aceec457237f4e3907e7a3019986a425, StatelessResetToken: 0xd410e80485f38b5075562951035464d3} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 5c31b591b32996286bbff5e055c6838c, StatelessResetToken: 0xfec17a3b0965389c0f38a381413604a4} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 00ab65ebb61c596a6dad1f9fc72fa682, StatelessResetToken: 0x9949ad10943428360e3ecb3012ae82ec} 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID ca377306 in 5s. 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server -> Sending packet 6 (45 bytes) for connection 2ea59512a7c0eb2d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: aceec457237f4e3907e7a3019986a425, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 170.579µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server <- Reading packet 2 (43 bytes) for connection 536565e6, 1-RTT 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 server Short Header{DestConnectionID: 536565e6, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [536565e6 ea489489] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 Created qlog file: /logs/qlog/16f03cc6e5b26eef.sqlog 2025/04/30 09:16:18 server Changing connection ID to 0f422bf2. 2025/04/30 09:16:18 server Connection 2ea59512a7c0eb2d closed. 2025/04/30 09:16:18 Adding connection IDs 16f03cc6e5b26eef and 0f422bf2 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 16f03cc6e5b26eef, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 16f03cc6e5b26eef, SrcConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 6269ac2a. 2025/04/30 09:16:18 Adding connection ID ea7b5a83. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 16f03cc6e5b26eef 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, SrcConnectionID: 0f422bf2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 967, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, SrcConnectionID: 0f422bf2, PacketNumber: 0, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6269ac2a, StatelessResetToken: 0x7c777fc41c85a9bb9f9c69014089f0ae} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea7b5a83, StatelessResetToken: 0xe355726e5e49d68e0f7f175d650217d8} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/59df3dabf2d2cfc3.sqlog 2025/04/30 09:16:18 server Changing connection ID to d429a4c1. 2025/04/30 09:16:18 Adding connection IDs 59df3dabf2d2cfc3 and d429a4c1 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 59df3dabf2d2cfc3, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 59df3dabf2d2cfc3, SrcConnectionID: 6e310b527688280819679282889c927c, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 444, Offset + Data length: 444} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6e310b527688280819679282889c927c, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 8801efa8. 2025/04/30 09:16:18 Adding connection ID 76507ea6. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 59df3dabf2d2cfc3 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 6e310b527688280819679282889c927c, SrcConnectionID: d429a4c1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 956, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 6e310b527688280819679282889c927c, SrcConnectionID: d429a4c1, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6e310b527688280819679282889c927c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 8801efa8, StatelessResetToken: 0x87812c0db7fb72eaecbc8426798cf5c4} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 76507ea6, StatelessResetToken: 0x6e2f997ea291be548450d2751b0e9b6c} 2025/04/30 09:16:18 server <- Reading packet 10 (43 bytes) for connection a03ca1e0, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: a03ca1e0, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [a03ca1e0 d7e157b3] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Connection 239b72c345ee7832 closed. 2025/04/30 09:16:18 server <- Reading packet 1 (1200 bytes) for connection b4602a63, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: b4602a63, SrcConnectionID: 345f84be78ed673be1c626126a818762, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 5.032ms} 2025/04/30 09:16:18 server newly acked packets (1): [2] 2025/04/30 09:16:18 server updated RTT: 34.925007ms (σ: 17.462503ms) 2025/04/30 09:16:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (211 bytes) for connection 47da095ad5cddb1a, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 345f84be78ed673be1c626126a818762, SrcConnectionID: b4602a63, PacketNumber: 1, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:16:18 server -> Sending packet 2 (211 bytes) for connection 47da095ad5cddb1a, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 345f84be78ed673be1c626126a818762, SrcConnectionID: b4602a63, PacketNumber: 2, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:16:18 server Queueing packet (43 bytes) for later decryption 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (1280 bytes) for connection 16f03cc6e5b26eef, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, SrcConnectionID: 0f422bf2, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection 16f03cc6e5b26eef, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, SrcConnectionID: 0f422bf2, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:18 server <- Reading packet 0 (91 bytes) for connection b4602a63, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: b4602a63, SrcConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 5.808ms} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 47da095ad5cddb1a in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 2 (315 bytes) for connection 47da095ad5cddb1a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x7c248e58e3fcd349a932baef99e69d0fc4c266f7ca7a2faf2cadeebcf8fe76c0ea39a64773d375938cd7b9662c09faf8a64ac889090531106b328581f790c5a37d47b1dec371c832d323357eeabf42dc5290072f88f6} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df11895e, StatelessResetToken: 0x5c961b5f566ceb5785e388e88aa58a0d} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f00f35f3, StatelessResetToken: 0x89a8ad5b7b97ce1e596add5dda247efa} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> Sending packet 3 (315 bytes) for connection 47da095ad5cddb1a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df11895e, StatelessResetToken: 0x5c961b5f566ceb5785e388e88aa58a0d} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f00f35f3, StatelessResetToken: 0x89a8ad5b7b97ce1e596add5dda247efa} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x7c248e58e3fcd349a932baef99e69d0fc4c266f7ca7a2faf2cadeebcf8fe76c0ea39a64773d375938cd7b9662c09faf8a64ac889090531106b328581f790c5a37d47b1dec371c832d323357eeabf42dc5290072f88f6} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server <- Reading packet 0 (45 bytes) for connection b4602a63, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: b4602a63, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 4 (43 bytes) for connection 47da095ad5cddb1a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 112.139µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 Received request: GET /nbghicbvxa 2025/04/30 09:16:18 server -> Sending packet 5 (1061 bytes) for connection 47da095ad5cddb1a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 1 (1200 bytes) for connection 0f422bf2, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0f422bf2, SrcConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 11.784ms} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/3b59850fbfc10840.sqlog 2025/04/30 09:16:18 server Changing connection ID to 6620dc9b. 2025/04/30 09:16:18 Adding connection IDs 3b59850fbfc10840 and 6620dc9b for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 3b59850fbfc10840, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 3b59850fbfc10840, SrcConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 44727a38. 2025/04/30 09:16:18 Adding connection ID eb08d516. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3b59850fbfc10840 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, SrcConnectionID: 6620dc9b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 962, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, SrcConnectionID: 6620dc9b, PacketNumber: 0, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 09:16:18 server Short Header{DestConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 44727a38, StatelessResetToken: 0x7bee91badf4b991470ada81c02467f2b} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: eb08d516, StatelessResetToken: 0x7f8a1c81d964776eb773ca3a69486282} 2025/04/30 09:16:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:18 server -> Sending packet 1 (200 bytes) for connection 16f03cc6e5b26eef, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, SrcConnectionID: 0f422bf2, PacketNumber: 1, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:16:18 server -> Sending packet 2 (200 bytes) for connection 16f03cc6e5b26eef, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, SrcConnectionID: 0f422bf2, PacketNumber: 2, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (1280 bytes) for connection 3b59850fbfc10840, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, SrcConnectionID: 6620dc9b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection 3b59850fbfc10840, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, SrcConnectionID: 6620dc9b, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:18 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server <- Reading packet 0 (91 bytes) for connection 0f422bf2, Handshake 2025/04/30 09:16:18 server -> Sending packet 1 (1280 bytes) for connection 83383ad88193b5ea, Initial 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0f422bf2, SrcConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, SrcConnectionID: d75f080c, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection 83383ad88193b5ea, Initial 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, SrcConnectionID: d75f080c, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 5.776ms} 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 16f03cc6e5b26eef in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 2 (315 bytes) for connection 16f03cc6e5b26eef, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6269ac2a, StatelessResetToken: 0x7c777fc41c85a9bb9f9c69014089f0ae} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea7b5a83, StatelessResetToken: 0xe355726e5e49d68e0f7f175d650217d8} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x9557d05be8617bed03dd91bb90fc385a7813056c8f1b589ceb9723bfdc331e46cde1456022222de6f559e682d9396c0c97603d1d718c18a5b3e835cb6f5a2cea25c0c767009090cd21f9c6939c2b25e97b2ed0e668a2} 2025/04/30 09:16:18 server -> Sending packet 3 (315 bytes) for connection 16f03cc6e5b26eef, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea7b5a83, StatelessResetToken: 0xe355726e5e49d68e0f7f175d650217d8} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6269ac2a, StatelessResetToken: 0x7c777fc41c85a9bb9f9c69014089f0ae} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x9557d05be8617bed03dd91bb90fc385a7813056c8f1b589ceb9723bfdc331e46cde1456022222de6f559e682d9396c0c97603d1d718c18a5b3e835cb6f5a2cea25c0c767009090cd21f9c6939c2b25e97b2ed0e668a2} 2025/04/30 09:16:18 server <- Reading packet 0 (45 bytes) for connection 0f422bf2, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f422bf2, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 4 (43 bytes) for connection 16f03cc6e5b26eef, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 115.696µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 Received request: GET /hbhibbcipz 2025/04/30 09:16:18 server -> Sending packet 5 (1061 bytes) for connection 16f03cc6e5b26eef, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server <- Reading packet 4 (93 bytes) for connection 8801efa8, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 8801efa8, SrcConnectionID: 6e310b527688280819679282889c927c, PacketNumber: 4, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 845.744ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 138.769251ms (σ: 69.384625ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 59df3dabf2d2cfc3 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server -> Sending packet 1 (267 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6e310b527688280819679282889c927c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x2ed314280c079d3b9a6b7ad0ccc885eecdca3700befb3343fd9f586b34ece8dff4de12934a3fec5032de43ade6d14c6d7e840266438e1bc2de39411489532378da7966df54962f6058a28908288525bc3bb49fe3cd76} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection 8801efa8, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8801efa8, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.88ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 125.895ms (σ: 77.785ms) 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID d429a4c1 in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 2 (44 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6e310b527688280819679282889c927c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 103.45594ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Reading packet 10 (43 bytes) for connection 18389604, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 18389604, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 194.888ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Reading packet 1 (1200 bytes) for connection d75f080c, Initial 2025/04/30 09:16:18 server newly acked packets (1): [6] 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: d75f080c, SrcConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 7.928ms} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server newly acked packets (1): [2] 2025/04/30 09:16:18 server updated RTT: 36.48986ms (σ: 18.24493ms) 2025/04/30 09:16:18 server -> Sending packet 8 (47 bytes) for connection d52a7d49a0992d4d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: f8eab3a72d8e5ae389154b7029939245, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (210 bytes) for connection 83383ad88193b5ea, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, SrcConnectionID: d75f080c, PacketNumber: 1, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 09:16:18 server -> Sending packet 2 (210 bytes) for connection 83383ad88193b5ea, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, SrcConnectionID: d75f080c, PacketNumber: 2, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 0, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}, {Largest: 0, Smallest: 0}}, DelayTime: 123.34µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Reading packet 13 (162 bytes) for connection 18389604, 1-RTT 2025/04/30 09:16:18 server <- Reading packet 0 (91 bytes) for connection d75f080c, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: d75f080c, SrcConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 16.416ms} 2025/04/30 09:16:18 server newly acked packets (1): [2] 2025/04/30 09:16:18 server Short Header{DestConnectionID: 18389604, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, DelayTime: 2.048ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: a2a42d38be1e8323b4a4c1d729257b83, StatelessResetToken: 0x9102dc31cf214449fa765b4ebf03fec2} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: cd76bb14a3972af1ad825df2f153af06, StatelessResetToken: 0x1cfbe201791df9b988f04b68a42aa159} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: de990d208a03f1d876f09a14b5cf22fe, StatelessResetToken: 0x1f46f1c701ff6cb6f61722b9ed6dde8b} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 9 (51 bytes) for connection d52a7d49a0992d4d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server updated RTT: 36.246ms (σ: 14.168ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Short Header{DestConnectionID: a2a42d38be1e8323b4a4c1d729257b83, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 13}, {Largest: 10, Smallest: 10}, {Largest: 7, Smallest: 7}, {Largest: 0, Smallest: 0}}, DelayTime: 287.607µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Received request: GET /xbadhkmwfg 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 83383ad88193b5ea in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server -> Sending packet 10 (1061 bytes) for connection d52a7d49a0992d4d, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: a2a42d38be1e8323b4a4c1d729257b83, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 2 (315 bytes) for connection 83383ad88193b5ea, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec2a3824, StatelessResetToken: 0xa538801a4857748ca73df7c3160841aa} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 464d7906, StatelessResetToken: 0x4d21d457a1474a58a986215771a99b95} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x7d6c1a3d450be467f06e1f8e786f6568d5f1df813308808024402c20b7da9945716b58b1dfc48f80bc8ccb21001d31e88c43f7868f571b306cdadfc09e720704af90bd2135540cb146e1fea2be6cd03d892b8499910b} 2025/04/30 09:16:18 server -> Sending packet 3 (315 bytes) for connection 83383ad88193b5ea, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0cc83e3d5fbb52334337c24af75ac4d9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ec2a3824, StatelessResetToken: 0xa538801a4857748ca73df7c3160841aa} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 464d7906, StatelessResetToken: 0x4d21d457a1474a58a986215771a99b95} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x7d6c1a3d450be467f06e1f8e786f6568d5f1df813308808024402c20b7da9945716b58b1dfc48f80bc8ccb21001d31e88c43f7868f571b306cdadfc09e720704af90bd2135540cb146e1fea2be6cd03d892b8499910b} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server <- Reading packet 2 (93 bytes) for connection 44727a38, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 44727a38, SrcConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 856.224ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 140.159416ms (σ: 70.079708ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 3b59850fbfc10840 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server -> Sending packet 1 (267 bytes) for connection 3b59850fbfc10840, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x5f1a8be389e00cb5396c9bedd776cb0fd9db1feb767e8d8495a3800c1f4247ababee448ec220cc01d15bb3c5996c7820af998cc093941c77788eaf9bf331406e93e811606ffd407c61e66fbbe92ea84691c542c5b467} 2025/04/30 09:16:18 server <- Reading packet 1 (45 bytes) for connection 44727a38, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 44727a38, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 2 (44 bytes) for connection 3b59850fbfc10840, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 Received request: GET /inddqzklfn 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 104.735363ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> Sending packet 3 (1061 bytes) for connection 3b59850fbfc10840, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 1 (141 bytes) for connection ec2a3824, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: ec2a3824, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 896µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [3] 2025/04/30 09:16:18 server updated RTT: 35.928ms (σ: 11.26ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 5933282ce57679144a69debdc1cf3950, StatelessResetToken: 0x8ae29f59ae51998fade412ea2fa5aa12} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: bdc82eb561e8a6f7b3f3c190fd1037fd, StatelessResetToken: 0xf4da36b0c1edcdbd0fd0852d730db21d} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 1b69bb2f28bd0e44d96dd91996c976fe, StatelessResetToken: 0x6904ba5471914d9a8f4fe3f606ffe0f4} 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID d75f080c in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 4 (45 bytes) for connection 83383ad88193b5ea, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 5933282ce57679144a69debdc1cf3950, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 175.007µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server <- Reading packet 14 (43 bytes) for connection 18389604, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 18389604, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [28aba658 18389604] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Connection d52a7d49a0992d4d closed. 2025/04/30 09:16:18 server <- Reading packet 2 (54 bytes) for connection ec2a3824, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: ec2a3824, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 656µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [4] 2025/04/30 09:16:18 server updated RTT: 35.423ms (σ: 9.453ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server Ignoring all packets below 2. 2025/04/30 09:16:18 Received request: GET /iyiwsqhfhq 2025/04/30 09:16:18 server -> Sending packet 5 (1069 bytes) for connection 83383ad88193b5ea, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 5933282ce57679144a69debdc1cf3950, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 343.041µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:18 server -> Sending packet 7 (315 bytes) for connection 16f03cc6e5b26eef, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6269ac2a, StatelessResetToken: 0x7c777fc41c85a9bb9f9c69014089f0ae} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea7b5a83, StatelessResetToken: 0xe355726e5e49d68e0f7f175d650217d8} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x9557d05be8617bed03dd91bb90fc385a7813056c8f1b589ceb9723bfdc331e46cde1456022222de6f559e682d9396c0c97603d1d718c18a5b3e835cb6f5a2cea25c0c767009090cd21f9c6939c2b25e97b2ed0e668a2} 2025/04/30 09:16:18 server Skipping packet number 6 2025/04/30 09:16:18 server -> Sending packet 8 (1061 bytes) for connection 16f03cc6e5b26eef, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 3 (43 bytes) for connection 6269ac2a, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6269ac2a, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 134.736ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 9 (45 bytes) for connection 16f03cc6e5b26eef, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 136.926µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Reading packet 5 (43 bytes) for connection 6269ac2a, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6269ac2a, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 134.736ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 10 (47 bytes) for connection 16f03cc6e5b26eef, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 156.347µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Reading packet 3 (43 bytes) for connection ec2a3824, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: ec2a3824, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [ec2a3824 464d7906] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Connection 83383ad88193b5ea closed. 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/2314a335e78e3f50.sqlog 2025/04/30 09:16:18 server Changing connection ID to d9a533bb. 2025/04/30 09:16:18 Adding connection IDs 2314a335e78e3f50 and d9a533bb for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 2314a335e78e3f50, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 2314a335e78e3f50, SrcConnectionID: d41b58442e8d08697644e5fc1665ab7f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: d41b58442e8d08697644e5fc1665ab7f, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID b08817b7. 2025/04/30 09:16:18 Adding connection ID 852d49d6. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2314a335e78e3f50 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: d41b58442e8d08697644e5fc1665ab7f, SrcConnectionID: d9a533bb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 962, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: d41b58442e8d08697644e5fc1665ab7f, SrcConnectionID: d9a533bb, PacketNumber: 0, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 09:16:18 server Short Header{DestConnectionID: d41b58442e8d08697644e5fc1665ab7f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b08817b7, StatelessResetToken: 0x00f1a7d04ec7cefb2ae390ba8031d4ac} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 852d49d6, StatelessResetToken: 0x456af36c5d9edf062b4a2110926bc8ff} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:18 server -> Sending packet 7 (315 bytes) for connection 47da095ad5cddb1a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f00f35f3, StatelessResetToken: 0x89a8ad5b7b97ce1e596add5dda247efa} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df11895e, StatelessResetToken: 0x5c961b5f566ceb5785e388e88aa58a0d} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x7c248e58e3fcd349a932baef99e69d0fc4c266f7ca7a2faf2cadeebcf8fe76c0ea39a64773d375938cd7b9662c09faf8a64ac889090531106b328581f790c5a37d47b1dec371c832d323357eeabf42dc5290072f88f6} 2025/04/30 09:16:18 server Skipping packet number 6 2025/04/30 09:16:18 server -> Sending packet 8 (1061 bytes) for connection 47da095ad5cddb1a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server -> Sending packet 9 (1366 bytes) for connection 47da095ad5cddb1a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.PingFrame{} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 1 (66 bytes) for connection b08817b7, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: b08817b7, SrcConnectionID: d41b58442e8d08697644e5fc1665ab7f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16.72ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 36.012023ms (σ: 18.006011ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection b08817b7, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: b08817b7, SrcConnectionID: d41b58442e8d08697644e5fc1665ab7f, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16.72ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 36.012ms (σ: 13.504ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 2314a335e78e3f50 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection b08817b7, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: b08817b7, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.088ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 36.015ms (σ: 10.135ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID d9a533bb in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 1 (275 bytes) for connection 2314a335e78e3f50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: d41b58442e8d08697644e5fc1665ab7f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 499.484µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x09d62ad5984c0999bc415fcdf6260d153aa4595e1da79020e92646d9dd6d59071389f651044ad281059b13ac3700cdf319ff610600c94dc683897bee3d9b5cca8b9bb37064f8dc3768a796490eb4565c6b92e85d1e3f} 2025/04/30 09:16:18 server <- Reading packet 1 (45 bytes) for connection b08817b7, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: b08817b7, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 Received request: GET /zcqhtmckoi 2025/04/30 09:16:18 server -> Sending packet 2 (1070 bytes) for connection 2314a335e78e3f50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: d41b58442e8d08697644e5fc1665ab7f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 753.897µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:18 server -> Sending packet 8 (312 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6b11bd31, StatelessResetToken: 0x20aa1055278da2c15a5a1ea47f9a5cf4} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x362f59465492e3802f8347b5cb0ce16b684be641a3d6dd1e0a4408195eb89a5eeab7002c563e36e4445dac0c3f67a459245b041dbb7956b4ae5416bc4d18ef1176bc8f407e29f0315e0f64c55e11fa15ec22d3703da4} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6f922994, StatelessResetToken: 0x11696c34c1cf345ebcbea3f8581e8390} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server Skipping packet number 7 2025/04/30 09:16:18 server -> Sending packet 9 (1061 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 65 bytes. Remaining: 43 bytes. 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server <- Reading packet 2 (43 bytes) for connection b08817b7, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: b08817b7, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [b08817b7 852d49d6] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Connection 2314a335e78e3f50 closed. 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/4aa98a3cac3831e2.sqlog 2025/04/30 09:16:18 server Changing connection ID to afea0bf6. 2025/04/30 09:16:18 Adding connection IDs 4aa98a3cac3831e2 and afea0bf6 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 4aa98a3cac3831e2, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 4aa98a3cac3831e2, SrcConnectionID: 39998a9ec9848b50aae3ce33bdda1638, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 39998a9ec9848b50aae3ce33bdda1638, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID ef03a9ed. 2025/04/30 09:16:18 Adding connection ID d31cd7f3. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4aa98a3cac3831e2 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 39998a9ec9848b50aae3ce33bdda1638, SrcConnectionID: afea0bf6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 953, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 39998a9ec9848b50aae3ce33bdda1638, SrcConnectionID: afea0bf6, PacketNumber: 0, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 39998a9ec9848b50aae3ce33bdda1638, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ef03a9ed, StatelessResetToken: 0x2f19dadcb950d7c458518f1209c7cb09} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d31cd7f3, StatelessResetToken: 0xf2c5f016177e69489db5196b364b73cb} 2025/04/30 09:16:18 server <- Reading packet 4 (43 bytes) for connection 8801efa8, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8801efa8, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 214.048ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [1] 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 3 (45 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6e310b527688280819679282889c927c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 126.256µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Reading packet 3 (43 bytes) for connection 6b11bd31, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6b11bd31, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 448µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (2): [4 8] 2025/04/30 09:16:18 server updated RTT: 32.221459ms (σ: 16.110729ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server -> Sending packet 10 (1409 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.PingFrame{} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 6 (1061 bytes) for connection a8a82c7728e52f1b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 2488cadec3f83b713144c2fd11c20913, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server -> Sending packet 7 (1061 bytes) for connection a8a82c7728e52f1b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 2488cadec3f83b713144c2fd11c20913, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 10 (43 bytes) for connection 3f03f47f, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 3f03f47f, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 388.264ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (2): [0 1] 2025/04/30 09:16:18 server updated RTT: 169.715ms (σ: 115.948ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 2 (40 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8920bff9dd9bba67b20cb66bb43f934f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 10, DelayTime: 157.585µs} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 1 (66 bytes) for connection ef03a9ed, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: ef03a9ed, SrcConnectionID: 39998a9ec9848b50aae3ce33bdda1638, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 13.4ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.220368ms (σ: 17.610184ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection ef03a9ed, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: ef03a9ed, SrcConnectionID: 39998a9ec9848b50aae3ce33bdda1638, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 13.4ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.22ms (σ: 13.207ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 4aa98a3cac3831e2 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server -> Sending packet 1 (267 bytes) for connection 4aa98a3cac3831e2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 39998a9ec9848b50aae3ce33bdda1638, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x04705b549ef3cb41c7b40e6a952fcbcb7d69dd503e130abc6e062a666a9ddc65b480ea306b2af06343b28b61f5ceb793ce2b0f67910c7f66a2fca434623d47036e92d0eb843bb01e8d11a9f615d8e963d9b5462d0069} 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection ef03a9ed, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: ef03a9ed, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.672ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.235ms (σ: 9.937ms) 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID afea0bf6 in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server <- Reading packet 1 (45 bytes) for connection ef03a9ed, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: ef03a9ed, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server -> Sending packet 2 (44 bytes) for connection 4aa98a3cac3831e2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 39998a9ec9848b50aae3ce33bdda1638, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 530.051µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 Received request: GET /bpmzjilmne 2025/04/30 09:16:18 server -> Sending packet 3 (1061 bytes) for connection 4aa98a3cac3831e2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 39998a9ec9848b50aae3ce33bdda1638, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 7 (162 bytes) for connection 8801efa8, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8801efa8, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 1, DelayTime: 984µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, StatelessResetToken: 0xed8d687505bcd0525fec4f2dbabee3f6} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: aab5d620ee5439e343f29c9b94a1a6e1, StatelessResetToken: 0x1b94c8b8dffa51d215f0e7116c8aafda} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 263a2e2ea02a58c75e8ee06d14e39ac2, StatelessResetToken: 0x25d1b926b2f95ce863d885a34cb9ae10} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 4 (49 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 184.545µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Received request: GET /szbsasasoc 2025/04/30 09:16:18 server <- Reading packet 4 (43 bytes) for connection 6b11bd31, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6b11bd31, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 9, LowestAcked: 2, AckRanges: {{Largest: 9, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 25.656ms, ECT0: 6, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [9] 2025/04/30 09:16:18 server updated RTT: 32.433ms (σ: 12.507ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server -> Sending packet 5 (1061 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> Sending packet 11 (38 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:18 Tracking 72 connection IDs and 2 reset tokens. 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server <- Reading packet 11 (164 bytes) for connection 3f03f47f, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 3f03f47f, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 536µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: d707cf58c24878556d93d6ea826eb655, StatelessResetToken: 0xe0202a243843675d12c94ada5b5232b1} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 5b965231710d9e654604a2fccd6486a7, StatelessResetToken: 0x7f368a4d310bf73329ef4b8774dc5afb} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: cb7b8b8903af103b3fc856a1b56f557c, StatelessResetToken: 0x81d97e9b876545554358c57f792c89fd} 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID e5d7a671 in 5s. 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server -> Sending packet 3 (42 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 Received request: GET /jvkqemedin 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 10, DelayTime: 191.458µs} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server -> Sending packet 4 (1061 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 2 (139 bytes) for connection ef03a9ed, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: ef03a9ed, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 736µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [1] 2025/04/30 09:16:18 server updated RTT: 34.888ms (σ: 8.145ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 90e9e7ae6c61728376ba55c50b6f9c12, StatelessResetToken: 0xc98aded43010578435d862ea7eb01b1b} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 60391f9ebe9ce8d96bf5d8932b86fe9b, StatelessResetToken: 0x632d8f5fc94a9a492536e28be5970f62} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 76a6f6b85e5646e04e580d6fcf1c8626, StatelessResetToken: 0xb189937c221c28fc5e24f77b2aaf92b7} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server -> Sending packet 4 (45 bytes) for connection 4aa98a3cac3831e2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 90e9e7ae6c61728376ba55c50b6f9c12, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 162.594µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server <- Reading packet 3 (43 bytes) for connection ef03a9ed, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: ef03a9ed, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [ef03a9ed d31cd7f3] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Connection 4aa98a3cac3831e2 closed. 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/5f08893e5cb7fdf3.sqlog 2025/04/30 09:16:18 server Changing connection ID to 1b97988f. 2025/04/30 09:16:18 Adding connection IDs 5f08893e5cb7fdf3 and 1b97988f for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 5f08893e5cb7fdf3, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 5f08893e5cb7fdf3, SrcConnectionID: e83a51268ed00cf9e67ce1c4842e642f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: e83a51268ed00cf9e67ce1c4842e642f, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID e5ce62dc. 2025/04/30 09:16:18 Adding connection ID a27661c0. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 5f08893e5cb7fdf3 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: e83a51268ed00cf9e67ce1c4842e642f, SrcConnectionID: 1b97988f, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 957, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: e83a51268ed00cf9e67ce1c4842e642f, SrcConnectionID: 1b97988f, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 09:16:18 server Short Header{DestConnectionID: e83a51268ed00cf9e67ce1c4842e642f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a27661c0, StatelessResetToken: 0xc55fe4b07733aabcc72c307def43c869} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e5ce62dc, StatelessResetToken: 0xc75989e45c6227786a881a9fb92db6ec} 2025/04/30 09:16:18 server <- Reading packet 5 (43 bytes) for connection 6b11bd31, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6b11bd31, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 2, AckRanges: {{Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 25.464ms, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [10] 2025/04/30 09:16:18 server updated RTT: 32.516ms (σ: 9.546ms) 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/bdb82ed28ef934eb.sqlog 2025/04/30 09:16:18 server Changing connection ID to b2a32056. 2025/04/30 09:16:18 Adding connection IDs bdb82ed28ef934eb and b2a32056 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection bdb82ed28ef934eb, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: bdb82ed28ef934eb, SrcConnectionID: 0d677d7abf7ff4383e7afba4f31e670f, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0d677d7abf7ff4383e7afba4f31e670f, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID cbbcfd6c. 2025/04/30 09:16:18 Adding connection ID e6f1a773. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection bdb82ed28ef934eb 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0d677d7abf7ff4383e7afba4f31e670f, SrcConnectionID: b2a32056, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 961, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0d677d7abf7ff4383e7afba4f31e670f, SrcConnectionID: b2a32056, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0d677d7abf7ff4383e7afba4f31e670f, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: cbbcfd6c, StatelessResetToken: 0xea1109cf43cab54a63e69ec5de82444c} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e6f1a773, StatelessResetToken: 0xaa35f62ec6ce4f317dffe593e067c8dd} 2025/04/30 09:16:18 server <- Reading packet 4 (43 bytes) for connection ccfe9bf4, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: ccfe9bf4, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [0c448182 ccfe9bf4] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Connection a8a82c7728e52f1b closed. 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (1280 bytes) for connection 5f08893e5cb7fdf3, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: e83a51268ed00cf9e67ce1c4842e642f, SrcConnectionID: 1b97988f, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection 5f08893e5cb7fdf3, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: e83a51268ed00cf9e67ce1c4842e642f, SrcConnectionID: 1b97988f, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 1 (66 bytes) for connection cbbcfd6c, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: cbbcfd6c, SrcConnectionID: 0d677d7abf7ff4383e7afba4f31e670f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.496ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.560258ms (σ: 17.780129ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection cbbcfd6c, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: cbbcfd6c, SrcConnectionID: 0d677d7abf7ff4383e7afba4f31e670f, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.496ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.56ms (σ: 13.335ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID bdb82ed28ef934eb in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection cbbcfd6c, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: cbbcfd6c, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.808ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.563ms (σ: 10.007ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID b2a32056 in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 1 (276 bytes) for connection bdb82ed28ef934eb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0d677d7abf7ff4383e7afba4f31e670f, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 551.331µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x8bdba4ee544c7bed3ef2e7081f9cb2623784431d407e42ea445a853fa765b06cf319e139400d1438c138d9eb18cffa92ce647bf531bd8733aad03ac67101846214fd76fcbace275380df1733c88985aff4b8f2240452} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server <- Reading packet 1 (45 bytes) for connection cbbcfd6c, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: cbbcfd6c, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 Received request: GET /ntxhlgostw 2025/04/30 09:16:18 server -> Sending packet 2 (1070 bytes) for connection bdb82ed28ef934eb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0d677d7abf7ff4383e7afba4f31e670f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 773.263µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/7e77de277db38b13.sqlog 2025/04/30 09:16:18 server Changing connection ID to d9ef85fb. 2025/04/30 09:16:18 Adding connection IDs 7e77de277db38b13 and d9ef85fb for a new connection. 2025/04/30 09:16:18 server <- Reading packet 4 (1200 bytes) for connection 7e77de277db38b13, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 7e77de277db38b13, SrcConnectionID: a46adec90ee75a551172b412bb7b5942, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a46adec90ee75a551172b412bb7b5942, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID d3d1a46b. 2025/04/30 09:16:18 Adding connection ID 493823b8. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/b83f6a0205a40a6e.sqlog 2025/04/30 09:16:18 server Changing connection ID to 27a07e73. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7e77de277db38b13 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: a46adec90ee75a551172b412bb7b5942, SrcConnectionID: d9ef85fb, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 403, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 Adding connection IDs b83f6a0205a40a6e and 27a07e73 for a new connection. 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: a46adec90ee75a551172b412bb7b5942, SrcConnectionID: d9ef85fb, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:16:18 server Short Header{DestConnectionID: a46adec90ee75a551172b412bb7b5942, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d3d1a46b, StatelessResetToken: 0x39083216da4b9dcc0c406dcf4c39ae5c} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 493823b8, StatelessResetToken: 0x7eb116ab640a7d53a44e9bc729fb9d98} 2025/04/30 09:16:18 server <- Reading packet 2 (1200 bytes) for connection b83f6a0205a40a6e, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: b83f6a0205a40a6e, SrcConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 13 (38 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:18 server -> Sending packet 14 (38 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 5a1cd8be. 2025/04/30 09:16:18 Adding connection ID 6a9f19a4. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection b83f6a0205a40a6e 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, SrcConnectionID: 27a07e73, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 406, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, SrcConnectionID: 27a07e73, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a9f19a4, StatelessResetToken: 0x8ca77e4958a2533041432a556baa9e6b} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5a1cd8be, StatelessResetToken: 0x182b4b53281994223ad15e3d5d889824} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/aa5c56edc5fc68b1.sqlog 2025/04/30 09:16:18 server Changing connection ID to ce88b12b. 2025/04/30 09:16:18 Adding connection IDs aa5c56edc5fc68b1 and ce88b12b for a new connection. 2025/04/30 09:16:18 server <- Reading packet 4 (1200 bytes) for connection aa5c56edc5fc68b1, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: aa5c56edc5fc68b1, SrcConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 65159697. 2025/04/30 09:16:18 Adding connection ID 55a4b84b. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection aa5c56edc5fc68b1 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, SrcConnectionID: ce88b12b, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 403, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, SrcConnectionID: ce88b12b, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65159697, StatelessResetToken: 0x05c4ad30f12d147d3258e4b935212cb6} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 55a4b84b, StatelessResetToken: 0xd28866f414205005700b582b8b8f5e33} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/2042160d39233ae2.sqlog 2025/04/30 09:16:18 server Changing connection ID to d08a1bb7. 2025/04/30 09:16:18 Adding connection IDs 2042160d39233ae2 and d08a1bb7 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 2 (1200 bytes) for connection 2042160d39233ae2, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 2042160d39233ae2, SrcConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 3abce2d5. 2025/04/30 09:16:18 Adding connection ID 8ae8280d. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2042160d39233ae2 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, SrcConnectionID: d08a1bb7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 418, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, SrcConnectionID: d08a1bb7, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 09:16:18 server Short Header{DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8ae8280d, StatelessResetToken: 0x23811d27c0b694557d32d0fa0fbf0227} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3abce2d5, StatelessResetToken: 0x62b6b324a84ce1dbb91f2d90025f9417} 2025/04/30 09:16:18 server <- Reading packet 4 (1200 bytes) for connection 2042160d39233ae2, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 2042160d39233ae2, SrcConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:18 server -> Sending packet 1 (58 bytes) for connection 2042160d39233ae2, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, SrcConnectionID: d08a1bb7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/8a32fede7efbd0af.sqlog 2025/04/30 09:16:18 server Changing connection ID to 5a613032. 2025/04/30 09:16:18 Adding connection IDs 8a32fede7efbd0af and 5a613032 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 4 (1200 bytes) for connection 8a32fede7efbd0af, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 8a32fede7efbd0af, SrcConnectionID: 721b19a492bb153415b954a33361a1c2, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 721b19a492bb153415b954a33361a1c2, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID e3f1aa62. 2025/04/30 09:16:18 Adding connection ID d1afec0a. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 8a32fede7efbd0af 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 721b19a492bb153415b954a33361a1c2, SrcConnectionID: 5a613032, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 413, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 721b19a492bb153415b954a33361a1c2, SrcConnectionID: 5a613032, PacketNumber: 0, PacketNumberLen: 2, Length: 725, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 703, Offset + Data length: 703} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 721b19a492bb153415b954a33361a1c2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d1afec0a, StatelessResetToken: 0xeb68c64b4bc8c20262c48cf003eb656f} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e3f1aa62, StatelessResetToken: 0x06086748a650acbc003e289aa5ca7cf9} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/3ec7174f5efdb35f.sqlog 2025/04/30 09:16:18 server Changing connection ID to 0f89496a. 2025/04/30 09:16:18 Adding connection IDs 3ec7174f5efdb35f and 0f89496a for a new connection. 2025/04/30 09:16:18 server <- Reading packet 4 (1200 bytes) for connection 3ec7174f5efdb35f, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 3ec7174f5efdb35f, SrcConnectionID: 97dcf4a2eada4d67dde71470a189e746, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 97dcf4a2eada4d67dde71470a189e746, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 23442af2. 2025/04/30 09:16:18 Adding connection ID 7fe99c6b. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3ec7174f5efdb35f 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, SrcConnectionID: 0f89496a, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 410, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, SrcConnectionID: 0f89496a, PacketNumber: 0, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7fe99c6b, StatelessResetToken: 0x874d33d0d447855fa434473913eb7eab} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 23442af2, StatelessResetToken: 0xf58fd6dd8872f1494d949b31bb5aa87b} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/988c637e89230fbb.sqlog 2025/04/30 09:16:18 server Changing connection ID to 73b8fc7e. 2025/04/30 09:16:18 Adding connection IDs 988c637e89230fbb and 73b8fc7e for a new connection. 2025/04/30 09:16:18 server <- Reading packet 2 (1200 bytes) for connection 988c637e89230fbb, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 988c637e89230fbb, SrcConnectionID: 8aea6d7615bc08b3909417e331a67d4c, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 8aea6d7615bc08b3909417e331a67d4c, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID e792b4cd. 2025/04/30 09:16:18 Adding connection ID e0b0f4de. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 988c637e89230fbb 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 8aea6d7615bc08b3909417e331a67d4c, SrcConnectionID: 73b8fc7e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 406, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 8aea6d7615bc08b3909417e331a67d4c, SrcConnectionID: 73b8fc7e, PacketNumber: 0, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8aea6d7615bc08b3909417e331a67d4c, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: e0b0f4de, StatelessResetToken: 0xbeafb49833f5bf12bdcbdfba7f926cb0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e792b4cd, StatelessResetToken: 0xec2c1500bd3ed6155ad191e459a10d44} 2025/04/30 09:16:18 server <- Reading packet 4 (1200 bytes) for connection 988c637e89230fbb, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 988c637e89230fbb, SrcConnectionID: 8aea6d7615bc08b3909417e331a67d4c, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:18 server -> Sending packet 1 (58 bytes) for connection 988c637e89230fbb, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 8aea6d7615bc08b3909417e331a67d4c, SrcConnectionID: 73b8fc7e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/75dfef6789fc6f9b.sqlog 2025/04/30 09:16:18 server Changing connection ID to 35b0909e. 2025/04/30 09:16:18 Adding connection IDs 75dfef6789fc6f9b and 35b0909e for a new connection. 2025/04/30 09:16:18 server <- Reading packet 2 (1200 bytes) for connection 75dfef6789fc6f9b, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 75dfef6789fc6f9b, SrcConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 304b83f1. 2025/04/30 09:16:18 Adding connection ID 0a58a395. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 75dfef6789fc6f9b 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, SrcConnectionID: 35b0909e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 411, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, SrcConnectionID: 35b0909e, PacketNumber: 0, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 304b83f1, StatelessResetToken: 0x7bd67e2bdfea1968de687545f04a2ff4} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0a58a395, StatelessResetToken: 0x1479eab6b86e94467c029caee49ed3db} 2025/04/30 09:16:18 server <- Reading packet 4 (1200 bytes) for connection 75dfef6789fc6f9b, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 75dfef6789fc6f9b, SrcConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:18 server -> Sending packet 1 (58 bytes) for connection 75dfef6789fc6f9b, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, SrcConnectionID: 35b0909e, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/3ae4925c294f84fd.sqlog 2025/04/30 09:16:18 server Changing connection ID to 999aabb4. 2025/04/30 09:16:18 Adding connection IDs 3ae4925c294f84fd and 999aabb4 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 4 (1200 bytes) for connection 3ae4925c294f84fd, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 3ae4925c294f84fd, SrcConnectionID: 6c009568bfce9c79516ab1fb87871f71, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server <- Reading packet 1 (1200 bytes) for connection 1b97988f, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 1b97988f, SrcConnectionID: e83a51268ed00cf9e67ce1c4842e642f, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 4.792ms} 2025/04/30 09:16:18 server newly acked packets (1): [2] 2025/04/30 09:16:18 server updated RTT: 50.098798ms (σ: 25.049399ms) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6c009568bfce9c79516ab1fb87871f71, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID ddf1065d. 2025/04/30 09:16:18 Adding connection ID f98d648b. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 3ae4925c294f84fd 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 6c009568bfce9c79516ab1fb87871f71, SrcConnectionID: 999aabb4, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 403, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 6c009568bfce9c79516ab1fb87871f71, SrcConnectionID: 999aabb4, PacketNumber: 0, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6c009568bfce9c79516ab1fb87871f71, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f98d648b, StatelessResetToken: 0x60f1cec1a007251a635499d67d857e65} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ddf1065d, StatelessResetToken: 0x02bfbbcc650805a844264a4c9cbbeafe} 2025/04/30 09:16:18 server <- Reading packet 2 (139 bytes) for connection cbbcfd6c, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: cbbcfd6c, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 952µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [1] 2025/04/30 09:16:18 server updated RTT: 36.24ms (σ: 8.859ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 56414ace1915e84dc83c14c8e5b3d609, StatelessResetToken: 0xaec57ad834789e9ad57c9a407578e2eb} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: a7e707d8589383d23d6053e824db46ed, StatelessResetToken: 0xafc97e34495827268404e5239885b41d} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: f861ea8cc7d80c4eebdf9d7762032422, StatelessResetToken: 0xf2383a45fcee08df8462a53527751037} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server Ignoring all packets below 1. 2025/04/30 09:16:18 server -> Sending packet 3 (45 bytes) for connection bdb82ed28ef934eb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 56414ace1915e84dc83c14c8e5b3d609, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 371.096µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/431ec75933692438.sqlog 2025/04/30 09:16:18 server Changing connection ID to 127b0cf1. 2025/04/30 09:16:18 Adding connection IDs 431ec75933692438 and 127b0cf1 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 431ec75933692438, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 431ec75933692438, SrcConnectionID: 399e9f95410f46a670181a767c28f57b, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 399e9f95410f46a670181a767c28f57b, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 276675ad. 2025/04/30 09:16:18 Adding connection ID 29c277fa. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 431ec75933692438 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 399e9f95410f46a670181a767c28f57b, SrcConnectionID: 127b0cf1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 953, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 399e9f95410f46a670181a767c28f57b, SrcConnectionID: 127b0cf1, PacketNumber: 0, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 399e9f95410f46a670181a767c28f57b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 276675ad, StatelessResetToken: 0xb8a75bdf52bd30fbebff940640c32719} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 29c277fa, StatelessResetToken: 0x48563c0ef9c0bc36265be11834bb514a} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 09:16:18 server -> Sending packet 12 (315 bytes) for connection 16f03cc6e5b26eef, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x9557d05be8617bed03dd91bb90fc385a7813056c8f1b589ceb9723bfdc331e46cde1456022222de6f559e682d9396c0c97603d1d718c18a5b3e835cb6f5a2cea25c0c767009090cd21f9c6939c2b25e97b2ed0e668a2} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ea7b5a83, StatelessResetToken: 0xe355726e5e49d68e0f7f175d650217d8} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 6269ac2a, StatelessResetToken: 0x7c777fc41c85a9bb9f9c69014089f0ae} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server Skipping packet number 11 2025/04/30 09:16:18 server -> Sending packet 13 (1061 bytes) for connection 16f03cc6e5b26eef, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server -> Sending packet 14 (1366 bytes) for connection 16f03cc6e5b26eef, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0f36f33c56d87ecda9c32ac1f5acfd81, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.PingFrame{} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 5 (66 bytes) for connection d3d1a46b, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: d3d1a46b, SrcConnectionID: a46adec90ee75a551172b412bb7b5942, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 25.368ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 37.56181ms (σ: 18.780905ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection d3d1a46b, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: d3d1a46b, SrcConnectionID: a46adec90ee75a551172b412bb7b5942, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 25.368ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 37.561ms (σ: 14.085ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 7e77de277db38b13 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server -> Sending packet 1 (267 bytes) for connection 7e77de277db38b13, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: a46adec90ee75a551172b412bb7b5942, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x91b147e466a5548bcf7ecf35e245d00f608ba3b28407f21f68ae31394a4dccce42a2bf3724cdc85ab61485c7a5ab577d2c4354983140c5750190c85064a4b1c808d5f81a652cd592711722a5bd7d1791c6391abea4ba} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection d3d1a46b, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: d3d1a46b, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3.168ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 37.584ms (σ: 10.61ms) 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID d9ef85fb in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 2 (43 bytes) for connection 7e77de277db38b13, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: a46adec90ee75a551172b412bb7b5942, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 275.351µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 5 (66 bytes) for connection 8ae8280d, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 8ae8280d, SrcConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.32ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 36.814338ms (σ: 18.407169ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection 8ae8280d, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 8ae8280d, SrcConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.32ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 36.814ms (σ: 13.805ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 2042160d39233ae2 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection 8ae8280d, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8ae8280d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.912ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 36.815ms (σ: 10.356ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID d08a1bb7 in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 1 (275 bytes) for connection 2042160d39233ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 444.3µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x52b436586c147205e69b11ffafb594d1d7b3aa7ddb53a1973aeb53608293c73ebf33b97f39a62e0ca93e55d00ba31c4089529cc94c65be58ee83c5fad6bf1d4834a198982c99928111a268e0029c81c3a6f9b307305f} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server <- Reading packet 1 (45 bytes) for connection 8ae8280d, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8ae8280d, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 Received request: GET /sylavndjpt 2025/04/30 09:16:18 server -> Sending packet 2 (1070 bytes) for connection 2042160d39233ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 547.957µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 5 (66 bytes) for connection d1afec0a, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: d1afec0a, SrcConnectionID: 721b19a492bb153415b954a33361a1c2, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.128ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 37.437189ms (σ: 18.718594ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection d1afec0a, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: d1afec0a, SrcConnectionID: 721b19a492bb153415b954a33361a1c2, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 15.128ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 37.437ms (σ: 14.038ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 8a32fede7efbd0af in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server -> Sending packet 1 (267 bytes) for connection 8a32fede7efbd0af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 721b19a492bb153415b954a33361a1c2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x283d27aa51a3e9e4a51accbe33883a82b2ce312db1023ef9dda42fb00348191aba7d29c54f9c7c8c572089ff2ac6d6c2941dad5b40427c7aa8bfb159bbb9e32fd0dab56fd4b94dfcb25b951219f4c5d6e1fe834dda8f} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection d1afec0a, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: d1afec0a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.888ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 37.445ms (σ: 10.546ms) 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID 5a613032 in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 2 (43 bytes) for connection 8a32fede7efbd0af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 721b19a492bb153415b954a33361a1c2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 285.932µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 5 (66 bytes) for connection e0b0f4de, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: e0b0f4de, SrcConnectionID: 8aea6d7615bc08b3909417e331a67d4c, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.344ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 38.029915ms (σ: 19.014957ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection e0b0f4de, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: e0b0f4de, SrcConnectionID: 8aea6d7615bc08b3909417e331a67d4c, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.344ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 38.029ms (σ: 14.26ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 988c637e89230fbb in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server -> Sending packet 1 (267 bytes) for connection 988c637e89230fbb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8aea6d7615bc08b3909417e331a67d4c, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0xf864a8c91481d55b7db172b823c2ba2d873e7e659e1d248b20b48bd16fdf02bf44b0524b034ba57d754b9af9d106fc4059e9f27598e6545ba9d236cab540dcbc03f471f5dd2335dfa1f656667faafb7c42445edac8ae} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection e0b0f4de, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: e0b0f4de, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.792ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 38.041ms (σ: 10.719ms) 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID 73b8fc7e in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server <- Reading packet 1 (45 bytes) for connection e0b0f4de, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: e0b0f4de, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server -> Sending packet 2 (43 bytes) for connection 988c637e89230fbb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8aea6d7615bc08b3909417e331a67d4c, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 139.568µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 Received request: GET /xeoiadwxvz 2025/04/30 09:16:18 server -> Sending packet 3 (1061 bytes) for connection 988c637e89230fbb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8aea6d7615bc08b3909417e331a67d4c, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 1 (66 bytes) for connection 276675ad, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 276675ad, SrcConnectionID: 399e9f95410f46a670181a767c28f57b, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.448ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.302892ms (σ: 17.651446ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection 276675ad, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 276675ad, SrcConnectionID: 399e9f95410f46a670181a767c28f57b, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.448ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.302ms (σ: 13.238ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 431ec75933692438 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server -> Sending packet 1 (267 bytes) for connection 431ec75933692438, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 399e9f95410f46a670181a767c28f57b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0xff943cb8f8bad4da50fdff577d2cd1d3bf51b6e2f5f97efe6723b067cdf5cba63159168f0946d4b39501a08861ca0f2a920777416511b5a51e13aea4de25f1a340d6e9fab00d70628ce4c52985a071afb5113bb133b4} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection 276675ad, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 276675ad, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.8ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.318ms (σ: 9.961ms) 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID 127b0cf1 in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 2 (43 bytes) for connection 431ec75933692438, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 399e9f95410f46a670181a767c28f57b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 257.784µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Reading packet 2 (139 bytes) for connection d3d1a46b, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: d3d1a46b, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 656µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [1] 2025/04/30 09:16:18 server updated RTT: 36.918ms (σ: 9.289ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 016a31f130a8f9e910ca5093adffa9e0, StatelessResetToken: 0x028d2e4bb165ad482ada393d2d607ece} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 723c6167430a7ddbeacf466eb6455465, StatelessResetToken: 0xb772dfd8ef7de63a5f33c8f755f17fa0} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 0b5b95c439854ca16790e71d0e3093a0, StatelessResetToken: 0x5ce6ebc5a368b87563a80eac91afd6c6} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 3 (47 bytes) for connection 7e77de277db38b13, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 016a31f130a8f9e910ca5093adffa9e0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 162.965µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (210 bytes) for connection 5f08893e5cb7fdf3, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: e83a51268ed00cf9e67ce1c4842e642f, SrcConnectionID: 1b97988f, PacketNumber: 1, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 09:16:18 server -> Sending packet 2 (210 bytes) for connection 5f08893e5cb7fdf3, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: e83a51268ed00cf9e67ce1c4842e642f, SrcConnectionID: 1b97988f, PacketNumber: 2, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 65 bytes. Remaining: 43 bytes. 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server <- Reading packet 2 (43 bytes) for connection e0b0f4de, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: e0b0f4de, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [e792b4cd e0b0f4de] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Connection 988c637e89230fbb closed. 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/137493c9da2f9617.sqlog 2025/04/30 09:16:18 server Changing connection ID to fe9d7b6e. 2025/04/30 09:16:18 Adding connection IDs 137493c9da2f9617 and fe9d7b6e for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 137493c9da2f9617, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 137493c9da2f9617, SrcConnectionID: 2f0c1ee1ee4656f12876b8df46973cd2, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 2f0c1ee1ee4656f12876b8df46973cd2, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 972f42a5. 2025/04/30 09:16:18 Adding connection ID f6a4bce0. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 137493c9da2f9617 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 2f0c1ee1ee4656f12876b8df46973cd2, SrcConnectionID: fe9d7b6e, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 954, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 2f0c1ee1ee4656f12876b8df46973cd2, SrcConnectionID: fe9d7b6e, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 2f0c1ee1ee4656f12876b8df46973cd2, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f6a4bce0, StatelessResetToken: 0xfa349ace90a895460a488cd03053b720} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 972f42a5, StatelessResetToken: 0x425a281e8e0f02b75d9079563cbafe1a} 2025/04/30 09:16:18 Created qlog file: /logs/qlog/c5b7ab7260106ffc.sqlog 2025/04/30 09:16:18 server Changing connection ID to 945f23e1. 2025/04/30 09:16:18 Adding connection IDs c5b7ab7260106ffc and 945f23e1 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 2 (1200 bytes) for connection c5b7ab7260106ffc, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: c5b7ab7260106ffc, SrcConnectionID: eafc4daecce10f5f601709fa44b10001, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: eafc4daecce10f5f601709fa44b10001, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID b6d56067. 2025/04/30 09:16:18 Adding connection ID 533b7ef2. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection c5b7ab7260106ffc 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: eafc4daecce10f5f601709fa44b10001, SrcConnectionID: 945f23e1, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 963, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: eafc4daecce10f5f601709fa44b10001, SrcConnectionID: 945f23e1, PacketNumber: 0, PacketNumberLen: 2, Length: 175, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 153, Offset + Data length: 153} 2025/04/30 09:16:18 server Short Header{DestConnectionID: eafc4daecce10f5f601709fa44b10001, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: b6d56067, StatelessResetToken: 0x0ac7ca5b6a234617b7000611ae3b0444} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 533b7ef2, StatelessResetToken: 0x51ff725d47ab9343dea773192e86d2d6} 2025/04/30 09:16:18 server <- Reading packet 7 (43 bytes) for connection 6269ac2a, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6269ac2a, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [0f422bf2 6269ac2a ea7b5a83] with a closed connection. 2025/04/30 09:16:18 server Connection 16f03cc6e5b26eef closed. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server <- Reading packet 3 (54 bytes) for connection d3d1a46b, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: d3d1a46b, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 808µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [3] 2025/04/30 09:16:18 server updated RTT: 36.321ms (σ: 8.16ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server Ignoring all packets below 3. 2025/04/30 09:16:18 Received request: GET /bpmsbivcgz 2025/04/30 09:16:18 server -> Sending packet 4 (1069 bytes) for connection 7e77de277db38b13, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 016a31f130a8f9e910ca5093adffa9e0, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 295.432µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 0 (91 bytes) for connection 1b97988f, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 1b97988f, SrcConnectionID: e83a51268ed00cf9e67ce1c4842e642f, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 8.24ms} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 5f08893e5cb7fdf3 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 2 (315 bytes) for connection 5f08893e5cb7fdf3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: e83a51268ed00cf9e67ce1c4842e642f, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a27661c0, StatelessResetToken: 0xc55fe4b07733aabcc72c307def43c869} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x2c38a069466aa4ac8431f684299aa06fb4b7e09ef64a23d50217cef1c7d4e644248c4cf2c6d9f0472fbaa98daf5cb7f434905e76db342e9ed31237fee2fbc853d200c28ba9588b82d02e31a00a62177cb37952acd95f} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e5ce62dc, StatelessResetToken: 0xc75989e45c6227786a881a9fb92db6ec} 2025/04/30 09:16:18 server -> Sending packet 3 (315 bytes) for connection 5f08893e5cb7fdf3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: e83a51268ed00cf9e67ce1c4842e642f, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x2c38a069466aa4ac8431f684299aa06fb4b7e09ef64a23d50217cef1c7d4e644248c4cf2c6d9f0472fbaa98daf5cb7f434905e76db342e9ed31237fee2fbc853d200c28ba9588b82d02e31a00a62177cb37952acd95f} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e5ce62dc, StatelessResetToken: 0xc75989e45c6227786a881a9fb92db6ec} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a27661c0, StatelessResetToken: 0xc55fe4b07733aabcc72c307def43c869} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server <- Reading packet 0 (45 bytes) for connection 1b97988f, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 1b97988f, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 4 (43 bytes) for connection 5f08893e5cb7fdf3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: e83a51268ed00cf9e67ce1c4842e642f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 79.519µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 Received request: GET /xohedwvmli 2025/04/30 09:16:18 server -> Sending packet 5 (1061 bytes) for connection 5f08893e5cb7fdf3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: e83a51268ed00cf9e67ce1c4842e642f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 5 (1061 bytes) for connection bdb82ed28ef934eb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 56414ace1915e84dc83c14c8e5b3d609, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Skipping packet number 4 2025/04/30 09:16:18 server -> Sending packet 6 (37 bytes) for connection bdb82ed28ef934eb, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 56414ace1915e84dc83c14c8e5b3d609, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 1 (66 bytes) for connection f6a4bce0, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: f6a4bce0, SrcConnectionID: 2f0c1ee1ee4656f12876b8df46973cd2, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 13.712ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.37157ms (σ: 17.685785ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection f6a4bce0, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: f6a4bce0, SrcConnectionID: 2f0c1ee1ee4656f12876b8df46973cd2, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 13.712ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.371ms (σ: 13.263ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 137493c9da2f9617 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection f6a4bce0, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: f6a4bce0, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.712ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.372ms (σ: 9.949ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID fe9d7b6e in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server <- Reading packet 1 (45 bytes) for connection f6a4bce0, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: f6a4bce0, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server -> Sending packet 1 (276 bytes) for connection 137493c9da2f9617, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 2f0c1ee1ee4656f12876b8df46973cd2, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 594.675µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x45adc8adfbb3b7b254571f85478121491b94f9902492d6eda0685c4f35bd7159f2091ab5c5da9675f834dc8cf7cf17aa9ed7ae094353066cbe55cf7e5660060af8c7eb42c788c12bfbec14de0982ad043fae72204dc5} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 Received request: GET /fkpizkygfq 2025/04/30 09:16:18 server -> Sending packet 2 (1061 bytes) for connection 137493c9da2f9617, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 2f0c1ee1ee4656f12876b8df46973cd2, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (1280 bytes) for connection c5b7ab7260106ffc, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: eafc4daecce10f5f601709fa44b10001, SrcConnectionID: 945f23e1, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection c5b7ab7260106ffc, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: eafc4daecce10f5f601709fa44b10001, SrcConnectionID: 945f23e1, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:18 server <- Reading packet 4 (43 bytes) for connection d3d1a46b, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: d3d1a46b, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [d3d1a46b 493823b8] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Connection 7e77de277db38b13 closed. 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/014e4c4a2551465e.sqlog 2025/04/30 09:16:18 server Changing connection ID to 7d0530c8. 2025/04/30 09:16:18 Adding connection IDs 014e4c4a2551465e and 7d0530c8 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 014e4c4a2551465e, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 014e4c4a2551465e, SrcConnectionID: 03a999d5204dfb6dc44bba11be730e6e, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 03a999d5204dfb6dc44bba11be730e6e, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID eb51bc7e. 2025/04/30 09:16:18 Adding connection ID 9c5cac1b. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 014e4c4a2551465e 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 03a999d5204dfb6dc44bba11be730e6e, SrcConnectionID: 7d0530c8, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 967, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 03a999d5204dfb6dc44bba11be730e6e, SrcConnectionID: 7d0530c8, PacketNumber: 0, PacketNumberLen: 2, Length: 171, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 149, Offset + Data length: 149} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 03a999d5204dfb6dc44bba11be730e6e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 9c5cac1b, StatelessResetToken: 0xc63ebbe2e9e3547b26e35a9e5720ea04} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: eb51bc7e, StatelessResetToken: 0x5e8b4b0b5eec708faa4049d8c7dc6064} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 4 (267 bytes) for connection 2042160d39233ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x52b436586c147205e69b11ffafb594d1d7b3aa7ddb53a1973aeb53608293c73ebf33b97f39a62e0ca93e55d00ba31c4089529cc94c65be58ee83c5fad6bf1d4834a198982c99928111a268e0029c81c3a6f9b307305f} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server Skipping packet number 3 2025/04/30 09:16:18 server -> Sending packet 5 (1061 bytes) for connection 2042160d39233ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 1 (141 bytes) for connection a27661c0, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: a27661c0, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 872µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 0feb85fd40084de909a5cb0980cfa6b2, StatelessResetToken: 0x255d78908c12fe5dc1a9319e76342316} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 704dcd6ee9a0e3fc88234bc0bbbfa745, StatelessResetToken: 0xe96003208137f033fd77ae3403887f4e} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 7a448de0cf577362093b2763b409f29f, StatelessResetToken: 0x437ac7c3543d71e9f0c16a45cad4d70a} 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID 1b97988f in 5s. 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server -> Sending packet 6 (45 bytes) for connection 5f08893e5cb7fdf3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0feb85fd40084de909a5cb0980cfa6b2, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 134.292µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server <- Reading packet 2 (43 bytes) for connection a27661c0, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: a27661c0, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [e5ce62dc a27661c0] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Connection 5f08893e5cb7fdf3 closed. 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 4 (267 bytes) for connection 8a32fede7efbd0af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 721b19a492bb153415b954a33361a1c2, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x283d27aa51a3e9e4a51accbe33883a82b2ce312db1023ef9dda42fb00348191aba7d29c54f9c7c8c572089ff2ac6d6c2941dad5b40427c7aa8bfb159bbb9e32fd0dab56fd4b94dfcb25b951219f4c5d6e1fe834dda8f} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> Sending packet 5 (267 bytes) for connection 8a32fede7efbd0af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 721b19a492bb153415b954a33361a1c2, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x283d27aa51a3e9e4a51accbe33883a82b2ce312db1023ef9dda42fb00348191aba7d29c54f9c7c8c572089ff2ac6d6c2941dad5b40427c7aa8bfb159bbb9e32fd0dab56fd4b94dfcb25b951219f4c5d6e1fe834dda8f} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server <- Reading packet 2 (139 bytes) for connection f6a4bce0, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: f6a4bce0, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 864µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [1] 2025/04/30 09:16:18 server updated RTT: 35.016ms (σ: 8.173ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 9d2c4b8399aa10955c71b87cf8ca74c5, StatelessResetToken: 0xa13beec9c67504057330c0fc02c11f29} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 04b58f26e9f39b1c4abcdb41353f61f8, StatelessResetToken: 0x3debad0dac849cf183adceb02908d32f} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 4bde4d2d6e92a1879da3f3471e8a901e, StatelessResetToken: 0x77110036625c44bc22f16cee56c7a3cb} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server Ignoring all packets below 2. 2025/04/30 09:16:18 server -> Sending packet 3 (45 bytes) for connection 137493c9da2f9617, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 9d2c4b8399aa10955c71b87cf8ca74c5, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 158.907µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server <- Reading packet 3 (43 bytes) for connection f6a4bce0, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: f6a4bce0, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [972f42a5 f6a4bce0] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Connection 137493c9da2f9617 closed. 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 5 (83 bytes) for connection 3b59850fbfc10840, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 44727a38, StatelessResetToken: 0x7bee91badf4b991470ada81c02467f2b} 2025/04/30 09:16:18 server -> Sending packet 4 (267 bytes) for connection 431ec75933692438, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 399e9f95410f46a670181a767c28f57b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: eb08d516, StatelessResetToken: 0x7f8a1c81d964776eb773ca3a69486282} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0xff943cb8f8bad4da50fdff577d2cd1d3bf51b6e2f5f97efe6723b067cdf5cba63159168f0946d4b39501a08861ca0f2a920777416511b5a51e13aea4de25f1a340d6e9fab00d70628ce4c52985a071afb5113bb133b4} 2025/04/30 09:16:18 server -> Sending packet 5 (267 bytes) for connection 431ec75933692438, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 399e9f95410f46a670181a767c28f57b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0xff943cb8f8bad4da50fdff577d2cd1d3bf51b6e2f5f97efe6723b067cdf5cba63159168f0946d4b39501a08861ca0f2a920777416511b5a51e13aea4de25f1a340d6e9fab00d70628ce4c52985a071afb5113bb133b4} 2025/04/30 09:16:18 server Skipping packet number 4 2025/04/30 09:16:18 server -> Sending packet 6 (267 bytes) for connection 3b59850fbfc10840, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: a232876c3ff2c635ddfd6cd52d76e81d, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x5f1a8be389e00cb5396c9bedd776cb0fd9db1feb767e8d8495a3800c1f4247ababee448ec220cc01d15bb3c5996c7820af998cc093941c77788eaf9bf331406e93e811606ffd407c61e66fbbe92ea84691c542c5b467} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/46b82446eb13089f.sqlog 2025/04/30 09:16:18 server Changing connection ID to 59dfeafd. 2025/04/30 09:16:18 Adding connection IDs 46b82446eb13089f and 59dfeafd for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 46b82446eb13089f, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 46b82446eb13089f, SrcConnectionID: 7a507057a45e6f516ae4a074827a97d9, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7a507057a45e6f516ae4a074827a97d9, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 5d8231df. 2025/04/30 09:16:18 Adding connection ID 3614cd79. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 46b82446eb13089f 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 7a507057a45e6f516ae4a074827a97d9, SrcConnectionID: 59dfeafd, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 960, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 7a507057a45e6f516ae4a074827a97d9, SrcConnectionID: 59dfeafd, PacketNumber: 0, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 7a507057a45e6f516ae4a074827a97d9, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3614cd79, StatelessResetToken: 0x497673ae9e6be6c18cc82833cbfe134e} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5d8231df, StatelessResetToken: 0x9228887b3a1bade4cd07b850697fe8ad} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 1 (66 bytes) for connection 9c5cac1b, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 9c5cac1b, SrcConnectionID: 03a999d5204dfb6dc44bba11be730e6e, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16.984ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.919642ms (σ: 17.959821ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection 9c5cac1b, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 9c5cac1b, SrcConnectionID: 03a999d5204dfb6dc44bba11be730e6e, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 16.984ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.919ms (σ: 13.469ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 014e4c4a2551465e in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection 9c5cac1b, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 9c5cac1b, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.12ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.922ms (σ: 10.108ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID 7d0530c8 in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 1 (275 bytes) for connection 014e4c4a2551465e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 03a999d5204dfb6dc44bba11be730e6e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 458.257µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0xf793c15c715830df9e43b2ee3d26c1dd9af406e587b462b08b7e36ad3566ae8a000ead8eeab1b6feef3d98301943a5c47fe585ad0b724e577c55f57f447abf5789672d81d343e49614ea1b6598c19a00287d1d070eb3} 2025/04/30 09:16:18 server <- Reading packet 1 (45 bytes) for connection 9c5cac1b, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 9c5cac1b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 Received request: GET /puufnjnpdn 2025/04/30 09:16:18 server -> Sending packet 2 (1070 bytes) for connection 014e4c4a2551465e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 03a999d5204dfb6dc44bba11be730e6e, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 629.466µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/1ddd4b88ec3a6a47.sqlog 2025/04/30 09:16:18 server Changing connection ID to 93e680d2. 2025/04/30 09:16:18 Adding connection IDs 1ddd4b88ec3a6a47 and 93e680d2 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 1ddd4b88ec3a6a47, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 1ddd4b88ec3a6a47, SrcConnectionID: cbb0c77ca5a2f5112916e1ac03a29da3, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: cbb0c77ca5a2f5112916e1ac03a29da3, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID e2b01c13. 2025/04/30 09:16:18 Adding connection ID 114c4367. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1ddd4b88ec3a6a47 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: cbb0c77ca5a2f5112916e1ac03a29da3, SrcConnectionID: 93e680d2, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 957, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: cbb0c77ca5a2f5112916e1ac03a29da3, SrcConnectionID: 93e680d2, PacketNumber: 0, PacketNumberLen: 2, Length: 181, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 159, Offset + Data length: 159} 2025/04/30 09:16:18 server Short Header{DestConnectionID: cbb0c77ca5a2f5112916e1ac03a29da3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 114c4367, StatelessResetToken: 0x6be20c1e9ceabc79e3a76013c9b667f9} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e2b01c13, StatelessResetToken: 0xff0a78739e1e9141995b2bfafcf4465f} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/2cb96ffa81389a50.sqlog 2025/04/30 09:16:18 server Changing connection ID to 4a78d3ca. 2025/04/30 09:16:18 Adding connection IDs 2cb96ffa81389a50 and 4a78d3ca for a new connection. 2025/04/30 09:16:18 server <- Reading packet 2 (1200 bytes) for connection 2cb96ffa81389a50, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 2cb96ffa81389a50, SrcConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 2d8123b9. 2025/04/30 09:16:18 Adding connection ID a07da2c7. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 2cb96ffa81389a50 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, SrcConnectionID: 4a78d3ca, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 961, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, SrcConnectionID: 4a78d3ca, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2d8123b9, StatelessResetToken: 0xb9c001388db1b057c0214354b1adbf65} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a07da2c7, StatelessResetToken: 0x4401baa7bef87a1d37ca9413dabd1a69} 2025/04/30 09:16:18 server <- Reading packet 4 (1200 bytes) for connection 2cb96ffa81389a50, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 2cb96ffa81389a50, SrcConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server -> Sending packet 1 (58 bytes) for connection 2cb96ffa81389a50, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, SrcConnectionID: 4a78d3ca, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Reading packet 4 (143 bytes) for connection 44727a38, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 44727a38, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 984µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (2): [5 6] 2025/04/30 09:16:18 server updated RTT: 126.943ms (σ: 78.99ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server lost packet 3 (time threshold) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 25d0439c2ed1e2a20ce15c8e9c492e4a, StatelessResetToken: 0x5bae1ec3f79fe020cdda697510110257} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 0d1e89ef2a67543f404239c286f44e3c, StatelessResetToken: 0xdc3360dd676b5eeb17db291d5ae35511} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 7d87f8e085072890f2066cd4c4d629de, StatelessResetToken: 0x6b160d868da3dc42b435b1c404918868} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server <- Reading packet 3 (43 bytes) for connection cbbcfd6c, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: cbbcfd6c, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 server -> Sending packet 7 (1073 bytes) for connection 3b59850fbfc10840, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 25d0439c2ed1e2a20ce15c8e9c492e4a, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 Replacing connection for connection IDs [cbbcfd6c e6f1a773] with a closed connection. 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 150.691µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 6 (43 bytes) for connection 44727a38, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 44727a38, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 5}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 984µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Connection bdb82ed28ef934eb closed. 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 8 (47 bytes) for connection 3b59850fbfc10840, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 25d0439c2ed1e2a20ce15c8e9c492e4a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 1, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 186.469µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:18 server -> Sending packet 16 (38 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:18 server -> Sending packet 17 (38 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:18 server -> Sending packet 18 (1430 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.PingFrame{} 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (1280 bytes) for connection b83f6a0205a40a6e, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, SrcConnectionID: 27a07e73, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection b83f6a0205a40a6e, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, SrcConnectionID: 27a07e73, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (1280 bytes) for connection aa5c56edc5fc68b1, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, SrcConnectionID: ce88b12b, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection aa5c56edc5fc68b1, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, SrcConnectionID: ce88b12b, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:18 server <- Reading packet 4 (43 bytes) for connection 8ae8280d, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8ae8280d, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 26.2ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (2): [4 5] 2025/04/30 09:16:18 server updated RTT: 39.633ms (σ: 13.403ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server -> Sending packet 6 (38 bytes) for connection 2042160d39233ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (1280 bytes) for connection 46b82446eb13089f, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 7a507057a45e6f516ae4a074827a97d9, SrcConnectionID: 59dfeafd, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server -> Sending packet 1 (1280 bytes) for connection 3ec7174f5efdb35f, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, SrcConnectionID: 0f89496a, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection 3ec7174f5efdb35f, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, SrcConnectionID: 0f89496a, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection 46b82446eb13089f, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 7a507057a45e6f516ae4a074827a97d9, SrcConnectionID: 59dfeafd, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:18 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection 75dfef6789fc6f9b, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, SrcConnectionID: 35b0909e, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server -> Sending packet 3 (1280 bytes) for connection 75dfef6789fc6f9b, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, SrcConnectionID: 35b0909e, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 1 (66 bytes) for connection 114c4367, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 114c4367, SrcConnectionID: cbb0c77ca5a2f5112916e1ac03a29da3, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.584ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 36.31679ms (σ: 18.158395ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (1280 bytes) for connection 3ae4925c294f84fd, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 6c009568bfce9c79516ab1fb87871f71, SrcConnectionID: 999aabb4, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection 3ae4925c294f84fd, Initial 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection 114c4367, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 114c4367, SrcConnectionID: cbb0c77ca5a2f5112916e1ac03a29da3, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 14.584ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 36.316ms (σ: 13.618ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 6c009568bfce9c79516ab1fb87871f71, SrcConnectionID: 999aabb4, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 1ddd4b88ec3a6a47 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection 114c4367, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 114c4367, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.816ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 36.317ms (σ: 10.217ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID 93e680d2 in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 1 (276 bytes) for connection 1ddd4b88ec3a6a47, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: cbb0c77ca5a2f5112916e1ac03a29da3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 656.469µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x8641b86d4aafd4d2d1b222321d1b0fb4f62b6c9adc01e80971bc6457001252b09aeeb314fed1d921ec7ddc4bf58060f4eb239161c7945ceb01844644278afe71689ad9f3d29d92bdc2d11b798f9e6b02117b63366620} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/f795f1c967e84efe.sqlog 2025/04/30 09:16:18 server Changing connection ID to 51048799. 2025/04/30 09:16:18 Adding connection IDs f795f1c967e84efe and 51048799 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 2 (1200 bytes) for connection f795f1c967e84efe, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: f795f1c967e84efe, SrcConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID ef7f3645. 2025/04/30 09:16:18 Adding connection ID d6fb60be. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection f795f1c967e84efe 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, SrcConnectionID: 51048799, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 968, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, SrcConnectionID: 51048799, PacketNumber: 0, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ef7f3645, StatelessResetToken: 0xeb8f549df9dcfea9de4bfe35cfbe2388} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d6fb60be, StatelessResetToken: 0x9989c20cd525bfd125e938c678c4c00f} 2025/04/30 09:16:18 server <- Reading packet 4 (1200 bytes) for connection f795f1c967e84efe, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: f795f1c967e84efe, SrcConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server <- Reading packet 1 (45 bytes) for connection 114c4367, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 114c4367, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- Reading packet 3 (43 bytes) for connection 276675ad, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 276675ad, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 26.888ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server newly acked packets (1): [5] 2025/04/30 09:16:18 server updated RTT: 35.784ms (σ: 8.403ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 Received request: GET /kfzzfmuxzp 2025/04/30 09:16:18 server -> Sending packet 1 (58 bytes) for connection f795f1c967e84efe, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, SrcConnectionID: 51048799, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> Sending packet 2 (1069 bytes) for connection 1ddd4b88ec3a6a47, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: cbb0c77ca5a2f5112916e1ac03a29da3, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 172.653µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 5 (66 bytes) for connection 2d8123b9, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 2d8123b9, SrcConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 12.848ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 37.080014ms (σ: 18.540007ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection 2d8123b9, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 2d8123b9, SrcConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 12.848ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 37.08ms (σ: 13.905ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 2cb96ffa81389a50 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection 2d8123b9, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 2d8123b9, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.6ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 37.081ms (σ: 10.43ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID 4a78d3ca in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 1 (275 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 408.724µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0xc509d0b2e1219fe3fe76bb0f7b7b69d0b20a4ebba8179965899b814512d32886c7806b8cf196b47d4aa17b72aa75fea3c45d06ade7130c31e6544bd867cf88dc3e1002a174006d15b0f74a547dbf0bd65c08ecb035bd} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server <- Reading packet 8 (43 bytes) for connection 44727a38, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 44727a38, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [6620dc9b 44727a38 eb08d516] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Connection 3b59850fbfc10840 closed. 2025/04/30 09:16:18 server <- Reading packet 6 (43 bytes) for connection 6b11bd31, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6b11bd31, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 17, LowestAcked: 2, AckRanges: {{Largest: 17, Smallest: 17}, {Largest: 10, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 2}}, DelayTime: 680µs, ECT0: 8, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [17] 2025/04/30 09:16:18 server updated RTT: 32.792ms (σ: 7.712ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/58bef5b3cf0c542b.sqlog 2025/04/30 09:16:18 server Changing connection ID to ab07d183. 2025/04/30 09:16:18 Adding connection IDs 58bef5b3cf0c542b and ab07d183 for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 58bef5b3cf0c542b, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 58bef5b3cf0c542b, SrcConnectionID: eb6c7898c662c1415ef87da9e480c110, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: eb6c7898c662c1415ef87da9e480c110, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID d8c65de1. 2025/04/30 09:16:18 Adding connection ID 06fcd54a. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 58bef5b3cf0c542b 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: eb6c7898c662c1415ef87da9e480c110, SrcConnectionID: ab07d183, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 961, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: eb6c7898c662c1415ef87da9e480c110, SrcConnectionID: ab07d183, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 09:16:18 server Short Header{DestConnectionID: eb6c7898c662c1415ef87da9e480c110, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 06fcd54a, StatelessResetToken: 0x02f2a1afe1fc9f4a4e28162a2a55fbff} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8c65de1, StatelessResetToken: 0xf12728681183e3ef04db154bcfd135f6} 2025/04/30 09:16:18 server <- Reading packet 5 (1200 bytes) for connection 27a07e73, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 27a07e73, SrcConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 5.808ms} 2025/04/30 09:16:18 server <- Reading packet 8 (43 bytes) for connection 8ae8280d, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8ae8280d, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 58.928ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 7 (1366 bytes) for connection 2042160d39233ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.PingFrame{} 2025/04/30 09:16:18 server -> Sending packet 8 (47 bytes) for connection 2042160d39233ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 0}}, DelayTime: 125.053µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Reading packet 4 (93 bytes) for connection b6d56067, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: b6d56067, SrcConnectionID: eafc4daecce10f5f601709fa44b10001, PacketNumber: 4, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 931.304ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 153.942113ms (σ: 76.971056ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID c5b7ab7260106ffc in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server -> Sending packet 1 (267 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: eafc4daecce10f5f601709fa44b10001, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x12e6f8ffc82d1c7ade6faf8f06d7406c0b4acffc0dc66b7618e028297a61fccd1ab836537ea6b6825d737579527ce1f787a6613a1e8eff6a854f6d16f3f370f5d11d3832627d6504f7a7db39465e203d6c98b03b54ad} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server <- Reading packet 4 (43 bytes) for connection d1afec0a, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: d1afec0a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 173.4ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 6 (1366 bytes) for connection 8a32fede7efbd0af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 721b19a492bb153415b954a33361a1c2, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.PingFrame{} 2025/04/30 09:16:18 server <- Reading packet 6 (43 bytes) for connection d1afec0a, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: d1afec0a, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 173.4ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server -> Sending packet 7 (47 bytes) for connection 8a32fede7efbd0af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 721b19a492bb153415b954a33361a1c2, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 85.532µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server Sending ACK because the ACK timer expired. 2025/04/30 09:16:18 server -> Sending packet 19 (46 bytes) for connection 361b43c33ab9281b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 77085a0c36e3884f4a044de610098653, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 25.503695ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server Queueing packet (43 bytes) for later decryption 2025/04/30 09:16:18 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 1 (1280 bytes) for connection 58bef5b3cf0c542b, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: eb6c7898c662c1415ef87da9e480c110, SrcConnectionID: ab07d183, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection 58bef5b3cf0c542b, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: eb6c7898c662c1415ef87da9e480c110, SrcConnectionID: ab07d183, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 2 (1280 bytes) for connection f795f1c967e84efe, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, SrcConnectionID: 51048799, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server -> Sending packet 3 (1280 bytes) for connection f795f1c967e84efe, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, SrcConnectionID: 51048799, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server <- Reading packet 2 (139 bytes) for connection b6d56067, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: b6d56067, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 1.28ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (2): [0 1] 2025/04/30 09:16:18 server updated RTT: 139.001ms (σ: 87.608ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, StatelessResetToken: 0x68d49114445cf8d8ec92bb8110d4a136} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: c95557ff8dad69a4d9a53428f3f93c5e, StatelessResetToken: 0xc199361575b73f9b5d466ab84e5a82a9} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 0211a8755e385614df80ead4eaf720e2, StatelessResetToken: 0xf8817939be9c5506e2230f4ee9735f2f} 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 2 (45 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 183.423µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 4 (267 bytes) for connection 014e4c4a2551465e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 03a999d5204dfb6dc44bba11be730e6e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0xf793c15c715830df9e43b2ee3d26c1dd9af406e587b462b08b7e36ad3566ae8a000ead8eeab1b6feef3d98301943a5c47fe585ad0b724e577c55f57f447abf5789672d81d343e49614ea1b6598c19a00287d1d070eb3} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server Skipping packet number 3 2025/04/30 09:16:18 server -> Sending packet 5 (1061 bytes) for connection 014e4c4a2551465e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 03a999d5204dfb6dc44bba11be730e6e, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 7 (162 bytes) for connection d1afec0a, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: d1afec0a, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 6, DelayTime: 1.04ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [6] 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server lost packet 5 (time threshold) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 1c9b393c54c6ae89aab602cd1b1a23ca, StatelessResetToken: 0x0f2c9b5fc145058e0625ef1fa7d113a3} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: bc036f7e4278bec053ff0fb507066f31, StatelessResetToken: 0xb4266e7ce9959942dc0d0f00778559dc} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: d9b8d8b86812a3d12cbd622d85f4e49b, StatelessResetToken: 0xd4683dae78592511f82f9ee57a5db27f} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 Received request: GET /kxkhluuofb 2025/04/30 09:16:18 server -> Sending packet 8 (281 bytes) for connection 8a32fede7efbd0af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 1c9b393c54c6ae89aab602cd1b1a23ca, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 214.991µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x283d27aa51a3e9e4a51accbe33883a82b2ce312db1023ef9dda42fb00348191aba7d29c54f9c7c8c572089ff2ac6d6c2941dad5b40427c7aa8bfb159bbb9e32fd0dab56fd4b94dfcb25b951219f4c5d6e1fe834dda8f} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> Sending packet 9 (1061 bytes) for connection 8a32fede7efbd0af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 1c9b393c54c6ae89aab602cd1b1a23ca, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 7 (43 bytes) for connection 6b11bd31, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 6b11bd31, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [6f922994 6b11bd31 5acf5010] with a closed connection. 2025/04/30 09:16:18 server Connection 361b43c33ab9281b closed. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:18 server -> Sending packet 1 (206 bytes) for connection 58bef5b3cf0c542b, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: eb6c7898c662c1415ef87da9e480c110, SrcConnectionID: ab07d183, PacketNumber: 1, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server Amplification window limited. Received 1288 bytes, already sent out 4046 bytes 2025/04/30 09:16:18 server <- Reading packet 5 (1200 bytes) for connection 51048799, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 51048799, SrcConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 7.624ms} 2025/04/30 09:16:18 server <- Reading packet 3 (56 bytes) for connection b6d56067, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: b6d56067, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 696µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [2] 2025/04/30 09:16:18 server updated RTT: 125.617ms (σ: 92.472ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID 945f23e1 in 5s. 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server Ignoring all packets below 3. 2025/04/30 09:16:18 Received request: GET /mgdoblvyek 2025/04/30 09:16:18 server -> Sending packet 3 (1069 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 303.548µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 3 (43 bytes) for connection 9c5cac1b, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 9c5cac1b, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 280µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [4] 2025/04/30 09:16:18 server updated RTT: 35.386ms (σ: 8.652ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 09:16:18 server -> Sending packet 11 (315 bytes) for connection 47da095ad5cddb1a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: df11895e, StatelessResetToken: 0x5c961b5f566ceb5785e388e88aa58a0d} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 Created qlog file: /logs/qlog/9cf81dea37aacfaa.sqlog 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x7c248e58e3fcd349a932baef99e69d0fc4c266f7ca7a2faf2cadeebcf8fe76c0ea39a64773d375938cd7b9662c09faf8a64ac889090531106b328581f790c5a37d47b1dec371c832d323357eeabf42dc5290072f88f6} 2025/04/30 09:16:18 server Changing connection ID to 194987bd. 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f00f35f3, StatelessResetToken: 0x89a8ad5b7b97ce1e596add5dda247efa} 2025/04/30 09:16:18 server Skipping packet number 10 2025/04/30 09:16:18 server -> Sending packet 12 (1061 bytes) for connection 47da095ad5cddb1a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 Adding connection IDs 9cf81dea37aacfaa and 194987bd for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 9cf81dea37aacfaa, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 9cf81dea37aacfaa, SrcConnectionID: ff0da6e6b898884c3d7ff48c472278b4, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: ff0da6e6b898884c3d7ff48c472278b4, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 25630b00. 2025/04/30 09:16:18 Adding connection ID ae57b4db. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 9cf81dea37aacfaa 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, SrcConnectionID: 194987bd, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 962, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, SrcConnectionID: 194987bd, PacketNumber: 0, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 09:16:18 server Short Header{DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ae57b4db, StatelessResetToken: 0x6ce092b754683a2bf3db3a132715274e} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 25630b00, StatelessResetToken: 0xff24adbb390b9ea1e627f4a002aab7dd} 2025/04/30 09:16:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:18 server -> Sending packet 1 (199 bytes) for connection f795f1c967e84efe, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, SrcConnectionID: 51048799, PacketNumber: 1, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:16:18 server -> Sending packet 2 (199 bytes) for connection f795f1c967e84efe, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, SrcConnectionID: 51048799, PacketNumber: 2, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 4 (267 bytes) for connection 1ddd4b88ec3a6a47, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: cbb0c77ca5a2f5112916e1ac03a29da3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x8641b86d4aafd4d2d1b222321d1b0fb4f62b6c9adc01e80971bc6457001252b09aeeb314fed1d921ec7ddc4bf58060f4eb239161c7945ceb01844644278afe71689ad9f3d29d92bdc2d11b798f9e6b02117b63366620} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server Skipping packet number 3 2025/04/30 09:16:18 server -> Sending packet 5 (1061 bytes) for connection 1ddd4b88ec3a6a47, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: cbb0c77ca5a2f5112916e1ac03a29da3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 3 (267 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0xc509d0b2e1219fe3fe76bb0f7b7b69d0b20a4ebba8179965899b814512d32886c7806b8cf196b47d4aa17b72aa75fea3c45d06ade7130c31e6544bd867cf88dc3e1002a174006d15b0f74a547dbf0bd65c08ecb035bd} 2025/04/30 09:16:18 server -> Sending packet 4 (267 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0xc509d0b2e1219fe3fe76bb0f7b7b69d0b20a4ebba8179965899b814512d32886c7806b8cf196b47d4aa17b72aa75fea3c45d06ade7130c31e6544bd867cf88dc3e1002a174006d15b0f74a547dbf0bd65c08ecb035bd} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server <- Reading packet 4 (43 bytes) for connection 9c5cac1b, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 9c5cac1b, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 26.184ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [5] 2025/04/30 09:16:18 server updated RTT: 35.148ms (σ: 6.963ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server -> Sending packet 6 (38 bytes) for connection 014e4c4a2551465e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 03a999d5204dfb6dc44bba11be730e6e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:18 server <- Reading packet 5 (43 bytes) for connection 276675ad, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 276675ad, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 149.496ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 6 (1366 bytes) for connection 431ec75933692438, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server <- Reading packet 8 (43 bytes) for connection 9c5cac1b, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 9c5cac1b, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 1, AckRanges: {{Largest: 5, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 28.952ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:18 server -> Sending packet 7 (47 bytes) for connection 014e4c4a2551465e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 03a999d5204dfb6dc44bba11be730e6e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 169.041µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 399e9f95410f46a670181a767c28f57b, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.PingFrame{} 2025/04/30 09:16:18 server -> Sending packet 7 (47 bytes) for connection 431ec75933692438, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 399e9f95410f46a670181a767c28f57b, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 0, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 231.273µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- Reading packet 8 (43 bytes) for connection d1afec0a, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: d1afec0a, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 24.432ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [8] 2025/04/30 09:16:18 server updated RTT: 39.773ms (σ: 12.567ms) 2025/04/30 09:16:18 server Ignoring all packets below 8. 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/d2d4f6e175286d27.sqlog 2025/04/30 09:16:18 server Changing connection ID to 6a570dbf. 2025/04/30 09:16:18 Adding connection IDs d2d4f6e175286d27 and 6a570dbf for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection d2d4f6e175286d27, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: d2d4f6e175286d27, SrcConnectionID: 0b7ab855409440a98543fe3cecf96e07, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 0b7ab855409440a98543fe3cecf96e07, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID 0408fc7f. 2025/04/30 09:16:18 Adding connection ID 09df6d68. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection d2d4f6e175286d27 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0b7ab855409440a98543fe3cecf96e07, SrcConnectionID: 6a570dbf, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 954, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0b7ab855409440a98543fe3cecf96e07, SrcConnectionID: 6a570dbf, PacketNumber: 0, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 162, Offset + Data length: 162} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0b7ab855409440a98543fe3cecf96e07, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 0408fc7f, StatelessResetToken: 0x2b62ef72ada58f5ae99f0f1a5085ce5a} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 09df6d68, StatelessResetToken: 0xa1b9e33adb50a1e24cf419646be91efd} 2025/04/30 09:16:18 server <- Reading packet 2 (141 bytes) for connection 114c4367, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 114c4367, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 1.032ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [4] 2025/04/30 09:16:18 server updated RTT: 35.885ms (σ: 8.525ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 082d509d4bca1f00d6ef372b6f189cb4, StatelessResetToken: 0x98bf3f283fee671cb8585ce5b8dc29ab} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: c36ca55aa981782ccd5bf51aacb2fdbd, StatelessResetToken: 0x1b573d066b338ff77ce022ec80afb98a} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 013569a7bbdf3541463ae30276203f3f, StatelessResetToken: 0xc610dac988a9ff42c569b83f047723c4} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server -> Sending packet 6 (45 bytes) for connection 1ddd4b88ec3a6a47, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 082d509d4bca1f00d6ef372b6f189cb4, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 213.389µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 10 (38 bytes) for connection 2042160d39233ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:18 server -> Sending packet 11 (38 bytes) for connection 2042160d39233ae2, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: dcd0ba2ce503daed45adcd3b763db2cf, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 7 (37 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server Skipping packet number 6 2025/04/30 09:16:18 server -> Sending packet 8 (1061 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server -> Sending packet 9 (1366 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.PingFrame{} 2025/04/30 09:16:18 server <- Reading packet 2 (93 bytes) for connection 06fcd54a, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 06fcd54a, SrcConnectionID: eb6c7898c662c1415ef87da9e480c110, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 846.568ms} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID 58bef5b3cf0c542b in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 2 (315 bytes) for connection 58bef5b3cf0c542b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: eb6c7898c662c1415ef87da9e480c110, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 06fcd54a, StatelessResetToken: 0x02f2a1afe1fc9f4a4e28162a2a55fbff} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8c65de1, StatelessResetToken: 0xf12728681183e3ef04db154bcfd135f6} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x13b7f552d40674ad47b8ee37386896f35f47031d1a352cd1182e5c038e6c470fc7b3a2e632a16b3153293c5ea497103d662fdd5ff1d966d2fc2df5211da09c333e7bc325f406e28975e5c05b07cc2290a8fbd9ee4866} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> Sending packet 3 (315 bytes) for connection 58bef5b3cf0c542b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: eb6c7898c662c1415ef87da9e480c110, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x13b7f552d40674ad47b8ee37386896f35f47031d1a352cd1182e5c038e6c470fc7b3a2e632a16b3153293c5ea497103d662fdd5ff1d966d2fc2df5211da09c333e7bc325f406e28975e5c05b07cc2290a8fbd9ee4866} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8c65de1, StatelessResetToken: 0xf12728681183e3ef04db154bcfd135f6} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 06fcd54a, StatelessResetToken: 0x02f2a1afe1fc9f4a4e28162a2a55fbff} 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection 06fcd54a, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 06fcd54a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.896ms} 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID ab07d183 in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server <- Reading packet 1 (45 bytes) for connection 06fcd54a, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 06fcd54a, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:18 server -> Sending packet 4 (44 bytes) for connection 58bef5b3cf0c542b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: eb6c7898c662c1415ef87da9e480c110, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 103.463102ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 Received request: GET /ycatgblqjv 2025/04/30 09:16:18 server -> Sending packet 5 (1061 bytes) for connection 58bef5b3cf0c542b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: eb6c7898c662c1415ef87da9e480c110, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server <- Reading packet 9 (43 bytes) for connection 9c5cac1b, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 9c5cac1b, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:18 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:18 Replacing connection for connection IDs [eb51bc7e 9c5cac1b] with a closed connection. 2025/04/30 09:16:18 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:18 server Connection 014e4c4a2551465e closed. 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:18 server <- Reading packet 1 (66 bytes) for connection 0408fc7f, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 0408fc7f, SrcConnectionID: 0b7ab855409440a98543fe3cecf96e07, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 13.464ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.295439ms (σ: 17.647719ms) 2025/04/30 09:16:18 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:18 server <- Reading packet 0 (1134 bytes) for connection 0408fc7f, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0408fc7f, SrcConnectionID: 0b7ab855409440a98543fe3cecf96e07, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 13.464ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.295ms (σ: 13.235ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:18 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 Retiring connection ID d2d4f6e175286d27 in 5s. 2025/04/30 09:16:18 server Dropping Handshake keys. 2025/04/30 09:16:18 server <- Reading packet 0 (43 bytes) for connection 0408fc7f, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0408fc7f, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.68ms} 2025/04/30 09:16:18 server newly acked packets (1): [0] 2025/04/30 09:16:18 server updated RTT: 35.298ms (σ: 9.933ms) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 Retiring connection ID 6a570dbf in 5s. 2025/04/30 09:16:18 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:18 server -> Sending packet 1 (276 bytes) for connection d2d4f6e175286d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0b7ab855409440a98543fe3cecf96e07, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 586.286µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.NewTokenFrame{Token: 0x8571bb5221199482f38b3e13d4c8e74b79826d651b86cc53284304d8415a6d9aebdacad5f4d7963d1f4b5f752d5ea4956b9ccdd943e637935ff06129a24839a40f7b1d90fec3fa187a2ca9ea2474e33adae30f86d15a} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:18 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:18 server <- Reading packet 1 (45 bytes) for connection 0408fc7f, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0408fc7f, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:18 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 Received request: GET /kaeeytwjaa 2025/04/30 09:16:18 server -> Sending packet 2 (1070 bytes) for connection d2d4f6e175286d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0b7ab855409440a98543fe3cecf96e07, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 808.77µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 11 (1061 bytes) for connection 8a32fede7efbd0af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 1c9b393c54c6ae89aab602cd1b1a23ca, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server -> Sending packet 12 (1061 bytes) for connection 8a32fede7efbd0af, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 1c9b393c54c6ae89aab602cd1b1a23ca, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:18 server -> Sending packet 1 (761 bytes) for connection b83f6a0205a40a6e, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, SrcConnectionID: 27a07e73, PacketNumber: 1, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 09:16:18 server -> Sending packet 2 (761 bytes) for connection b83f6a0205a40a6e, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, SrcConnectionID: 27a07e73, PacketNumber: 2, PacketNumberLen: 2, Length: 732, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 710, Offset + Data length: 710} 2025/04/30 09:16:18 server <- Reading packet 2 (141 bytes) for connection 06fcd54a, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 06fcd54a, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 1.128ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: c04e578a4db909983e948862461886aa, StatelessResetToken: 0x8dfd5f602f4a0cd41e7de31c91ebba5c} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: d5505a98caa2631ea7a8d7c101e32d4d, StatelessResetToken: 0x26a85ac3901d0e8be8cbbd854e171102} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: caab769e682ab40ec1dd3f5fa9fa3561, StatelessResetToken: 0x2b44be3d5fc81205e63dcc0dd6533ccb} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server -> Sending packet 6 (45 bytes) for connection 58bef5b3cf0c542b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: c04e578a4db909983e948862461886aa, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 114.644µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server <- Reading packet 3 (43 bytes) for connection 114c4367, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 114c4367, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 26.064ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [6] 2025/04/30 09:16:18 server <- Reading packet 1 (65 bytes) for connection 51048799, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 51048799, SrcConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:18 server Dropping Initial keys. 2025/04/30 09:16:18 server <- &wire.PingFrame{} 2025/04/30 09:16:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:18 server -> Sending packet 3 (207 bytes) for connection f795f1c967e84efe, Handshake 2025/04/30 09:16:18 server updated RTT: 38.627ms (σ: 11.877ms) 2025/04/30 09:16:18 server lost packet 5 (time threshold) 2025/04/30 09:16:18 server Canceling loss detection timer. 2025/04/30 09:16:18 server <- Reading packet 2 (139 bytes) for connection 0408fc7f, 1-RTT 2025/04/30 09:16:18 server Short Header{DestConnectionID: 0408fc7f, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:18 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.28ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server newly acked packets (1): [1] 2025/04/30 09:16:18 server updated RTT: 35.083ms (σ: 7.878ms) 2025/04/30 09:16:18 server ECN capability confirmed. 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: c6f06926264afc31558baa8a339730bc, StatelessResetToken: 0x5bd2974f56234430aeb29009e95a5ed5} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 2f99fcbb333f60b8892258c4af2113d0, StatelessResetToken: 0xb4d012e1a8ddc2fdf0a7b50c4021dfc0} 2025/04/30 09:16:18 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: d28ad202bff86e2fa50b8b81f21b42e2, StatelessResetToken: 0x2119d1f12aa221636cf349bdd2ab4d7f} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, SrcConnectionID: 51048799, PacketNumber: 3, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:16:18 server Ignoring all packets below 3. 2025/04/30 09:16:18 server -> Sending packet 4 (199 bytes) for connection f795f1c967e84efe, Handshake 2025/04/30 09:16:18 server -> Sending packet 7 (1366 bytes) for connection 1ddd4b88ec3a6a47, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: 082d509d4bca1f00d6ef372b6f189cb4, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.PingFrame{} 2025/04/30 09:16:18 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:18 server Ignoring all packets below 1. 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, SrcConnectionID: 51048799, PacketNumber: 4, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:16:18 server -> Sending packet 3 (45 bytes) for connection d2d4f6e175286d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server Short Header{DestConnectionID: c6f06926264afc31558baa8a339730bc, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:18 server -> Sending packet 8 (1061 bytes) for connection 1ddd4b88ec3a6a47, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:18 server -> Sending packet 1 (756 bytes) for connection 75dfef6789fc6f9b, Handshake 2025/04/30 09:16:18 server Short Header{DestConnectionID: 082d509d4bca1f00d6ef372b6f189cb4, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, SrcConnectionID: 35b0909e, PacketNumber: 1, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 442.434µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:18 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 09:16:18 server -> Sending packet 2 (756 bytes) for connection 75dfef6789fc6f9b, Handshake 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, SrcConnectionID: 35b0909e, PacketNumber: 2, PacketNumberLen: 2, Length: 727, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 705, Offset + Data length: 705} 2025/04/30 09:16:18 server <- Received Initial packet. 2025/04/30 09:16:18 Created qlog file: /logs/qlog/22f63df3968fc5c7.sqlog 2025/04/30 09:16:18 server Changing connection ID to d4036efe. 2025/04/30 09:16:18 Adding connection IDs 22f63df3968fc5c7 and d4036efe for a new connection. 2025/04/30 09:16:18 server <- Reading packet 0 (1200 bytes) for connection 22f63df3968fc5c7, Initial 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 22f63df3968fc5c7, SrcConnectionID: 8ca339f8da647ff73e3bc9915be691b0, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 8ca339f8da647ff73e3bc9915be691b0, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:18 Adding connection ID a063cdd8. 2025/04/30 09:16:18 Adding connection ID 60737bfd. 2025/04/30 09:16:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 22f63df3968fc5c7 2025/04/30 09:16:18 server Long Header{Type: Initial, DestConnectionID: 8ca339f8da647ff73e3bc9915be691b0, SrcConnectionID: d4036efe, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 964, Version: v1} 2025/04/30 09:16:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:18 server Long Header{Type: Handshake, DestConnectionID: 8ca339f8da647ff73e3bc9915be691b0, SrcConnectionID: d4036efe, PacketNumber: 0, PacketNumberLen: 2, Length: 174, Version: v1} 2025/04/30 09:16:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 152, Offset + Data length: 152} 2025/04/30 09:16:18 server Short Header{DestConnectionID: 8ca339f8da647ff73e3bc9915be691b0, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: a063cdd8, StatelessResetToken: 0xb2307e36628b5a67e8ce63db95734706} 2025/04/30 09:16:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 60737bfd, StatelessResetToken: 0xe5b2180a88f659d08ff80d3056ff39b0} 2025/04/30 09:16:19 server <- Reading packet 10 (43 bytes) for connection 8ae8280d, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 8ae8280d, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [3abce2d5 8ae8280d] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection 2042160d39233ae2 closed. 2025/04/30 09:16:19 server <- Reading packet 9 (43 bytes) for connection d1afec0a, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: d1afec0a, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 11, LowestAcked: 8, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 8, Smallest: 8}}, DelayTime: 376µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- Reading packet 10 (43 bytes) for connection d1afec0a, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: d1afec0a, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [e3f1aa62 d1afec0a] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection 8a32fede7efbd0af closed. 2025/04/30 09:16:19 server <- Received Initial packet. 2025/04/30 09:16:19 Created qlog file: /logs/qlog/7c31deeda1d39e4b.sqlog 2025/04/30 09:16:19 server Changing connection ID to 6c8597d5. 2025/04/30 09:16:19 Adding connection IDs 7c31deeda1d39e4b and 6c8597d5 for a new connection. 2025/04/30 09:16:19 server <- Reading packet 0 (1200 bytes) for connection 7c31deeda1d39e4b, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 7c31deeda1d39e4b, SrcConnectionID: a6ad29ff269dacc2bb474a01fc4eb093, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:19 server <- Reading packet 0 (91 bytes) for connection 27a07e73, Handshake 2025/04/30 09:16:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 27a07e73, SrcConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:19 server Dropping Initial keys. 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 14.024ms} 2025/04/30 09:16:19 server newly acked packets (1): [2] 2025/04/30 09:16:19 server updated RTT: 37.542105ms (σ: 18.771052ms) 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 Retiring connection ID b83f6a0205a40a6e in 5s. 2025/04/30 09:16:19 server Dropping Handshake keys. 2025/04/30 09:16:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 2 (315 bytes) for connection b83f6a0205a40a6e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a9f19a4, StatelessResetToken: 0x8ca77e4958a2533041432a556baa9e6b} 2025/04/30 09:16:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5a1cd8be, StatelessResetToken: 0x182b4b53281994223ad15e3d5d889824} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0x2ef254471e39a9da654ab9b2766d3673767a20d8af9d5dfc8b1c9c783e3ae23a59960cd2f774fabb600368774b8da7f69af8edb7ee3f8fca6f2f3171723e6e529758728cbdbfa5f64b9e26ffcdb32c10dcf64d2b57ac} 2025/04/30 09:16:19 server -> Sending packet 3 (315 bytes) for connection b83f6a0205a40a6e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 6a9f19a4, StatelessResetToken: 0x8ca77e4958a2533041432a556baa9e6b} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5a1cd8be, StatelessResetToken: 0x182b4b53281994223ad15e3d5d889824} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0x2ef254471e39a9da654ab9b2766d3673767a20d8af9d5dfc8b1c9c783e3ae23a59960cd2f774fabb600368774b8da7f69af8edb7ee3f8fca6f2f3171723e6e529758728cbdbfa5f64b9e26ffcdb32c10dcf64d2b57ac} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: a6ad29ff269dacc2bb474a01fc4eb093, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:19 Adding connection ID 3cd7eebe. 2025/04/30 09:16:19 Adding connection ID 225dae09. 2025/04/30 09:16:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 7c31deeda1d39e4b 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: a6ad29ff269dacc2bb474a01fc4eb093, SrcConnectionID: 6c8597d5, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 962, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: a6ad29ff269dacc2bb474a01fc4eb093, SrcConnectionID: 6c8597d5, PacketNumber: 0, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 09:16:19 server Short Header{DestConnectionID: a6ad29ff269dacc2bb474a01fc4eb093, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3cd7eebe, StatelessResetToken: 0xe80c1ad5430f9786573c73a484e72026} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 225dae09, StatelessResetToken: 0xda58c89459d77d323633cca99add5242} 2025/04/30 09:16:19 server <- Reading packet 0 (45 bytes) for connection 27a07e73, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 27a07e73, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:19 server -> Sending packet 4 (43 bytes) for connection b83f6a0205a40a6e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 69.64µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 Received request: GET /ufwiemxtzz 2025/04/30 09:16:19 server -> Sending packet 5 (1061 bytes) for connection b83f6a0205a40a6e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 69f488f62d73fe2e3f535073d1e5ab20, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server <- Reading packet 2 (91 bytes) for connection 51048799, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 51048799, SrcConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 7.824ms} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 Retiring connection ID f795f1c967e84efe in 5s. 2025/04/30 09:16:19 server Dropping Handshake keys. 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 2 (315 bytes) for connection f795f1c967e84efe, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ef7f3645, StatelessResetToken: 0xeb8f549df9dcfea9de4bfe35cfbe2388} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d6fb60be, StatelessResetToken: 0x9989c20cd525bfd125e938c678c4c00f} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0x3b1effc22bbef438c6e0d74e153fbb4edcf0a2fd20a269d467e5fad30c49be36ba8a7d1005b62b630e37af9be9dde2287c4ecb0a25fbcc45bff969bcb26d73cf2854d70dbbd7f84c1c9a5e1a4bad4f225d2549e35a64} 2025/04/30 09:16:19 server -> Sending packet 3 (315 bytes) for connection f795f1c967e84efe, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ef7f3645, StatelessResetToken: 0xeb8f549df9dcfea9de4bfe35cfbe2388} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0x3b1effc22bbef438c6e0d74e153fbb4edcf0a2fd20a269d467e5fad30c49be36ba8a7d1005b62b630e37af9be9dde2287c4ecb0a25fbcc45bff969bcb26d73cf2854d70dbbd7f84c1c9a5e1a4bad4f225d2549e35a64} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: d6fb60be, StatelessResetToken: 0x9989c20cd525bfd125e938c678c4c00f} 2025/04/30 09:16:19 server <- Reading packet 0 (45 bytes) for connection 51048799, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 51048799, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:19 server -> Sending packet 4 (43 bytes) for connection f795f1c967e84efe, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 86.762µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 Received request: GET /jibyiqkbac 2025/04/30 09:16:19 server -> Sending packet 5 (1061 bytes) for connection f795f1c967e84efe, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 210e3a01154682cb7479a9e0ebdddbe8, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server <- Reading packet 4 (43 bytes) for connection 114c4367, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 114c4367, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 520µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server newly acked packets (1): [8] 2025/04/30 09:16:19 server updated RTT: 38.087ms (σ: 9.986ms) 2025/04/30 09:16:19 server setting loss timer for packet 7 (1-RTT) to 42.847875ms (in 2025-04-30 09:16:19.03136896 +0000 UTC m=+2.547662608) 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server -> Sending packet 9 (38 bytes) for connection 1ddd4b88ec3a6a47, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 082d509d4bca1f00d6ef372b6f189cb4, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:19 server <- Received Initial packet. 2025/04/30 09:16:19 Created qlog file: /logs/qlog/77aafbc422e2300a.sqlog 2025/04/30 09:16:19 server Changing connection ID to 14d541ec. 2025/04/30 09:16:19 Adding connection IDs 77aafbc422e2300a and 14d541ec for a new connection. 2025/04/30 09:16:19 server <- Reading packet 0 (1200 bytes) for connection 77aafbc422e2300a, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 77aafbc422e2300a, SrcConnectionID: 7907be29999b7b89ab06a4e1448bdb85, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 7907be29999b7b89ab06a4e1448bdb85, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:19 Adding connection ID af66ac64. 2025/04/30 09:16:19 Adding connection ID c531b71b. 2025/04/30 09:16:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 77aafbc422e2300a 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 7907be29999b7b89ab06a4e1448bdb85, SrcConnectionID: 14d541ec, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 953, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 7907be29999b7b89ab06a4e1448bdb85, SrcConnectionID: 14d541ec, PacketNumber: 0, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 09:16:19 server Short Header{DestConnectionID: 7907be29999b7b89ab06a4e1448bdb85, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: af66ac64, StatelessResetToken: 0xd963d287c6422b672b4d73908dc9dd40} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c531b71b, StatelessResetToken: 0x4316327e11ae959f36347a02c8831a49} 2025/04/30 09:16:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 1 (1280 bytes) for connection 9cf81dea37aacfaa, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, SrcConnectionID: 194987bd, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server -> Sending packet 2 (1280 bytes) for connection 9cf81dea37aacfaa, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, SrcConnectionID: 194987bd, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:19 server Queueing packet (43 bytes) for later decryption 2025/04/30 09:16:19 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:16:19 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:16:19.03136896 +0000 UTC m=+2.547662608 2025/04/30 09:16:19 server lost packet 7 (time threshold) 2025/04/30 09:16:19 server <- Reading packet 1 (141 bytes) for connection 6a9f19a4, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 6a9f19a4, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 952µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 146e41b749d10f5332dc23b8245d5a7e, StatelessResetToken: 0x33428ff8ea1856aa17a315cba5f185e5} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: f8b4c799d8781e251558651fd3608a31, StatelessResetToken: 0x3c206b41e7671f1b59da20e59f5c109f} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: b70a0cec3d68dfe174dd8e6f889432bb, StatelessResetToken: 0x43666bba97beb2dd6aaa920e0b32c000} 2025/04/30 09:16:19 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 Retiring connection ID 27a07e73 in 5s. 2025/04/30 09:16:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:19 server -> Sending packet 6 (45 bytes) for connection b83f6a0205a40a6e, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 146e41b749d10f5332dc23b8245d5a7e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 168.114µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:19 server <- Reading packet 1 (66 bytes) for connection 3cd7eebe, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 3cd7eebe, SrcConnectionID: a6ad29ff269dacc2bb474a01fc4eb093, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 18.584ms} 2025/04/30 09:16:19 server newly acked packets (1): [0] 2025/04/30 09:16:19 server updated RTT: 36.74355ms (σ: 18.371775ms) 2025/04/30 09:16:19 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:19 server <- Reading packet 0 (1134 bytes) for connection 3cd7eebe, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 3cd7eebe, SrcConnectionID: a6ad29ff269dacc2bb474a01fc4eb093, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:19 server Dropping Initial keys. 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 18.584ms} 2025/04/30 09:16:19 server newly acked packets (1): [0] 2025/04/30 09:16:19 server updated RTT: 36.743ms (σ: 13.778ms) 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 Retiring connection ID 7c31deeda1d39e4b in 5s. 2025/04/30 09:16:19 server Dropping Handshake keys. 2025/04/30 09:16:19 server -> Sending packet 1 (267 bytes) for connection 7c31deeda1d39e4b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: a6ad29ff269dacc2bb474a01fc4eb093, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0xe907e86de309367b624b5d420561cbe2ba17b36876bfab97a1a0c5e2560086bcf01b7e191cb1a165cd86650fad67629a7b0898bab57dae5fcc87e9e8f50c9936c40db20e22234de9885ef9023027c68c3c06408e46a8} 2025/04/30 09:16:19 server <- Reading packet 0 (43 bytes) for connection 3cd7eebe, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 3cd7eebe, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.32ms} 2025/04/30 09:16:19 server newly acked packets (1): [0] 2025/04/30 09:16:19 server updated RTT: 36.785ms (σ: 10.417ms) 2025/04/30 09:16:19 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 Retiring connection ID 6c8597d5 in 5s. 2025/04/30 09:16:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:19 server <- Reading packet 1 (45 bytes) for connection 3cd7eebe, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 3cd7eebe, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:19 server -> Sending packet 2 (43 bytes) for connection 7c31deeda1d39e4b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: a6ad29ff269dacc2bb474a01fc4eb093, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 184.407µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 Received request: GET /zwjwytfbji 2025/04/30 09:16:19 server -> Sending packet 3 (1061 bytes) for connection 7c31deeda1d39e4b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: a6ad29ff269dacc2bb474a01fc4eb093, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server <- Reading packet 2 (43 bytes) for connection 6a9f19a4, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 6a9f19a4, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [5a1cd8be 6a9f19a4] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection b83f6a0205a40a6e closed. 2025/04/30 09:16:19 server <- Received Initial packet. 2025/04/30 09:16:19 Created qlog file: /logs/qlog/aedf12c1ef87937a.sqlog 2025/04/30 09:16:19 server Changing connection ID to 0f2152c0. 2025/04/30 09:16:19 Adding connection IDs aedf12c1ef87937a and 0f2152c0 for a new connection. 2025/04/30 09:16:19 server <- Reading packet 0 (1200 bytes) for connection aedf12c1ef87937a, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: aedf12c1ef87937a, SrcConnectionID: 17ed45836d6e86ebddf1790d33cbc021, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 17ed45836d6e86ebddf1790d33cbc021, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:19 Adding connection ID 5f0f2325. 2025/04/30 09:16:19 Adding connection ID ec93da11. 2025/04/30 09:16:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection aedf12c1ef87937a 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, SrcConnectionID: 0f2152c0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 956, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, SrcConnectionID: 0f2152c0, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:16:19 server Short Header{DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0f2325, StatelessResetToken: 0x27b69f354ef28ccffc4b80f469d1b96d} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec93da11, StatelessResetToken: 0x8c8913c2eebb3424c3029d07f53ec425} 2025/04/30 09:16:19 server <- Reading packet 1 (141 bytes) for connection ef7f3645, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: ef7f3645, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 1.248ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server newly acked packets (1): [3] 2025/04/30 09:16:19 server ECN capability confirmed. 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: e3d6baf21831f8960b5cd5616654056e, StatelessResetToken: 0xc863acba9602c734bb0741c02c7c0f13} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 016a0dbcf774dea2834bec22c21447be, StatelessResetToken: 0xb5172aa6b13d01ffbfb552fc6cb6ec6d} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: d58944f81e326345de8b199517ae7f4e, StatelessResetToken: 0x06c0d4dca5d8af34d040f925b5fa8211} 2025/04/30 09:16:19 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 Retiring connection ID 51048799 in 5s. 2025/04/30 09:16:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:19 server -> Sending packet 6 (45 bytes) for connection f795f1c967e84efe, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: e3d6baf21831f8960b5cd5616654056e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 136.075µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server <- Reading packet 2 (43 bytes) for connection ef7f3645, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: ef7f3645, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [ef7f3645 d6fb60be] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection f795f1c967e84efe closed. 2025/04/30 09:16:19 server <- Received Initial packet. 2025/04/30 09:16:19 Created qlog file: /logs/qlog/1c575ceb70394d27.sqlog 2025/04/30 09:16:19 server Changing connection ID to 77eebc4d. 2025/04/30 09:16:19 Adding connection IDs 1c575ceb70394d27 and 77eebc4d for a new connection. 2025/04/30 09:16:19 server <- Reading packet 0 (1200 bytes) for connection 1c575ceb70394d27, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 1c575ceb70394d27, SrcConnectionID: b61e561d4652589208f01108d7d8a42d, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: b61e561d4652589208f01108d7d8a42d, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:19 Adding connection ID 3e43ee67. 2025/04/30 09:16:19 Adding connection ID a33dec00. 2025/04/30 09:16:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1c575ceb70394d27 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: b61e561d4652589208f01108d7d8a42d, SrcConnectionID: 77eebc4d, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 955, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: b61e561d4652589208f01108d7d8a42d, SrcConnectionID: 77eebc4d, PacketNumber: 0, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 09:16:19 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a33dec00, StatelessResetToken: 0xc2f2e031b27fef560214b297ae05ceca} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e43ee67, StatelessResetToken: 0x6e7b5076306826ffa6ba777f39f3c4b4} 2025/04/30 09:16:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 1 (1280 bytes) for connection 77aafbc422e2300a, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 7907be29999b7b89ab06a4e1448bdb85, SrcConnectionID: 14d541ec, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server -> Sending packet 2 (1280 bytes) for connection 77aafbc422e2300a, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 7907be29999b7b89ab06a4e1448bdb85, SrcConnectionID: 14d541ec, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 5 (1061 bytes) for connection d2d4f6e175286d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: c6f06926264afc31558baa8a339730bc, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server Skipping packet number 4 2025/04/30 09:16:19 server -> Sending packet 6 (37 bytes) for connection d2d4f6e175286d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: c6f06926264afc31558baa8a339730bc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server <- Reading packet 2 (139 bytes) for connection 3cd7eebe, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 3cd7eebe, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 584µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server newly acked packets (1): [1] 2025/04/30 09:16:19 server updated RTT: 36.228ms (σ: 8.926ms) 2025/04/30 09:16:19 server ECN capability confirmed. 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 391985c0a02b5708c4d0daa6bc54a311, StatelessResetToken: 0x0970b107cba2aa3199e29796f33cdeb6} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 71a9afb2066cb1de3de6bce66296942f, StatelessResetToken: 0xa6169b319c0f85fa80edb5e88b85186e} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: faa9b32fdab39c6522a116b8596b84bb, StatelessResetToken: 0xfe7c3de76b713be01d2d6c9678bfe1b9} 2025/04/30 09:16:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:19 server -> Sending packet 4 (45 bytes) for connection 7c31deeda1d39e4b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 391985c0a02b5708c4d0daa6bc54a311, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 159.519µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server <- Reading packet 3 (43 bytes) for connection 3cd7eebe, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 3cd7eebe, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 0, AckRanges: {{Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 224µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server newly acked packets (1): [3] 2025/04/30 09:16:19 server updated RTT: 35.751ms (σ: 7.646ms) 2025/04/30 09:16:19 server -> Sending packet 5 (38 bytes) for connection 7c31deeda1d39e4b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 391985c0a02b5708c4d0daa6bc54a311, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:19 server <- Reading packet 5 (43 bytes) for connection 114c4367, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 114c4367, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [e2b01c13 114c4367] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection 1ddd4b88ec3a6a47 closed. 2025/04/30 09:16:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 1 (1280 bytes) for connection aedf12c1ef87937a, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, SrcConnectionID: 0f2152c0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server -> Sending packet 2 (1280 bytes) for connection aedf12c1ef87937a, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, SrcConnectionID: 0f2152c0, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 1 (1280 bytes) for connection 1c575ceb70394d27, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: b61e561d4652589208f01108d7d8a42d, SrcConnectionID: 77eebc4d, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server -> Sending packet 2 (1280 bytes) for connection 1c575ceb70394d27, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: b61e561d4652589208f01108d7d8a42d, SrcConnectionID: 77eebc4d, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:19 server -> Sending packet 8 (315 bytes) for connection 58bef5b3cf0c542b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: c04e578a4db909983e948862461886aa, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: d8c65de1, StatelessResetToken: 0xf12728681183e3ef04db154bcfd135f6} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 06fcd54a, StatelessResetToken: 0x02f2a1afe1fc9f4a4e28162a2a55fbff} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0x13b7f552d40674ad47b8ee37386896f35f47031d1a352cd1182e5c038e6c470fc7b3a2e632a16b3153293c5ea497103d662fdd5ff1d966d2fc2df5211da09c333e7bc325f406e28975e5c05b07cc2290a8fbd9ee4866} 2025/04/30 09:16:19 server Skipping packet number 7 2025/04/30 09:16:19 server -> Sending packet 9 (1061 bytes) for connection 58bef5b3cf0c542b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: c04e578a4db909983e948862461886aa, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:19 server -> Sending packet 6 (267 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0xc509d0b2e1219fe3fe76bb0f7b7b69d0b20a4ebba8179965899b814512d32886c7806b8cf196b47d4aa17b72aa75fea3c45d06ade7130c31e6544bd867cf88dc3e1002a174006d15b0f74a547dbf0bd65c08ecb035bd} 2025/04/30 09:16:19 server -> Sending packet 7 (267 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0xc509d0b2e1219fe3fe76bb0f7b7b69d0b20a4ebba8179965899b814512d32886c7806b8cf196b47d4aa17b72aa75fea3c45d06ade7130c31e6544bd867cf88dc3e1002a174006d15b0f74a547dbf0bd65c08ecb035bd} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> Sending packet 8 (1366 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 0b53183c1d3d5937e0711ae7b1397a1e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.PingFrame{} 2025/04/30 09:16:19 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:19 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:19 server <- Reading packet 4 (43 bytes) for connection 06fcd54a, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 06fcd54a, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 448µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server newly acked packets (2): [6 8] 2025/04/30 09:16:19 server updated RTT: 33.006609ms (σ: 16.503304ms) 2025/04/30 09:16:19 server ECN capability confirmed. 2025/04/30 09:16:19 server Ignoring all packets below 3. 2025/04/30 09:16:19 server <- Reading packet 1 (1200 bytes) for connection 77eebc4d, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 77eebc4d, SrcConnectionID: b61e561d4652589208f01108d7d8a42d, Token: (empty), PacketNumber: 1, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 6.68ms} 2025/04/30 09:16:19 server -> Sending packet 10 (1366 bytes) for connection 58bef5b3cf0c542b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: c04e578a4db909983e948862461886aa, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.PingFrame{} 2025/04/30 09:16:19 server <- Reading packet 5 (43 bytes) for connection 06fcd54a, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 06fcd54a, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [d8c65de1 06fcd54a] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection 58bef5b3cf0c542b closed. 2025/04/30 09:16:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:19 server -> Sending packet 1 (212 bytes) for connection 1c575ceb70394d27, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: b61e561d4652589208f01108d7d8a42d, SrcConnectionID: 77eebc4d, PacketNumber: 1, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 09:16:19 server -> Sending packet 2 (212 bytes) for connection 1c575ceb70394d27, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: b61e561d4652589208f01108d7d8a42d, SrcConnectionID: 77eebc4d, PacketNumber: 2, PacketNumberLen: 2, Length: 183, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 161, Offset + Data length: 161} 2025/04/30 09:16:19 server <- Reading packet 2 (141 bytes) for connection 2d8123b9, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2d8123b9, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 752µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: af6942d4b356c38ea2fa5fb9258f1a6f, StatelessResetToken: 0xe540d1c57feb85de07a69fb0a26412e8} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 29a70a788318b1217efc58d08e0b9d06, StatelessResetToken: 0x61b5ed6a4aa0896fe40f235318f3d147} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 68304e384418256c8de9a84d3ff77b1e, StatelessResetToken: 0x0790efc44f1f10338bddaa1fa32dc358} 2025/04/30 09:16:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:19 server -> Sending packet 9 (47 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: af6942d4b356c38ea2fa5fb9258f1a6f, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 138.649µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server <- Reading packet 4 (93 bytes) for connection a063cdd8, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: a063cdd8, SrcConnectionID: 8ca339f8da647ff73e3bc9915be691b0, PacketNumber: 4, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:16:19 server Dropping Initial keys. 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 902.632ms} 2025/04/30 09:16:19 server newly acked packets (1): [0] 2025/04/30 09:16:19 server updated RTT: 148.791087ms (σ: 74.395543ms) 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 Retiring connection ID 22f63df3968fc5c7 in 5s. 2025/04/30 09:16:19 server Dropping Handshake keys. 2025/04/30 09:16:19 server -> Sending packet 1 (267 bytes) for connection 22f63df3968fc5c7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 8ca339f8da647ff73e3bc9915be691b0, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0xc753e1f69350b0154a6bda2b4228b5609e1f9a423ff9bd767681eda70f6f66bfa16ea007d9d7b45fe05e5807b3e5219c52f867b2df3d9887c08e340b04ba0791aca865f4d74d641b2ab1f8c22035550847b952e65166} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server <- Reading packet 0 (43 bytes) for connection a063cdd8, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: a063cdd8, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 1.808ms} 2025/04/30 09:16:19 server newly acked packets (1): [0] 2025/04/30 09:16:19 server updated RTT: 134.993ms (σ: 83.391ms) 2025/04/30 09:16:19 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 Retiring connection ID d4036efe in 5s. 2025/04/30 09:16:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:19 server <- Reading packet 1 (45 bytes) for connection a063cdd8, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: a063cdd8, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:19 server -> Sending packet 2 (44 bytes) for connection 22f63df3968fc5c7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 8ca339f8da647ff73e3bc9915be691b0, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 110.762744ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 Received request: GET /qntapzvjcd 2025/04/30 09:16:19 server -> Sending packet 3 (1061 bytes) for connection 22f63df3968fc5c7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 8ca339f8da647ff73e3bc9915be691b0, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server <- Reading packet 3 (43 bytes) for connection 0408fc7f, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 0408fc7f, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [0408fc7f 09df6d68] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection d2d4f6e175286d27 closed. 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 6 (37 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server Skipping packet number 5 2025/04/30 09:16:19 server -> Sending packet 7 (1061 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server -> Sending packet 8 (1366 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.PingFrame{} 2025/04/30 09:16:19 server <- Reading packet 6 (43 bytes) for connection df11895e, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: df11895e, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 3, AckRanges: {{Largest: 12, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 245.832ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server newly acked packets (3): [9 11 12] 2025/04/30 09:16:19 server updated RTT: 62.306ms (σ: 67.86ms) 2025/04/30 09:16:19 server ECN capability confirmed. 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server <- &wire.PingFrame{} 2025/04/30 09:16:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:19 server -> Sending packet 13 (1409 bytes) for connection 47da095ad5cddb1a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.PingFrame{} 2025/04/30 09:16:19 server -> Sending packet 14 (48 bytes) for connection 47da095ad5cddb1a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 345f84be78ed673be1c626126a818762, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 277.259µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:19 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:16:19 server <- Reading packet 1 (65 bytes) for connection 77eebc4d, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 77eebc4d, SrcConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:19 server Dropping Initial keys. 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 1.296ms} 2025/04/30 09:16:19 server newly acked packets (1): [2] 2025/04/30 09:16:19 server updated RTT: 33.92161ms (σ: 16.960805ms) 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server <- Reading packet 2 (138 bytes) for connection a063cdd8, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: a063cdd8, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 504µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server newly acked packets (1): [1] 2025/04/30 09:16:19 server updated RTT: 122.141ms (σ: 88.246ms) 2025/04/30 09:16:19 server ECN capability confirmed. 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 97b2ea41485f7fa2679570246c149e7b, StatelessResetToken: 0xe4354aa74192e254c5afeb35b27ea990} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 7a6d2a5f6c035438209bb735af8172a1, StatelessResetToken: 0x21740727354047d973391747494c4474} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 9a9562b327fc57a4805c2e5b168da160, StatelessResetToken: 0xa191b4a9cca1536a36ca9301421f0e4d} 2025/04/30 09:16:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:19 server -> Sending packet 4 (45 bytes) for connection 22f63df3968fc5c7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 97b2ea41485f7fa2679570246c149e7b, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, DelayTime: 126.096µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 7 (37 bytes) for connection 7c31deeda1d39e4b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 391985c0a02b5708c4d0daa6bc54a311, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server Skipping packet number 6 2025/04/30 09:16:19 server -> Sending packet 8 (38 bytes) for connection 7c31deeda1d39e4b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 391985c0a02b5708c4d0daa6bc54a311, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:19 server <- Reading packet 9 (43 bytes) for connection df11895e, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: df11895e, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [b4602a63 df11895e f00f35f3] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection 47da095ad5cddb1a closed. 2025/04/30 09:16:19 server <- Reading packet 3 (43 bytes) for connection a063cdd8, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: a063cdd8, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 672µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server newly acked packets (1): [4] 2025/04/30 09:16:19 server updated RTT: 110.871ms (σ: 88.722ms) 2025/04/30 09:16:19 server setting loss timer for packet 3 (1-RTT) to 124.729875ms (in 2025-04-30 09:16:19.266948148 +0000 UTC m=+2.783241795) 2025/04/30 09:16:19 server Ignoring all packets below 3. 2025/04/30 09:16:19 server <- Reading packet 12 (43 bytes) for connection 276675ad, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 276675ad, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 4}, {Largest: 0, Smallest: 0}}, DelayTime: 265.264ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server newly acked packets (1): [6] 2025/04/30 09:16:19 server updated RTT: 65.445ms (σ: 65.625ms) 2025/04/30 09:16:19 server <- &wire.PingFrame{} 2025/04/30 09:16:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:19 server -> Sending packet 8 (49 bytes) for connection 431ec75933692438, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 399e9f95410f46a670181a767c28f57b, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 0, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 137.557µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- Reading packet 7 (43 bytes) for connection 3cd7eebe, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 3cd7eebe, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 1, Smallest: 0}}, DelayTime: 8.488ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server newly acked packets (2): [7 8] 2025/04/30 09:16:19 server updated RTT: 35.347ms (σ: 6.54ms) 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server <- &wire.PingFrame{} 2025/04/30 09:16:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:19 server -> Sending packet 9 (45 bytes) for connection 7c31deeda1d39e4b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 391985c0a02b5708c4d0daa6bc54a311, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 3, Smallest: 0}}, DelayTime: 170.008µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- Reading packet 13 (162 bytes) for connection 276675ad, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 276675ad, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 8, DelayTime: 944µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: d957b942608bfca6259327a693ba315e, StatelessResetToken: 0x7cd6896fb3dcda866182461fa5ee9de7} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: b2934269a3dd4f5c06e397447d392772, StatelessResetToken: 0x8684794739ed5877481b2ae5130105e2} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 08040ea752b9d839be0f6eb1c03f6133, StatelessResetToken: 0xd8148f2a4b2922ea238b80ee43ce14b6} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:19 server -> Sending packet 9 (1409 bytes) for connection 431ec75933692438, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: d957b942608bfca6259327a693ba315e, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.PingFrame{} 2025/04/30 09:16:19 Received request: GET /eatmhztjmq 2025/04/30 09:16:19 server -> Sending packet 10 (51 bytes) for connection 431ec75933692438, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: d957b942608bfca6259327a693ba315e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 13, LowestAcked: 0, AckRanges: {{Largest: 13, Smallest: 12}, {Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}, {Largest: 0, Smallest: 0}}, DelayTime: 260.898µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server -> Sending packet 11 (1061 bytes) for connection 431ec75933692438, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: d957b942608bfca6259327a693ba315e, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server <- Reading packet 10 (43 bytes) for connection 3cd7eebe, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 3cd7eebe, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [3cd7eebe 225dae09] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection 7c31deeda1d39e4b closed. 2025/04/30 09:16:19 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:16:19.266948148 +0000 UTC m=+2.783241795 2025/04/30 09:16:19 server lost packet 3 (time threshold) 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server -> Sending packet 5 (1061 bytes) for connection 22f63df3968fc5c7, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 97b2ea41485f7fa2679570246c149e7b, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server <- Reading packet 4 (43 bytes) for connection 2d8123b9, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2d8123b9, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 0, Smallest: 0}}, DelayTime: 134.984ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- &wire.PingFrame{} 2025/04/30 09:16:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:19 server -> Sending packet 10 (47 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: af6942d4b356c38ea2fa5fb9258f1a6f, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 109.585µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- Reading packet 14 (43 bytes) for connection 276675ad, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 276675ad, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [276675ad 29c277fa] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection 431ec75933692438 closed. 2025/04/30 09:16:19 server <- Received Initial packet. 2025/04/30 09:16:19 Created qlog file: /logs/qlog/50f9d8a38e97dc3c.sqlog 2025/04/30 09:16:19 server Changing connection ID to 4f8dbce6. 2025/04/30 09:16:19 Adding connection IDs 50f9d8a38e97dc3c and 4f8dbce6 for a new connection. 2025/04/30 09:16:19 server <- Reading packet 2 (1200 bytes) for connection 50f9d8a38e97dc3c, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 50f9d8a38e97dc3c, SrcConnectionID: 6e36acc202472928be0bfbec158a4533, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 6e36acc202472928be0bfbec158a4533, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:19 Adding connection ID 2b4fdf7f. 2025/04/30 09:16:19 Adding connection ID 52d4679b. 2025/04/30 09:16:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 50f9d8a38e97dc3c 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 6e36acc202472928be0bfbec158a4533, SrcConnectionID: 4f8dbce6, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 968, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 6e36acc202472928be0bfbec158a4533, SrcConnectionID: 4f8dbce6, PacketNumber: 0, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:16:19 server Short Header{DestConnectionID: 6e36acc202472928be0bfbec158a4533, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 52d4679b, StatelessResetToken: 0x788353f3e64f9080687627c8e58e5c55} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2b4fdf7f, StatelessResetToken: 0xc7b0d176d7424e48db89836763013a94} 2025/04/30 09:16:19 server <- Reading packet 4 (1200 bytes) for connection 50f9d8a38e97dc3c, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 50f9d8a38e97dc3c, SrcConnectionID: 6e36acc202472928be0bfbec158a4533, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:19 server -> Sending packet 1 (58 bytes) for connection 50f9d8a38e97dc3c, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 6e36acc202472928be0bfbec158a4533, SrcConnectionID: 4f8dbce6, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- Reading packet 4 (43 bytes) for connection a063cdd8, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: a063cdd8, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [a063cdd8 60737bfd] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection 22f63df3968fc5c7 closed. 2025/04/30 09:16:19 server <- Received Initial packet. 2025/04/30 09:16:19 Created qlog file: /logs/qlog/e6dd69b4e01d63b5.sqlog 2025/04/30 09:16:19 server Changing connection ID to 7cec7afe. 2025/04/30 09:16:19 Adding connection IDs e6dd69b4e01d63b5 and 7cec7afe for a new connection. 2025/04/30 09:16:19 server <- Reading packet 2 (1200 bytes) for connection e6dd69b4e01d63b5, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: e6dd69b4e01d63b5, SrcConnectionID: ef11efc9f83732b473d7bb8b0377588b, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: ef11efc9f83732b473d7bb8b0377588b, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:19 Adding connection ID c0addfc8. 2025/04/30 09:16:19 Adding connection ID 4260bcbb. 2025/04/30 09:16:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection e6dd69b4e01d63b5 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: ef11efc9f83732b473d7bb8b0377588b, SrcConnectionID: 7cec7afe, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 956, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: ef11efc9f83732b473d7bb8b0377588b, SrcConnectionID: 7cec7afe, PacketNumber: 0, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:16:19 server Short Header{DestConnectionID: ef11efc9f83732b473d7bb8b0377588b, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: c0addfc8, StatelessResetToken: 0x0400182ebefdab6cdb306d8b7518562a} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 4260bcbb, StatelessResetToken: 0x8f303d425e3fbd92e79a0025a8a98f01} 2025/04/30 09:16:19 server <- Reading packet 4 (1200 bytes) for connection e6dd69b4e01d63b5, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: e6dd69b4e01d63b5, SrcConnectionID: ef11efc9f83732b473d7bb8b0377588b, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:19 server -> Sending packet 1 (58 bytes) for connection e6dd69b4e01d63b5, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: ef11efc9f83732b473d7bb8b0377588b, SrcConnectionID: 7cec7afe, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 2 (1280 bytes) for connection e6dd69b4e01d63b5, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: ef11efc9f83732b473d7bb8b0377588b, SrcConnectionID: 7cec7afe, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server -> Sending packet 3 (1280 bytes) for connection e6dd69b4e01d63b5, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: ef11efc9f83732b473d7bb8b0377588b, SrcConnectionID: 7cec7afe, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:19 server <- Reading packet 5 (66 bytes) for connection c0addfc8, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: c0addfc8, SrcConnectionID: ef11efc9f83732b473d7bb8b0377588b, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 18.776ms} 2025/04/30 09:16:19 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:19 server <- Reading packet 0 (1134 bytes) for connection c0addfc8, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: c0addfc8, SrcConnectionID: ef11efc9f83732b473d7bb8b0377588b, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:19 server Dropping Initial keys. 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 18.776ms} 2025/04/30 09:16:19 server newly acked packets (1): [0] 2025/04/30 09:16:19 server updated RTT: 36.546413ms (σ: 18.273206ms) 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 Retiring connection ID e6dd69b4e01d63b5 in 5s. 2025/04/30 09:16:19 server Dropping Handshake keys. 2025/04/30 09:16:19 server -> Sending packet 1 (267 bytes) for connection e6dd69b4e01d63b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: ef11efc9f83732b473d7bb8b0377588b, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0xf5e9dfdd6edc453b35680f89440662d088145830c9adb436a16fd0e2d6703fc736bf4cb12773f629497cca75fecd7aa3d426a4b392573e060a944f63b9d3fc5fff86a5dbcfd20cd2f2994a45495da5eb9d386d666948} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server <- Reading packet 0 (43 bytes) for connection c0addfc8, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: c0addfc8, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.344ms} 2025/04/30 09:16:19 server newly acked packets (1): [0] 2025/04/30 09:16:19 server updated RTT: 36.566ms (σ: 13.746ms) 2025/04/30 09:16:19 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 Retiring connection ID 7cec7afe in 5s. 2025/04/30 09:16:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:19 server <- Reading packet 1 (45 bytes) for connection c0addfc8, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: c0addfc8, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:19 server -> Sending packet 2 (43 bytes) for connection e6dd69b4e01d63b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: ef11efc9f83732b473d7bb8b0377588b, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 292.126µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 Received request: GET /wscumpmdfj 2025/04/30 09:16:19 server -> Sending packet 3 (1061 bytes) for connection e6dd69b4e01d63b5, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: ef11efc9f83732b473d7bb8b0377588b, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 5 (1061 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server -> Sending packet 6 (1061 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server <- Reading packet 9 (43 bytes) for connection 2d8123b9, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2d8123b9, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}}, DelayTime: 120.424ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- &wire.PingFrame{} 2025/04/30 09:16:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:19 server -> Sending packet 11 (49 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: af6942d4b356c38ea2fa5fb9258f1a6f, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 0, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 139.711µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- Reading packet 11 (43 bytes) for connection 2d8123b9, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2d8123b9, PacketNumber: 11, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 6, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 6, Smallest: 6}}, DelayTime: 120.424ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- &wire.PingFrame{} 2025/04/30 09:16:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:19 server -> Sending packet 12 (51 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: af6942d4b356c38ea2fa5fb9258f1a6f, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 11, LowestAcked: 0, AckRanges: {{Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 229.335µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- Reading packet 3 (43 bytes) for connection c0addfc8, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: c0addfc8, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 Replacing connection for connection IDs [4260bcbb c0addfc8] with a closed connection. 2025/04/30 09:16:19 server -> Sending packet 2 (1280 bytes) for connection 50f9d8a38e97dc3c, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 6e36acc202472928be0bfbec158a4533, SrcConnectionID: 4f8dbce6, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection e6dd69b4e01d63b5 closed. 2025/04/30 09:16:19 server -> Sending packet 3 (1280 bytes) for connection 50f9d8a38e97dc3c, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 6e36acc202472928be0bfbec158a4533, SrcConnectionID: 4f8dbce6, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server <- Reading packet 5 (1200 bytes) for connection 4f8dbce6, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 4f8dbce6, SrcConnectionID: 6e36acc202472928be0bfbec158a4533, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 8.704ms} 2025/04/30 09:16:19 server newly acked packets (1): [3] 2025/04/30 09:16:19 server updated RTT: 35.452509ms (σ: 17.726254ms) 2025/04/30 09:16:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 1 (199 bytes) for connection 50f9d8a38e97dc3c, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 6e36acc202472928be0bfbec158a4533, SrcConnectionID: 4f8dbce6, PacketNumber: 1, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:16:19 server -> Sending packet 2 (199 bytes) for connection 50f9d8a38e97dc3c, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 6e36acc202472928be0bfbec158a4533, SrcConnectionID: 4f8dbce6, PacketNumber: 2, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:16:19 server <- Received Initial packet. 2025/04/30 09:16:19 Created qlog file: /logs/qlog/09f318948ab81e43.sqlog 2025/04/30 09:16:19 server Changing connection ID to 5c9054a7. 2025/04/30 09:16:19 Adding connection IDs 09f318948ab81e43 and 5c9054a7 for a new connection. 2025/04/30 09:16:19 server <- Reading packet 2 (1200 bytes) for connection 09f318948ab81e43, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 09f318948ab81e43, SrcConnectionID: 2ec82ce0f2a05c2737fa3405e10f53dc, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 2ec82ce0f2a05c2737fa3405e10f53dc, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:19 Adding connection ID e3c5a0bb. 2025/04/30 09:16:19 Adding connection ID 91d02eb7. 2025/04/30 09:16:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 09f318948ab81e43 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 2ec82ce0f2a05c2737fa3405e10f53dc, SrcConnectionID: 5c9054a7, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 415, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 2ec82ce0f2a05c2737fa3405e10f53dc, SrcConnectionID: 5c9054a7, PacketNumber: 0, PacketNumberLen: 2, Length: 723, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 701, Offset + Data length: 701} 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2ec82ce0f2a05c2737fa3405e10f53dc, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: e3c5a0bb, StatelessResetToken: 0x7f8590336bada8c77f4c588869ae2eeb} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 91d02eb7, StatelessResetToken: 0x962d1a675a8b92b4fbfdc7fbf3023066} 2025/04/30 09:16:19 server <- Reading packet 4 (1200 bytes) for connection 09f318948ab81e43, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 09f318948ab81e43, SrcConnectionID: 2ec82ce0f2a05c2737fa3405e10f53dc, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:19 server -> Sending packet 1 (58 bytes) for connection 09f318948ab81e43, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 2ec82ce0f2a05c2737fa3405e10f53dc, SrcConnectionID: 5c9054a7, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 09:16:19 server -> Sending packet 14 (267 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:19 server Short Header{DestConnectionID: af6942d4b356c38ea2fa5fb9258f1a6f, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0xc509d0b2e1219fe3fe76bb0f7b7b69d0b20a4ebba8179965899b814512d32886c7806b8cf196b47d4aa17b72aa75fea3c45d06ade7130c31e6544bd867cf88dc3e1002a174006d15b0f74a547dbf0bd65c08ecb035bd} 2025/04/30 09:16:19 server Skipping packet number 13 2025/04/30 09:16:19 server -> Sending packet 15 (37 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:19 server Short Header{DestConnectionID: af6942d4b356c38ea2fa5fb9258f1a6f, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:19 server <- Reading packet 5 (66 bytes) for connection e3c5a0bb, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: e3c5a0bb, SrcConnectionID: 2ec82ce0f2a05c2737fa3405e10f53dc, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 18.528ms} 2025/04/30 09:16:19 server newly acked packets (1): [0] 2025/04/30 09:16:19 server updated RTT: 36.385687ms (σ: 18.192843ms) 2025/04/30 09:16:19 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:19 server <- Reading packet 0 (1134 bytes) for connection e3c5a0bb, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: e3c5a0bb, SrcConnectionID: 2ec82ce0f2a05c2737fa3405e10f53dc, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:19 server Dropping Initial keys. 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 18.528ms} 2025/04/30 09:16:19 server newly acked packets (1): [0] 2025/04/30 09:16:19 server updated RTT: 36.385ms (σ: 13.644ms) 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 Retiring connection ID 09f318948ab81e43 in 5s. 2025/04/30 09:16:19 server Dropping Handshake keys. 2025/04/30 09:16:19 server <- Reading packet 0 (43 bytes) for connection e3c5a0bb, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: e3c5a0bb, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.312ms} 2025/04/30 09:16:19 server newly acked packets (1): [0] 2025/04/30 09:16:19 server updated RTT: 36.388ms (σ: 10.24ms) 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 Retiring connection ID 5c9054a7 in 5s. 2025/04/30 09:16:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:19 server -> Sending packet 1 (276 bytes) for connection 09f318948ab81e43, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2ec82ce0f2a05c2737fa3405e10f53dc, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 579.124µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0x5fb894746f9c6f9b9f8df8d0874860d5f2f7e3a124de524fe7487c2fb7a376ab7eb33a03872179397d243fe08ba2eb70d701ea962c3a461cde3d0b8ad2f456502a4883df38525bb66ba3e44b88e2f06d2d4b521f788c} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server <- Reading packet 1 (45 bytes) for connection e3c5a0bb, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: e3c5a0bb, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:19 Received request: GET /krvfpdmnas 2025/04/30 09:16:19 server -> Sending packet 2 (1070 bytes) for connection 09f318948ab81e43, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2ec82ce0f2a05c2737fa3405e10f53dc, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 839.349µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 09:16:19 server -> Sending packet 4 (1280 bytes) for connection 75dfef6789fc6f9b, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, SrcConnectionID: 35b0909e, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:19 server -> Sending packet 5 (1280 bytes) for connection 75dfef6789fc6f9b, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, SrcConnectionID: 35b0909e, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server Amplification window limited. Received 2400 bytes, already sent out 7970 bytes 2025/04/30 09:16:19 server <- Reading packet 2 (139 bytes) for connection e3c5a0bb, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: e3c5a0bb, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.176ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server newly acked packets (1): [1] 2025/04/30 09:16:19 server updated RTT: 35.98ms (σ: 8.495ms) 2025/04/30 09:16:19 server ECN capability confirmed. 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 4de478ae15541a52463d149e20734274, StatelessResetToken: 0x334ec4d01dce23ca229b8c1d79b56965} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 32aed58d9a13bfa246833df329db3b25, StatelessResetToken: 0x7e9df3ce66fa3b0c72b49e0b79d75c69} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: a6ae03642bab34a885c665e4ec058a57, StatelessResetToken: 0x4478de2fbcea134a2f698d5406fa58a7} 2025/04/30 09:16:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:19 server Ignoring all packets below 1. 2025/04/30 09:16:19 server -> Sending packet 3 (45 bytes) for connection 09f318948ab81e43, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 4de478ae15541a52463d149e20734274, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 256.189µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server <- Reading packet 3 (43 bytes) for connection e3c5a0bb, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: e3c5a0bb, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [91d02eb7 e3c5a0bb] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection 09f318948ab81e43 closed. 2025/04/30 09:16:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:19 server -> Sending packet 3 (199 bytes) for connection 50f9d8a38e97dc3c, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 6e36acc202472928be0bfbec158a4533, SrcConnectionID: 4f8dbce6, PacketNumber: 3, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:16:19 server -> Sending packet 4 (199 bytes) for connection 50f9d8a38e97dc3c, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 6e36acc202472928be0bfbec158a4533, SrcConnectionID: 4f8dbce6, PacketNumber: 4, PacketNumberLen: 2, Length: 170, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 148, Offset + Data length: 148} 2025/04/30 09:16:19 server <- Reading packet 0 (91 bytes) for connection 4f8dbce6, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 4f8dbce6, SrcConnectionID: 6e36acc202472928be0bfbec158a4533, PacketNumber: 0, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:19 server Dropping Initial keys. 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 9.488ms} 2025/04/30 09:16:19 server newly acked packets (1): [4] 2025/04/30 09:16:19 server updated RTT: 35.145ms (σ: 13.908ms) 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 Retiring connection ID 50f9d8a38e97dc3c in 5s. 2025/04/30 09:16:19 server Dropping Handshake keys. 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 2 (315 bytes) for connection 50f9d8a38e97dc3c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 6e36acc202472928be0bfbec158a4533, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0x9bb78202021cd498b5bc3b1a4e458b23c866290da7e262467a312ad5692b59623e46218d79dfca3772d55fea34da9126490baaf66681f70e7e8a4951b2942f3db0f85a503bfd440263ff7f46068ee380727cbfa4e806} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2b4fdf7f, StatelessResetToken: 0xc7b0d176d7424e48db89836763013a94} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 52d4679b, StatelessResetToken: 0x788353f3e64f9080687627c8e58e5c55} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> Sending packet 3 (315 bytes) for connection 50f9d8a38e97dc3c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 6e36acc202472928be0bfbec158a4533, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 52d4679b, StatelessResetToken: 0x788353f3e64f9080687627c8e58e5c55} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0x9bb78202021cd498b5bc3b1a4e458b23c866290da7e262467a312ad5692b59623e46218d79dfca3772d55fea34da9126490baaf66681f70e7e8a4951b2942f3db0f85a503bfd440263ff7f46068ee380727cbfa4e806} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 2b4fdf7f, StatelessResetToken: 0xc7b0d176d7424e48db89836763013a94} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server <- Reading packet 0 (45 bytes) for connection 4f8dbce6, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 4f8dbce6, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:19 server -> Sending packet 4 (43 bytes) for connection 50f9d8a38e97dc3c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 6e36acc202472928be0bfbec158a4533, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 91.321µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 Received request: GET /achmtkwrhy 2025/04/30 09:16:19 server -> Sending packet 5 (1061 bytes) for connection 50f9d8a38e97dc3c, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 6e36acc202472928be0bfbec158a4533, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server <- Received Initial packet. 2025/04/30 09:16:19 Created qlog file: /logs/qlog/4a1c0c3379e98815.sqlog 2025/04/30 09:16:19 server Changing connection ID to 6a5b3aa3. 2025/04/30 09:16:19 Adding connection IDs 4a1c0c3379e98815 and 6a5b3aa3 for a new connection. 2025/04/30 09:16:19 server <- Reading packet 2 (1200 bytes) for connection 4a1c0c3379e98815, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 4a1c0c3379e98815, SrcConnectionID: fe30ec8d3a24995ed1396c507a099c13, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:19 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: fe30ec8d3a24995ed1396c507a099c13, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:19 Adding connection ID 68414229. 2025/04/30 09:16:19 Adding connection ID 8714e323. 2025/04/30 09:16:19 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 4a1c0c3379e98815 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 961, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, PacketNumber: 0, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 09:16:19 server Short Header{DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 68414229, StatelessResetToken: 0xe6ac7d14246b17e94a2e0dcc874be8bd} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8714e323, StatelessResetToken: 0x1d63e5806dadb8d7be88957bfaefa5d3} 2025/04/30 09:16:19 server <- Reading packet 2 (43 bytes) for connection 2b4fdf7f, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2b4fdf7f, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [4f8dbce6 2b4fdf7f 52d4679b] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection 50f9d8a38e97dc3c closed. 2025/04/30 09:16:19 server <- Reading packet 18 (43 bytes) for connection 2d8123b9, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2d8123b9, PacketNumber: 18, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 11, DelayTime: 293.648ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- &wire.PingFrame{} 2025/04/30 09:16:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:19 server -> Sending packet 16 (53 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:19 server Short Header{DestConnectionID: af6942d4b356c38ea2fa5fb9258f1a6f, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 18, LowestAcked: 0, AckRanges: {{Largest: 18, Smallest: 18}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 106.028µs, ECT0: 3, ECT1: 0, CE: 1} 2025/04/30 09:16:19 server <- Reading packet 20 (43 bytes) for connection 2d8123b9, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2d8123b9, PacketNumber: 20, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 12, LowestAcked: 11, DelayTime: 293.648ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- &wire.PingFrame{} 2025/04/30 09:16:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:19 server -> Sending packet 17 (55 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:19 server Short Header{DestConnectionID: af6942d4b356c38ea2fa5fb9258f1a6f, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 20, LowestAcked: 0, AckRanges: {{Largest: 20, Smallest: 20}, {Largest: 18, Smallest: 18}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 158.244µs, ECT0: 4, ECT1: 0, CE: 1} 2025/04/30 09:16:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 1 (1280 bytes) for connection 4a1c0c3379e98815, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server -> Sending packet 2 (1280 bytes) for connection 4a1c0c3379e98815, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server Canceling loss detection timer. 2025/04/30 09:16:19 server Amplification window limited. Received 1200 bytes, already sent out 3840 bytes 2025/04/30 09:16:19 server <- Reading packet 1 (65 bytes) for connection ce88b12b, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: ce88b12b, SrcConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:19 server Dropping Initial keys. 2025/04/30 09:16:19 server <- &wire.PingFrame{} 2025/04/30 09:16:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 1 (772 bytes) for connection aa5c56edc5fc68b1, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, SrcConnectionID: ce88b12b, PacketNumber: 1, PacketNumberLen: 2, Length: 743, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:16:19 server -> Sending packet 2 (764 bytes) for connection aa5c56edc5fc68b1, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, SrcConnectionID: ce88b12b, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:16:19 server <- Reading packet 1 (65 bytes) for connection 0f89496a, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 0f89496a, SrcConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:19 server Dropping Initial keys. 2025/04/30 09:16:19 server <- &wire.PingFrame{} 2025/04/30 09:16:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 1 (765 bytes) for connection 3ec7174f5efdb35f, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, SrcConnectionID: 0f89496a, PacketNumber: 1, PacketNumberLen: 2, Length: 736, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 09:16:19 server -> Sending packet 2 (757 bytes) for connection 3ec7174f5efdb35f, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, SrcConnectionID: 0f89496a, PacketNumber: 2, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 09:16:19 server <- Reading packet 1 (65 bytes) for connection 999aabb4, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 999aabb4, SrcConnectionID: 6c009568bfce9c79516ab1fb87871f71, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:19 server Dropping Initial keys. 2025/04/30 09:16:19 server <- &wire.PingFrame{} 2025/04/30 09:16:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 1 (772 bytes) for connection 3ae4925c294f84fd, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 6c009568bfce9c79516ab1fb87871f71, SrcConnectionID: 999aabb4, PacketNumber: 1, PacketNumberLen: 2, Length: 743, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:16:19 server -> Sending packet 2 (764 bytes) for connection 3ae4925c294f84fd, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 6c009568bfce9c79516ab1fb87871f71, SrcConnectionID: 999aabb4, PacketNumber: 2, PacketNumberLen: 2, Length: 735, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 713, Offset + Data length: 713} 2025/04/30 09:16:19 server <- Reading packet 2 (91 bytes) for connection ce88b12b, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: ce88b12b, SrcConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 11.728ms} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 Retiring connection ID aa5c56edc5fc68b1 in 5s. 2025/04/30 09:16:19 server Dropping Handshake keys. 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 2 (312 bytes) for connection aa5c56edc5fc68b1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 55a4b84b, StatelessResetToken: 0xd28866f414205005700b582b8b8f5e33} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0xba47cd7059ce6bdc3d5f94fc53a108f66855fc8881d552e28c26ee75863a18bea1090593af9827685e47f3cf7275c831b96db2d55b9600ee3fb99ee07eaf15176fb5e2bb2e1355261742565bb2a5f80edd17cdb82ee2} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65159697, StatelessResetToken: 0x05c4ad30f12d147d3258e4b935212cb6} 2025/04/30 09:16:19 server -> Sending packet 3 (312 bytes) for connection aa5c56edc5fc68b1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 65159697, StatelessResetToken: 0x05c4ad30f12d147d3258e4b935212cb6} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0xba47cd7059ce6bdc3d5f94fc53a108f66855fc8881d552e28c26ee75863a18bea1090593af9827685e47f3cf7275c831b96db2d55b9600ee3fb99ee07eaf15176fb5e2bb2e1355261742565bb2a5f80edd17cdb82ee2} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 55a4b84b, StatelessResetToken: 0xd28866f414205005700b582b8b8f5e33} 2025/04/30 09:16:19 server -> Sending packet 4 (1366 bytes) for connection aa5c56edc5fc68b1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.PingFrame{} 2025/04/30 09:16:19 server <- Reading packet 0 (45 bytes) for connection ce88b12b, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: ce88b12b, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:19 server -> Sending packet 5 (43 bytes) for connection aa5c56edc5fc68b1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 108.733µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 Received request: GET /iefkrptark 2025/04/30 09:16:19 server -> Sending packet 6 (1061 bytes) for connection aa5c56edc5fc68b1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 3bdb3bfceb2dc9d41cd7637233102175, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:16:19 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:16:19 server <- Reading packet 2 (91 bytes) for connection 999aabb4, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: 999aabb4, SrcConnectionID: 6c009568bfce9c79516ab1fb87871f71, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 9.704ms} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:19 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:19 Retiring connection ID 3ae4925c294f84fd in 5s. 2025/04/30 09:16:19 server Dropping Handshake keys. 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:19 server -> Sending packet 2 (312 bytes) for connection 3ae4925c294f84fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 6c009568bfce9c79516ab1fb87871f71, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f98d648b, StatelessResetToken: 0x60f1cec1a007251a635499d67d857e65} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0x7e10f951b213b5cb058031a53672d2b261f70bcd1057487458b47681f08f0a3466a12ea60a084e87cda897842b0ffb099cf6c509fec00df832876da3cb81e9b78789c41f56f213e4d8af3d2f2112d2b8a843ba2fe329} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ddf1065d, StatelessResetToken: 0x02bfbbcc650805a844264a4c9cbbeafe} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> Sending packet 3 (312 bytes) for connection 3ae4925c294f84fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 6c009568bfce9c79516ab1fb87871f71, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:16:19 server -> &wire.NewTokenFrame{Token: 0x7e10f951b213b5cb058031a53672d2b261f70bcd1057487458b47681f08f0a3466a12ea60a084e87cda897842b0ffb099cf6c509fec00df832876da3cb81e9b78789c41f56f213e4d8af3d2f2112d2b8a843ba2fe329} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: ddf1065d, StatelessResetToken: 0x02bfbbcc650805a844264a4c9cbbeafe} 2025/04/30 09:16:19 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: f98d648b, StatelessResetToken: 0x60f1cec1a007251a635499d67d857e65} 2025/04/30 09:16:19 server -> Sending packet 4 (1366 bytes) for connection 3ae4925c294f84fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 6c009568bfce9c79516ab1fb87871f71, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.PingFrame{} 2025/04/30 09:16:19 server <- Reading packet 0 (45 bytes) for connection 999aabb4, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 999aabb4, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:19 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:19 server -> Sending packet 5 (43 bytes) for connection 3ae4925c294f84fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 6c009568bfce9c79516ab1fb87871f71, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 86.161µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 Received request: GET /amnwcpphfc 2025/04/30 09:16:19 server -> Sending packet 6 (1061 bytes) for connection 3ae4925c294f84fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 6c009568bfce9c79516ab1fb87871f71, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:19 server -> Sending packet 11 (37 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server Skipping packet number 10 2025/04/30 09:16:19 server -> Sending packet 12 (1061 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server <- Reading packet 25 (43 bytes) for connection 2d8123b9, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2d8123b9, PacketNumber: 25, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 17, LowestAcked: 16, DelayTime: 86.784ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- &wire.PingFrame{} 2025/04/30 09:16:19 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:19 server -> Sending packet 18 (57 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:19 server Short Header{DestConnectionID: af6942d4b356c38ea2fa5fb9258f1a6f, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 25, LowestAcked: 0, AckRanges: {{Largest: 25, Smallest: 25}, {Largest: 20, Smallest: 20}, {Largest: 18, Smallest: 18}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 94.036µs, ECT0: 5, ECT1: 0, CE: 1} 2025/04/30 09:16:19 server <- Reading packet 1 (141 bytes) for connection 55a4b84b, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 55a4b84b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 960µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: c6eb560785e17f5aaa5f5999f98c36a9, StatelessResetToken: 0xaf1f92c6e816149e66252300740f32a3} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 5d6fe71d707a593d9c0f1cb0ad392de9, StatelessResetToken: 0x323d562d948918fe514a29e664e10ffb} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 9283f16f27492cac1871b35e0f947c57, StatelessResetToken: 0x120a53c9dd717d9c81da9c0451053889} 2025/04/30 09:16:19 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 Retiring connection ID ce88b12b in 5s. 2025/04/30 09:16:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:19 server -> Sending packet 7 (45 bytes) for connection aa5c56edc5fc68b1, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: c6eb560785e17f5aaa5f5999f98c36a9, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 156.132µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server <- Reading packet 2 (43 bytes) for connection 55a4b84b, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 55a4b84b, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [65159697 55a4b84b] with a closed connection. 2025/04/30 09:16:19 server Connection aa5c56edc5fc68b1 closed. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server <- Reading packet 2 (1200 bytes) for connection 9cf81dea37aacfaa, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 9cf81dea37aacfaa, SrcConnectionID: ff0da6e6b898884c3d7ff48c472278b4, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:19 server -> Sending packet 1 (205 bytes) for connection 9cf81dea37aacfaa, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, SrcConnectionID: 194987bd, PacketNumber: 1, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 09:16:19 server -> Sending packet 2 (205 bytes) for connection 9cf81dea37aacfaa, Handshake 2025/04/30 09:16:19 server Long Header{Type: Handshake, DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, SrcConnectionID: 194987bd, PacketNumber: 2, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 09:16:19 server -> Sending packet 3 (58 bytes) for connection 9cf81dea37aacfaa, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, SrcConnectionID: 194987bd, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 09:16:19 server -> Sending packet 4 (1280 bytes) for connection 9cf81dea37aacfaa, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, SrcConnectionID: 194987bd, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server -> Sending packet 5 (1280 bytes) for connection 9cf81dea37aacfaa, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, SrcConnectionID: 194987bd, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:19 server <- Reading packet 4 (1200 bytes) for connection 9cf81dea37aacfaa, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 9cf81dea37aacfaa, SrcConnectionID: ff0da6e6b898884c3d7ff48c472278b4, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:19 server -> Sending packet 6 (60 bytes) for connection 9cf81dea37aacfaa, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, SrcConnectionID: 194987bd, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- Reading packet 1 (141 bytes) for connection f98d648b, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: f98d648b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 896µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 95c83b564dab552ff02759c14d0639e8, StatelessResetToken: 0x39b47d61ff0b2a230c52b3267043cce2} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 1ca373fd186af0dd01e6c2b7e7d98b00, StatelessResetToken: 0x813b58a19e00910a4601b506da8d27c2} 2025/04/30 09:16:19 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: a5b28b5f3131681693345319b5166eaa, StatelessResetToken: 0xa6b20cf44e6a0ec9f64314e33b2a1346} 2025/04/30 09:16:19 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 Retiring connection ID 999aabb4 in 5s. 2025/04/30 09:16:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:19 server -> Sending packet 7 (45 bytes) for connection 3ae4925c294f84fd, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:19 server Short Header{DestConnectionID: 95c83b564dab552ff02759c14d0639e8, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 138.87µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:19 server <- Reading packet 2 (43 bytes) for connection f98d648b, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: f98d648b, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [ddf1065d f98d648b] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection 3ae4925c294f84fd closed. 2025/04/30 09:16:19 server <- Reading packet 26 (54 bytes) for connection 2d8123b9, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2d8123b9, PacketNumber: 26, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 18, LowestAcked: 18, DelayTime: 704µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:19 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:19 Received request: GET /vjfedfezhf 2025/04/30 09:16:19 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:19 server -> Sending packet 19 (1083 bytes) for connection 2cb96ffa81389a50, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:19 server Short Header{DestConnectionID: af6942d4b356c38ea2fa5fb9258f1a6f, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:19 server -> &wire.AckFrame{LargestAcked: 26, LowestAcked: 0, AckRanges: {{Largest: 26, Smallest: 25}, {Largest: 20, Smallest: 20}, {Largest: 18, Smallest: 18}, {Largest: 11, Smallest: 11}, {Largest: 9, Smallest: 9}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 293.193µs, ECT0: 6, ECT1: 0, CE: 1} 2025/04/30 09:16:19 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:19 server <- Reading packet 5 (1200 bytes) for connection 194987bd, Initial 2025/04/30 09:16:19 server Long Header{Type: Initial, DestConnectionID: 194987bd, SrcConnectionID: ff0da6e6b898884c3d7ff48c472278b4, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 1170, Version: v1} 2025/04/30 09:16:19 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 8.28ms} 2025/04/30 09:16:19 server <- Reading packet 27 (43 bytes) for connection 2d8123b9, 1-RTT 2025/04/30 09:16:19 server Short Header{DestConnectionID: 2d8123b9, PacketNumber: 27, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:19 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:19 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:19 Replacing connection for connection IDs [2d8123b9 a07da2c7] with a closed connection. 2025/04/30 09:16:19 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:19 server Connection 2cb96ffa81389a50 closed. 2025/04/30 09:16:20 server <- Reading packet 2 (93 bytes) for connection 35b0909e, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 35b0909e, SrcConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, PacketNumber: 2, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:16:20 server Dropping Initial keys. 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 8.009088s} 2025/04/30 09:16:20 server newly acked packets (1): [2] 2025/04/30 09:16:20 server updated RTT: 1.038289127s (σ: 519.144563ms) 2025/04/30 09:16:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:20 Retiring connection ID 75dfef6789fc6f9b in 5s. 2025/04/30 09:16:20 server Dropping Handshake keys. 2025/04/30 09:16:20 server -> Sending packet 1 (267 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.NewTokenFrame{Token: 0x07cc4119ba070534902c7a2776677c55dc27873fb82a79bc81cf43c5f1e3dc4a958123ca3bdc08ca2ab19f576641337abe622dfd589582dcb17555508599c7329a19e068bbd1bd9b50139c5ec8693ffefcdc4f14684a} 2025/04/30 09:16:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:20 server <- Reading packet 1 (65 bytes) for connection 14d541ec, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 14d541ec, SrcConnectionID: 7907be29999b7b89ab06a4e1448bdb85, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:20 server Dropping Initial keys. 2025/04/30 09:16:20 server <- &wire.PingFrame{} 2025/04/30 09:16:20 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:20 server -> Sending packet 1 (222 bytes) for connection 77aafbc422e2300a, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 7907be29999b7b89ab06a4e1448bdb85, SrcConnectionID: 14d541ec, PacketNumber: 1, PacketNumberLen: 2, Length: 193, Version: v1} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 09:16:20 server -> Sending packet 2 (214 bytes) for connection 77aafbc422e2300a, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 7907be29999b7b89ab06a4e1448bdb85, SrcConnectionID: 14d541ec, PacketNumber: 2, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 163, Offset + Data length: 163} 2025/04/30 09:16:20 server <- Reading packet 2 (91 bytes) for connection 14d541ec, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 14d541ec, SrcConnectionID: 7907be29999b7b89ab06a4e1448bdb85, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 10ms} 2025/04/30 09:16:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:20 Retiring connection ID 77aafbc422e2300a in 5s. 2025/04/30 09:16:20 server Dropping Handshake keys. 2025/04/30 09:16:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:20 server -> Sending packet 2 (315 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 7907be29999b7b89ab06a4e1448bdb85, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c531b71b, StatelessResetToken: 0x4316327e11ae959f36347a02c8831a49} 2025/04/30 09:16:20 server -> &wire.NewTokenFrame{Token: 0xf60c49dee3515592bb314fb8e7dbab5c62773d2c8498be9321ce6872a4c4f8903ef82246ebf4f1f0cd49e2c4692afe9e0803b2c9f6c48f526238487fa006b5ccfc6c594158254a6ab241baf30d614d2cb46b08243ffe} 2025/04/30 09:16:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: af66ac64, StatelessResetToken: 0xd963d287c6422b672b4d73908dc9dd40} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:20 server -> Sending packet 3 (315 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 7907be29999b7b89ab06a4e1448bdb85, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c531b71b, StatelessResetToken: 0x4316327e11ae959f36347a02c8831a49} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: af66ac64, StatelessResetToken: 0xd963d287c6422b672b4d73908dc9dd40} 2025/04/30 09:16:20 server -> &wire.NewTokenFrame{Token: 0xf60c49dee3515592bb314fb8e7dbab5c62773d2c8498be9321ce6872a4c4f8903ef82246ebf4f1f0cd49e2c4692afe9e0803b2c9f6c48f526238487fa006b5ccfc6c594158254a6ab241baf30d614d2cb46b08243ffe} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:20 server Dropping %!s(logging.PacketType=1) packet (65 bytes) because we already dropped the keys. 2025/04/30 09:16:20 server <- Reading packet 1 (141 bytes) for connection c531b71b, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: c531b71b, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 888µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 6a02302b46501650ada15de8632ddedc, StatelessResetToken: 0x2fe4f5ed78caa7894b1ee72fcfb5f0e7} 2025/04/30 09:16:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 47658fe5e65e92407013c2668bf73154, StatelessResetToken: 0xb71c0d99cee4d07638bd4a64689672b5} 2025/04/30 09:16:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: f27192e1bb45aece158db46ed390dbba, StatelessResetToken: 0x02e52eb35e65240622fbc29aee188f48} 2025/04/30 09:16:20 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:20 Retiring connection ID 14d541ec in 5s. 2025/04/30 09:16:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:20 server -> Sending packet 4 (45 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 6a02302b46501650ada15de8632ddedc, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 170.208µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:20 server <- Reading packet 3 (93 bytes) for connection 77eebc4d, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 77eebc4d, SrcConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 3, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 7.988584s} 2025/04/30 09:16:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:20 Retiring connection ID 1c575ceb70394d27 in 5s. 2025/04/30 09:16:20 server Dropping Handshake keys. 2025/04/30 09:16:20 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:20 server -> Sending packet 2 (315 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e43ee67, StatelessResetToken: 0x6e7b5076306826ffa6ba777f39f3c4b4} 2025/04/30 09:16:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a33dec00, StatelessResetToken: 0xc2f2e031b27fef560214b297ae05ceca} 2025/04/30 09:16:20 server -> &wire.NewTokenFrame{Token: 0x2fb564c4c2d6511d44b1cc8fc2e7562721d93e05ab7c48bc313be34ccf586ad20554b7fa0b4f047631cf31f3fc4cb6a6976c5ef4320e2bcbcea8d308e2864b5a5161c56c9d042b9aec0934f655ab71ef1f01340895ed} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:20 server -> Sending packet 3 (315 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e43ee67, StatelessResetToken: 0x6e7b5076306826ffa6ba777f39f3c4b4} 2025/04/30 09:16:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:20 server -> &wire.NewTokenFrame{Token: 0x2fb564c4c2d6511d44b1cc8fc2e7562721d93e05ab7c48bc313be34ccf586ad20554b7fa0b4f047631cf31f3fc4cb6a6976c5ef4320e2bcbcea8d308e2864b5a5161c56c9d042b9aec0934f655ab71ef1f01340895ed} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a33dec00, StatelessResetToken: 0xc2f2e031b27fef560214b297ae05ceca} 2025/04/30 09:16:20 server <- Reading packet 0 (45 bytes) for connection 77eebc4d, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: 77eebc4d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:20 server -> Sending packet 4 (46 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 999.987126ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:20 Received request: GET /rjcrvhjgoq 2025/04/30 09:16:20 server -> Sending packet 5 (1061 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:20 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:20 server -> Sending packet 3 (757 bytes) for connection 3ec7174f5efdb35f, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, SrcConnectionID: 0f89496a, PacketNumber: 3, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 09:16:20 server -> Sending packet 4 (757 bytes) for connection 3ec7174f5efdb35f, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, SrcConnectionID: 0f89496a, PacketNumber: 4, PacketNumberLen: 2, Length: 728, Version: v1} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 706, Offset + Data length: 706} 2025/04/30 09:16:20 server <- Reading packet 3 (65 bytes) for connection 0f89496a, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 0f89496a, SrcConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 3, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 3.928ms} 2025/04/30 09:16:20 server <- Reading packet 4 (65 bytes) for connection 0f89496a, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 0f89496a, SrcConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 4, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 1.368ms} 2025/04/30 09:16:20 server newly acked packets (1): [4] 2025/04/30 09:16:20 server updated RTT: 33.608939ms (σ: 16.804469ms) 2025/04/30 09:16:20 server Canceling loss detection timer. 2025/04/30 09:16:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:20 server -> Sending packet 6 (315 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 6a02302b46501650ada15de8632ddedc, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: af66ac64, StatelessResetToken: 0xd963d287c6422b672b4d73908dc9dd40} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c531b71b, StatelessResetToken: 0x4316327e11ae959f36347a02c8831a49} 2025/04/30 09:16:20 server -> &wire.NewTokenFrame{Token: 0xf60c49dee3515592bb314fb8e7dbab5c62773d2c8498be9321ce6872a4c4f8903ef82246ebf4f1f0cd49e2c4692afe9e0803b2c9f6c48f526238487fa006b5ccfc6c594158254a6ab241baf30d614d2cb46b08243ffe} 2025/04/30 09:16:20 server Skipping packet number 5 2025/04/30 09:16:20 server -> Sending packet 7 (37 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 6a02302b46501650ada15de8632ddedc, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:20 server <- Reading packet 4 (43 bytes) for connection c531b71b, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: c531b71b, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 4, DelayTime: 108.744ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server <- &wire.PingFrame{} 2025/04/30 09:16:20 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:20 server -> Sending packet 8 (45 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 6a02302b46501650ada15de8632ddedc, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 174.496µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server <- Reading packet 7 (43 bytes) for connection c531b71b, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: c531b71b, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 664µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server newly acked packets (2): [6 7] 2025/04/30 09:16:20 server updated RTT: 32.822906ms (σ: 16.411453ms) 2025/04/30 09:16:20 server ECN capability confirmed. 2025/04/30 09:16:20 server Canceling loss detection timer. 2025/04/30 09:16:20 server -> Sending packet 9 (1366 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 6a02302b46501650ada15de8632ddedc, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.PingFrame{} 2025/04/30 09:16:20 server <- Reading packet 8 (56 bytes) for connection c531b71b, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: c531b71b, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 584µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:20 Received request: GET /ywvbzkdemt 2025/04/30 09:16:20 server -> Sending packet 10 (1073 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 6a02302b46501650ada15de8632ddedc, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 1, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 320.544µs, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:20 server -> Sending packet 7 (315 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a33dec00, StatelessResetToken: 0xc2f2e031b27fef560214b297ae05ceca} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e43ee67, StatelessResetToken: 0x6e7b5076306826ffa6ba777f39f3c4b4} 2025/04/30 09:16:20 server -> &wire.NewTokenFrame{Token: 0x2fb564c4c2d6511d44b1cc8fc2e7562721d93e05ab7c48bc313be34ccf586ad20554b7fa0b4f047631cf31f3fc4cb6a6976c5ef4320e2bcbcea8d308e2864b5a5161c56c9d042b9aec0934f655ab71ef1f01340895ed} 2025/04/30 09:16:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:20 server Skipping packet number 6 2025/04/30 09:16:20 server -> Sending packet 8 (1061 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:20 server -> Sending packet 9 (1366 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.PingFrame{} 2025/04/30 09:16:20 server <- Reading packet 10 (43 bytes) for connection c531b71b, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: c531b71b, PacketNumber: 10, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 96.808ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server <- &wire.PingFrame{} 2025/04/30 09:16:20 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:20 server -> Sending packet 11 (49 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 6a02302b46501650ada15de8632ddedc, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 10, LowestAcked: 1, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 136.716µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server <- Reading packet 12 (43 bytes) for connection c531b71b, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: c531b71b, PacketNumber: 12, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 8, LowestAcked: 4, AckRanges: {{Largest: 8, Smallest: 6}, {Largest: 4, Smallest: 4}}, DelayTime: 96.808ms, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server <- &wire.PingFrame{} 2025/04/30 09:16:20 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:20 server -> Sending packet 12 (51 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 6a02302b46501650ada15de8632ddedc, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 12, LowestAcked: 1, AckRanges: {{Largest: 12, Smallest: 12}, {Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 7}, {Largest: 4, Smallest: 4}, {Largest: 1, Smallest: 1}}, DelayTime: 111.911µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:20 server -> Sending packet 8 (1061 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:20 server -> Sending packet 9 (1061 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:20 server -> Sending packet 10 (1366 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.PingFrame{} 2025/04/30 09:16:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:20 server -> Sending packet 14 (1061 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 6a02302b46501650ada15de8632ddedc, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:20 server -> Sending packet 15 (1061 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 6a02302b46501650ada15de8632ddedc, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:20 server -> Sending packet 10 (37 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:20 server Skipping packet number 9 2025/04/30 09:16:20 server -> Sending packet 11 (1061 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:20 Tracking 196 connection IDs and 4 reset tokens. 2025/04/30 09:16:20 server <- Reading packet 13 (43 bytes) for connection c531b71b, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: c531b71b, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 15, LowestAcked: 12, AckRanges: {{Largest: 15, Smallest: 15}, {Largest: 12, Smallest: 12}}, DelayTime: 344µs, ECT0: 7, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server newly acked packets (1): [15] 2025/04/30 09:16:20 server updated RTT: 32.893ms (σ: 12.451ms) 2025/04/30 09:16:20 server lost packet 9 (time threshold) 2025/04/30 09:16:20 server Canceling loss detection timer. 2025/04/30 09:16:20 server -> Sending packet 16 (1323 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 6a02302b46501650ada15de8632ddedc, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.PingFrame{} 2025/04/30 09:16:20 server -> Sending packet 17 (38 bytes) for connection 77aafbc422e2300a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 6a02302b46501650ada15de8632ddedc, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:20 server <- Reading packet 14 (43 bytes) for connection c531b71b, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: c531b71b, PacketNumber: 14, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:20 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:20 Replacing connection for connection IDs [af66ac64 c531b71b] with a closed connection. 2025/04/30 09:16:20 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:20 server Connection 77aafbc422e2300a closed. 2025/04/30 09:16:20 server <- Received Initial packet. 2025/04/30 09:16:20 Created qlog file: /logs/qlog/1876f6699d61049f.sqlog 2025/04/30 09:16:20 server Changing connection ID to db9311d9. 2025/04/30 09:16:20 Adding connection IDs 1876f6699d61049f and db9311d9 for a new connection. 2025/04/30 09:16:20 server <- Reading packet 6 (1200 bytes) for connection 1876f6699d61049f, Initial 2025/04/30 09:16:20 server Long Header{Type: Initial, DestConnectionID: 1876f6699d61049f, SrcConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:20 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:20 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:20 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:20 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:16:20 Adding connection ID 5b50263d. 2025/04/30 09:16:20 Adding connection ID c485ac68. 2025/04/30 09:16:20 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection 1876f6699d61049f 2025/04/30 09:16:20 server Long Header{Type: Initial, DestConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, SrcConnectionID: db9311d9, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 405, Version: v1} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 6, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, SrcConnectionID: db9311d9, PacketNumber: 0, PacketNumberLen: 2, Length: 733, Version: v1} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 711, Offset + Data length: 711} 2025/04/30 09:16:20 server Short Header{DestConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5b50263d, StatelessResetToken: 0x88c305b971f85d64f3cb23f7d26f1bf8} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: c485ac68, StatelessResetToken: 0x83872a308a2067771361aa486c108bde} 2025/04/30 09:16:20 server <- Reading packet 8 (1200 bytes) for connection 1876f6699d61049f, Initial 2025/04/30 09:16:20 server Long Header{Type: Initial, DestConnectionID: 1876f6699d61049f, SrcConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, Token: (empty), PacketNumber: 8, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:16:20 server -> Sending packet 1 (58 bytes) for connection 1876f6699d61049f, Initial 2025/04/30 09:16:20 server Long Header{Type: Initial, DestConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, SrcConnectionID: db9311d9, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 6, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1134 bytes. 2025/04/30 09:16:20 server <- Reading packet 9 (66 bytes) for connection 5b50263d, Initial 2025/04/30 09:16:20 server Long Header{Type: Initial, DestConnectionID: 5b50263d, SrcConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, Token: (empty), PacketNumber: 9, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19.048ms} 2025/04/30 09:16:20 server newly acked packets (1): [0] 2025/04/30 09:16:20 server updated RTT: 36.699574ms (σ: 18.349787ms) 2025/04/30 09:16:20 server Parsed a coalesced packet. Part 2: 1134 bytes. Remaining: 0 bytes. 2025/04/30 09:16:20 server <- Reading packet 0 (1134 bytes) for connection 5b50263d, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 5b50263d, SrcConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, PacketNumber: 0, PacketNumberLen: 1, Length: 1105, Version: v1} 2025/04/30 09:16:20 server Dropping Initial keys. 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19.048ms} 2025/04/30 09:16:20 server newly acked packets (1): [0] 2025/04/30 09:16:20 server updated RTT: 36.699ms (σ: 13.761ms) 2025/04/30 09:16:20 server Canceling loss detection timer. 2025/04/30 09:16:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:20 Retiring connection ID 1876f6699d61049f in 5s. 2025/04/30 09:16:20 server Dropping Handshake keys. 2025/04/30 09:16:20 server <- Reading packet 0 (43 bytes) for connection 5b50263d, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: 5b50263d, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.376ms} 2025/04/30 09:16:20 server newly acked packets (1): [0] 2025/04/30 09:16:20 server updated RTT: 36.7ms (σ: 10.324ms) 2025/04/30 09:16:20 server Canceling loss detection timer. 2025/04/30 09:16:20 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:20 Retiring connection ID db9311d9 in 5s. 2025/04/30 09:16:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:20 server -> Sending packet 1 (275 bytes) for connection 1876f6699d61049f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 474.016µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:20 server -> &wire.NewTokenFrame{Token: 0xe985abc42b82638aa147ba34f98dcd78f2a957b11ae1155e1ccc33492a4086e2039ec72ba727e329f01a27b7cf7db242075b80810c4ba07daca271be90adc8c592de3c943aa3d5ef1c0ace86b72ddac7bc247248aaa1} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:20 server -> Sending packet 3 (267 bytes) for connection 1876f6699d61049f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.NewTokenFrame{Token: 0xe985abc42b82638aa147ba34f98dcd78f2a957b11ae1155e1ccc33492a4086e2039ec72ba727e329f01a27b7cf7db242075b80810c4ba07daca271be90adc8c592de3c943aa3d5ef1c0ace86b72ddac7bc247248aaa1} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:20 server -> Sending packet 4 (267 bytes) for connection 1876f6699d61049f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.NewTokenFrame{Token: 0xe985abc42b82638aa147ba34f98dcd78f2a957b11ae1155e1ccc33492a4086e2039ec72ba727e329f01a27b7cf7db242075b80810c4ba07daca271be90adc8c592de3c943aa3d5ef1c0ace86b72ddac7bc247248aaa1} 2025/04/30 09:16:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:20 server <- Reading packet 5 (43 bytes) for connection 5b50263d, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: 5b50263d, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 30.112ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server newly acked packets (1): [4] 2025/04/30 09:16:20 server updated RTT: 36.831ms (σ: 8.005ms) 2025/04/30 09:16:20 server ECN capability confirmed. 2025/04/30 09:16:20 server Canceling loss detection timer. 2025/04/30 09:16:20 server <- &wire.PingFrame{} 2025/04/30 09:16:20 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:20 server <- Reading packet 7 (43 bytes) for connection 5b50263d, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: 5b50263d, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 1, AckRanges: {{Largest: 4, Smallest: 3}, {Largest: 1, Smallest: 1}}, DelayTime: 30.112ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server <- &wire.PingFrame{} 2025/04/30 09:16:20 server -> Sending packet 5 (47 bytes) for connection 1876f6699d61049f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 4d3d86a5a138c0363e96ca9e96d711b3, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 7, LowestAcked: 0, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 269.273µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server <- Reading packet 8 (162 bytes) for connection 5b50263d, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: 5b50263d, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 5, DelayTime: 720µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 619596a4e445c3ebe4b07101d424df75, StatelessResetToken: 0x994048034895dd1ce4efe2ff762e2c89} 2025/04/30 09:16:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 7d5e9590499427c01562ba822afb54a8, StatelessResetToken: 0xf2f90b304b3efb8bf54c9db5dd984618} 2025/04/30 09:16:20 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 67bece3aeb2d15b346d35ec307b00e02, StatelessResetToken: 0x3740b1920d34e599d54d850d427410f5} 2025/04/30 09:16:20 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:20 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:20 server -> Sending packet 6 (1366 bytes) for connection 1876f6699d61049f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 619596a4e445c3ebe4b07101d424df75, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 Received request: GET /zrmlevhbvz 2025/04/30 09:16:20 server -> &wire.PingFrame{} 2025/04/30 09:16:20 server -> Sending packet 7 (49 bytes) for connection 1876f6699d61049f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 619596a4e445c3ebe4b07101d424df75, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 0, AckRanges: {{Largest: 8, Smallest: 7}, {Largest: 5, Smallest: 5}, {Largest: 0, Smallest: 0}}, DelayTime: 364.454µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:20 server -> Sending packet 8 (1061 bytes) for connection 1876f6699d61049f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: 619596a4e445c3ebe4b07101d424df75, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:20 server <- Reading packet 9 (43 bytes) for connection 5b50263d, 1-RTT 2025/04/30 09:16:20 server Short Header{DestConnectionID: 5b50263d, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:20 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:20 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:20 Replacing connection for connection IDs [5b50263d c485ac68] with a closed connection. 2025/04/30 09:16:20 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:20 server Connection 1876f6699d61049f closed. 2025/04/30 09:16:20 server <- Reading packet 1 (65 bytes) for connection 194987bd, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: 194987bd, SrcConnectionID: ff0da6e6b898884c3d7ff48c472278b4, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:20 server Dropping Initial keys. 2025/04/30 09:16:20 server <- &wire.PingFrame{} 2025/04/30 09:16:20 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:20 server -> Sending packet 3 (213 bytes) for connection 9cf81dea37aacfaa, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, SrcConnectionID: 194987bd, PacketNumber: 3, PacketNumberLen: 2, Length: 184, Version: v1} 2025/04/30 09:16:20 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 09:16:20 server -> Sending packet 4 (205 bytes) for connection 9cf81dea37aacfaa, Handshake 2025/04/30 09:16:20 server Long Header{Type: Handshake, DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, SrcConnectionID: 194987bd, PacketNumber: 4, PacketNumberLen: 2, Length: 176, Version: v1} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 154, Offset + Data length: 154} 2025/04/30 09:16:20 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 09:16:20 server -> Sending packet 11 (315 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:20 server -> &wire.NewTokenFrame{Token: 0x2fb564c4c2d6511d44b1cc8fc2e7562721d93e05ab7c48bc313be34ccf586ad20554b7fa0b4f047631cf31f3fc4cb6a6976c5ef4320e2bcbcea8d308e2864b5a5161c56c9d042b9aec0934f655ab71ef1f01340895ed} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a33dec00, StatelessResetToken: 0xc2f2e031b27fef560214b297ae05ceca} 2025/04/30 09:16:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:20 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e43ee67, StatelessResetToken: 0x6e7b5076306826ffa6ba777f39f3c4b4} 2025/04/30 09:16:20 server Skipping packet number 10 2025/04/30 09:16:20 server -> Sending packet 12 (1061 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:20 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:20 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:16:21 server <- Reading packet 4 (93 bytes) for connection 194987bd, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: 194987bd, SrcConnectionID: ff0da6e6b898884c3d7ff48c472278b4, PacketNumber: 4, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 795.672ms} 2025/04/30 09:16:21 server newly acked packets (1): [4] 2025/04/30 09:16:21 server updated RTT: 131.769197ms (σ: 65.884598ms) 2025/04/30 09:16:21 server Canceling loss detection timer. 2025/04/30 09:16:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:21 Retiring connection ID 9cf81dea37aacfaa in 5s. 2025/04/30 09:16:21 server Dropping Handshake keys. 2025/04/30 09:16:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:21 server -> Sending packet 2 (315 bytes) for connection 9cf81dea37aacfaa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.NewTokenFrame{Token: 0x0f88adf6c7330de85597cc09d7c5c31647863c5b152b0f7046ce0b8b1813434397e3520886f69efb2efcb451fbd2cbab7f3cec46cb3c78fb6c4f7260113d0c8620ffce72c6256eed433dc9da2678c3a40caf010aad9d} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 25630b00, StatelessResetToken: 0xff24adbb390b9ea1e627f4a002aab7dd} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ae57b4db, StatelessResetToken: 0x6ce092b754683a2bf3db3a132715274e} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:21 server -> Sending packet 3 (315 bytes) for connection 9cf81dea37aacfaa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:21 server -> &wire.NewTokenFrame{Token: 0x0f88adf6c7330de85597cc09d7c5c31647863c5b152b0f7046ce0b8b1813434397e3520886f69efb2efcb451fbd2cbab7f3cec46cb3c78fb6c4f7260113d0c8620ffce72c6256eed433dc9da2678c3a40caf010aad9d} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ae57b4db, StatelessResetToken: 0x6ce092b754683a2bf3db3a132715274e} 2025/04/30 09:16:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 25630b00, StatelessResetToken: 0xff24adbb390b9ea1e627f4a002aab7dd} 2025/04/30 09:16:21 server <- Reading packet 0 (45 bytes) for connection 194987bd, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 194987bd, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:21 server -> Sending packet 4 (44 bytes) for connection 9cf81dea37aacfaa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 98.411715ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:21 Received request: GET /gtomcbhdee 2025/04/30 09:16:21 server -> Sending packet 5 (1061 bytes) for connection 9cf81dea37aacfaa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: ff0da6e6b898884c3d7ff48c472278b4, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:21 server <- Reading packet 3 (43 bytes) for connection 35b0909e, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 35b0909e, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.027856s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server newly acked packets (1): [1] 2025/04/30 09:16:21 server updated RTT: 1.041037s (σ: 394.855ms) 2025/04/30 09:16:21 server ECN capability confirmed. 2025/04/30 09:16:21 server lost packet 0 (time threshold) 2025/04/30 09:16:21 server Canceling loss detection timer. 2025/04/30 09:16:21 server <- &wire.PingFrame{} 2025/04/30 09:16:21 server <- Reading packet 1 (141 bytes) for connection 25630b00, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 25630b00, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 1.12ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 1a137642f8a42e80e9c1601e24346940, StatelessResetToken: 0xc26ec67e43b0e8118fe28dd7420a90a0} 2025/04/30 09:16:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 468b6f5c8ce658c4032abf0daa842805, StatelessResetToken: 0xa7ecffcb27c7e6372b6b3501362ed29e} 2025/04/30 09:16:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: e5417ac9fbeff6e78661d642d5e00905, StatelessResetToken: 0x9f2854e35d7d5d7dfa300dc8d1742229} 2025/04/30 09:16:21 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:21 Retiring connection ID 194987bd in 5s. 2025/04/30 09:16:21 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:21 server -> Sending packet 2 (91 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 194.684µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 0a58a395, StatelessResetToken: 0x1479eab6b86e94467c029caee49ed3db} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 304b83f1, StatelessResetToken: 0x7bd67e2bdfea1968de687545f04a2ff4} 2025/04/30 09:16:21 server <- Reading packet 5 (43 bytes) for connection 35b0909e, 1-RTT 2025/04/30 09:16:21 server -> Sending packet 6 (45 bytes) for connection 9cf81dea37aacfaa, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 1a137642f8a42e80e9c1601e24346940, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 222.078µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:21 server Short Header{DestConnectionID: 35b0909e, PacketNumber: 5, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.027856s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server <- &wire.PingFrame{} 2025/04/30 09:16:21 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:21 server -> Sending packet 3 (45 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 0ed656c9663d3dad8a9f762d8b2895c8, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 261.947µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server <- Reading packet 2 (43 bytes) for connection 25630b00, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 25630b00, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:21 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:21 Replacing connection for connection IDs [ae57b4db 25630b00] with a closed connection. 2025/04/30 09:16:21 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:21 server Connection 9cf81dea37aacfaa closed. 2025/04/30 09:16:21 server <- Reading packet 6 (164 bytes) for connection 0a58a395, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 0a58a395, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 1, DelayTime: 792µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server newly acked packets (1): [2] 2025/04/30 09:16:21 server updated RTT: 914.968ms (σ: 548.277ms) 2025/04/30 09:16:21 server Canceling loss detection timer. 2025/04/30 09:16:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: c8e652b638da3e065c560a7548afe35f, StatelessResetToken: 0xd6204da0ec0d02953ac4274515ce53ba} 2025/04/30 09:16:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 01c30ee967a6700520eeec9b833b0df6, StatelessResetToken: 0x5018f83b2ce8b0a8d643a4ccd619fdd7} 2025/04/30 09:16:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 8f9534faee958426417166bb5e090c9a, StatelessResetToken: 0xd631a4b98606d361e60253f304c9e196} 2025/04/30 09:16:21 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:21 Retiring connection ID 35b0909e in 5s. 2025/04/30 09:16:21 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:21 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:21 server Ignoring all packets below 4. 2025/04/30 09:16:21 server -> Sending packet 4 (45 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 Received request: GET /veurelcjiy 2025/04/30 09:16:21 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 222.747µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:21 server -> Sending packet 5 (1061 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:21 server <- Reading packet 7 (43 bytes) for connection 0a58a395, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 0a58a395, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 528µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server newly acked packets (1): [5] 2025/04/30 09:16:21 server updated RTT: 804.716ms (σ: 631.709ms) 2025/04/30 09:16:21 server setting loss timer for packet 4 (1-RTT) to 905.3055ms (in 2025-04-30 09:16:22.025773122 +0000 UTC m=+5.542066760) 2025/04/30 09:16:21 server -> Sending packet 6 (38 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:21 server <- Reading packet 9 (43 bytes) for connection 0a58a395, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 0a58a395, PacketNumber: 9, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 77.008ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server <- &wire.PingFrame{} 2025/04/30 09:16:21 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:21 server -> Sending packet 7 (45 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 9, LowestAcked: 5, AckRanges: {{Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}}, DelayTime: 189.915µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server <- Reading packet 13 (43 bytes) for connection 0a58a395, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 0a58a395, PacketNumber: 13, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 295.68ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server <- &wire.PingFrame{} 2025/04/30 09:16:21 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:21 server <- Reading packet 15 (43 bytes) for connection 0a58a395, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 0a58a395, PacketNumber: 15, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 5, LowestAcked: 2, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 2}}, DelayTime: 295.68ms, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server <- &wire.PingFrame{} 2025/04/30 09:16:21 server -> Sending packet 8 (49 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 15, LowestAcked: 5, AckRanges: {{Largest: 15, Smallest: 15}, {Largest: 13, Smallest: 13}, {Largest: 9, Smallest: 9}, {Largest: 7, Smallest: 5}}, DelayTime: 223.497µs, ECT0: 5, ECT1: 0, CE: 1} 2025/04/30 09:16:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 09:16:21 server -> Sending packet 14 (37 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:21 server Skipping packet number 13 2025/04/30 09:16:21 server -> Sending packet 15 (1061 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:21 server <- Reading packet 6 (1200 bytes) for connection 4a1c0c3379e98815, Initial 2025/04/30 09:16:21 server Long Header{Type: Initial, DestConnectionID: 4a1c0c3379e98815, SrcConnectionID: fe30ec8d3a24995ed1396c507a099c13, Token: (empty), PacketNumber: 6, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:21 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:21 server -> Sending packet 1 (206 bytes) for connection 4a1c0c3379e98815, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, PacketNumber: 1, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 09:16:21 server -> Sending packet 2 (206 bytes) for connection 4a1c0c3379e98815, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, PacketNumber: 2, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 09:16:21 server -> Sending packet 3 (58 bytes) for connection 4a1c0c3379e98815, Initial 2025/04/30 09:16:21 server Long Header{Type: Initial, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 2, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 09:16:21 server -> Sending packet 4 (1280 bytes) for connection 4a1c0c3379e98815, Initial 2025/04/30 09:16:21 server Long Header{Type: Initial, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:21 server -> Sending packet 5 (1280 bytes) for connection 4a1c0c3379e98815, Initial 2025/04/30 09:16:21 server Long Header{Type: Initial, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 129, Offset + Data length: 129} 2025/04/30 09:16:21 server <- Reading packet 8 (1200 bytes) for connection 4a1c0c3379e98815, Initial 2025/04/30 09:16:21 server Long Header{Type: Initial, DestConnectionID: 4a1c0c3379e98815, SrcConnectionID: fe30ec8d3a24995ed1396c507a099c13, Token: (empty), PacketNumber: 8, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:16:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 447, Offset + Data length: 447} 2025/04/30 09:16:21 server -> Sending packet 6 (60 bytes) for connection 4a1c0c3379e98815, Initial 2025/04/30 09:16:21 server Long Header{Type: Initial, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 8, LowestAcked: 2, AckRanges: {{Largest: 8, Smallest: 8}, {Largest: 6, Smallest: 6}, {Largest: 2, Smallest: 2}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server <- Reading packet 3 (65 bytes) for connection 59dfeafd, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: 59dfeafd, SrcConnectionID: 7a507057a45e6f516ae4a074827a97d9, PacketNumber: 3, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:21 server Dropping Initial keys. 2025/04/30 09:16:21 server <- &wire.PingFrame{} 2025/04/30 09:16:21 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:21 server -> Sending packet 1 (215 bytes) for connection 46b82446eb13089f, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: 7a507057a45e6f516ae4a074827a97d9, SrcConnectionID: 59dfeafd, PacketNumber: 1, PacketNumberLen: 2, Length: 186, Version: v1} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 09:16:21 server -> Sending packet 2 (207 bytes) for connection 46b82446eb13089f, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: 7a507057a45e6f516ae4a074827a97d9, SrcConnectionID: 59dfeafd, PacketNumber: 2, PacketNumberLen: 2, Length: 178, Version: v1} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 156, Offset + Data length: 156} 2025/04/30 09:16:21 server <- Reading packet 5 (65 bytes) for connection 59dfeafd, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: 59dfeafd, SrcConnectionID: 7a507057a45e6f516ae4a074827a97d9, PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:21 server <- &wire.PingFrame{} 2025/04/30 09:16:21 server -> Sending packet 3 (57 bytes) for connection 46b82446eb13089f, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: 7a507057a45e6f516ae4a074827a97d9, SrcConnectionID: 59dfeafd, PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server <- Reading packet 6 (93 bytes) for connection 0f89496a, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: 0f89496a, SrcConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 6, PacketNumberLen: 1, Length: 64, Version: v1} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 12.802912s} 2025/04/30 09:16:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:21 server <- Reading packet 6 (91 bytes) for connection 59dfeafd, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: 59dfeafd, SrcConnectionID: 7a507057a45e6f516ae4a074827a97d9, PacketNumber: 6, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 3, LowestAcked: 2, DelayTime: 11.728ms} 2025/04/30 09:16:21 server newly acked packets (1): [2] 2025/04/30 09:16:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:21 server Canceling loss detection timer. 2025/04/30 09:16:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:21 Retiring connection ID 3ec7174f5efdb35f in 5s. 2025/04/30 09:16:21 server Dropping Handshake keys. 2025/04/30 09:16:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:21 Retiring connection ID 46b82446eb13089f in 5s. 2025/04/30 09:16:21 server Dropping Handshake keys. 2025/04/30 09:16:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:21 server -> Sending packet 2 (315 bytes) for connection 3ec7174f5efdb35f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:21 server -> &wire.NewTokenFrame{Token: 0xc02eeb205f1ddf12ad0356f1c2433dd3f747193a26b41f642cc230f76b25cbf2c83cfdd13e71fa9c0877cbddfdc3d3247d429b2c8ee6ba3217d898a61944ea383e01b49567399119d24de2460321774297ee8e86a412} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7fe99c6b, StatelessResetToken: 0x874d33d0d447855fa434473913eb7eab} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 23442af2, StatelessResetToken: 0xf58fd6dd8872f1494d949b31bb5aa87b} 2025/04/30 09:16:21 server -> Sending packet 3 (315 bytes) for connection 3ec7174f5efdb35f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7fe99c6b, StatelessResetToken: 0x874d33d0d447855fa434473913eb7eab} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 23442af2, StatelessResetToken: 0xf58fd6dd8872f1494d949b31bb5aa87b} 2025/04/30 09:16:21 server -> &wire.NewTokenFrame{Token: 0xc02eeb205f1ddf12ad0356f1c2433dd3f747193a26b41f642cc230f76b25cbf2c83cfdd13e71fa9c0877cbddfdc3d3247d429b2c8ee6ba3217d898a61944ea383e01b49567399119d24de2460321774297ee8e86a412} 2025/04/30 09:16:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:21 server <- Reading packet 0 (45 bytes) for connection 0f89496a, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 0f89496a, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:21 server -> Sending packet 2 (315 bytes) for connection 46b82446eb13089f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 7a507057a45e6f516ae4a074827a97d9, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:21 server -> &wire.NewTokenFrame{Token: 0x65f1da5f0f93e75a50f520a12bc493ce297dcf790d87dac9188da47a353ffa9c0477937d1934ba80be718c98195a771a4b228fe688b5dafa3ba3b9416db5e6097ef7818f9384352fa96c195171023629e917c59193f5} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3614cd79, StatelessResetToken: 0x497673ae9e6be6c18cc82833cbfe134e} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5d8231df, StatelessResetToken: 0x9228887b3a1bade4cd07b850697fe8ad} 2025/04/30 09:16:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:21 server -> Sending packet 3 (315 bytes) for connection 46b82446eb13089f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 7a507057a45e6f516ae4a074827a97d9, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:21 server Dropping %!s(logging.PacketType=1) packet (93 bytes) because we already dropped the keys. 2025/04/30 09:16:21 server -> Sending packet 4 (46 bytes) for connection 3ec7174f5efdb35f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.001147655s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:21 Received request: GET /ybnqmddhdd 2025/04/30 09:16:21 server -> &wire.NewTokenFrame{Token: 0x65f1da5f0f93e75a50f520a12bc493ce297dcf790d87dac9188da47a353ffa9c0477937d1934ba80be718c98195a771a4b228fe688b5dafa3ba3b9416db5e6097ef7818f9384352fa96c195171023629e917c59193f5} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5d8231df, StatelessResetToken: 0x9228887b3a1bade4cd07b850697fe8ad} 2025/04/30 09:16:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 3614cd79, StatelessResetToken: 0x497673ae9e6be6c18cc82833cbfe134e} 2025/04/30 09:16:21 server <- Reading packet 0 (45 bytes) for connection 59dfeafd, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 59dfeafd, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:21 server -> Sending packet 5 (1061 bytes) for connection 3ec7174f5efdb35f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:21 server -> Sending packet 4 (43 bytes) for connection 46b82446eb13089f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 7a507057a45e6f516ae4a074827a97d9, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 367.436µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:21 Received request: GET /dagxqbuwol 2025/04/30 09:16:21 server -> Sending packet 5 (1061 bytes) for connection 46b82446eb13089f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 7a507057a45e6f516ae4a074827a97d9, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:21 server <- Reading packet 1 (65 bytes) for connection 6a5b3aa3, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: 6a5b3aa3, SrcConnectionID: fe30ec8d3a24995ed1396c507a099c13, PacketNumber: 1, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:21 server Dropping Initial keys. 2025/04/30 09:16:21 server <- &wire.PingFrame{} 2025/04/30 09:16:21 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:21 server -> Sending packet 3 (214 bytes) for connection 4a1c0c3379e98815, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, PacketNumber: 3, PacketNumberLen: 2, Length: 185, Version: v1} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 09:16:21 server -> Sending packet 4 (206 bytes) for connection 4a1c0c3379e98815, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, PacketNumber: 4, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 09:16:21 server <- Reading packet 1 (141 bytes) for connection 5d8231df, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 5d8231df, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 3, DelayTime: 1.824ms, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server newly acked packets (1): [3] 2025/04/30 09:16:21 server ECN capability confirmed. 2025/04/30 09:16:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 559b3c21ae2b6e0f7f4ee6084e02ebd8, StatelessResetToken: 0xf92c3c89025501f31bdc1da52f9c210c} 2025/04/30 09:16:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 6187049eeaa952c30be1777e364e3cf7, StatelessResetToken: 0xb0df3d0cc6757e96dc876005797ae416} 2025/04/30 09:16:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: ba239ca4f17c1a77e1c756de3577dc8f, StatelessResetToken: 0xc559531c251213cc6d6b6de7484e8c94} 2025/04/30 09:16:21 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:21 Retiring connection ID 59dfeafd in 5s. 2025/04/30 09:16:21 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:21 server -> Sending packet 6 (45 bytes) for connection 46b82446eb13089f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: 559b3c21ae2b6e0f7f4ee6084e02ebd8, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 226.354µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:21 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:21 server <- Reading packet 2 (43 bytes) for connection 5d8231df, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 5d8231df, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:21 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:21 Replacing connection for connection IDs [5d8231df 3614cd79] with a closed connection. 2025/04/30 09:16:21 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:21 server Connection 46b82446eb13089f closed. 2025/04/30 09:16:21 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:21 server -> Sending packet 5 (206 bytes) for connection 4a1c0c3379e98815, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, PacketNumber: 5, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 09:16:21 server -> Sending packet 6 (206 bytes) for connection 4a1c0c3379e98815, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, SrcConnectionID: 6a5b3aa3, PacketNumber: 6, PacketNumberLen: 2, Length: 177, Version: v1} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 155, Offset + Data length: 155} 2025/04/30 09:16:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 09:16:21 server -> Sending packet 14 (315 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a33dec00, StatelessResetToken: 0xc2f2e031b27fef560214b297ae05ceca} 2025/04/30 09:16:21 server -> &wire.NewTokenFrame{Token: 0x2fb564c4c2d6511d44b1cc8fc2e7562721d93e05ab7c48bc313be34ccf586ad20554b7fa0b4f047631cf31f3fc4cb6a6976c5ef4320e2bcbcea8d308e2864b5a5161c56c9d042b9aec0934f655ab71ef1f01340895ed} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e43ee67, StatelessResetToken: 0x6e7b5076306826ffa6ba777f39f3c4b4} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:21 server Skipping packet number 13 2025/04/30 09:16:21 server -> Sending packet 15 (1061 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:21 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:21 server <- Reading packet 2 (91 bytes) for connection 6a5b3aa3, Handshake 2025/04/30 09:16:21 server Long Header{Type: Handshake, DestConnectionID: 6a5b3aa3, SrcConnectionID: fe30ec8d3a24995ed1396c507a099c13, PacketNumber: 2, PacketNumberLen: 1, Length: 62, Version: v1} 2025/04/30 09:16:21 server <- &wire.AckFrame{LargestAcked: 6, LowestAcked: 5, DelayTime: 8.568ms} 2025/04/30 09:16:21 server newly acked packets (1): [6] 2025/04/30 09:16:21 server updated RTT: 32.886953ms (σ: 16.443476ms) 2025/04/30 09:16:21 server Canceling loss detection timer. 2025/04/30 09:16:21 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:21 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:21 Retiring connection ID 4a1c0c3379e98815 in 5s. 2025/04/30 09:16:21 server Dropping Handshake keys. 2025/04/30 09:16:21 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:21 server -> Sending packet 2 (315 bytes) for connection 4a1c0c3379e98815, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 68414229, StatelessResetToken: 0xe6ac7d14246b17e94a2e0dcc874be8bd} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:21 server -> &wire.NewTokenFrame{Token: 0xa54502c10f39a54ed98849df941101b54e0fcb812d664d465a54c4b4de13c9195a829dee258554cb94ae576d70071feaa94845a8d490fd0fb31688321e32cb1206e8fe79bdc81c38623d432fe311bebeafa270525d1d} 2025/04/30 09:16:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8714e323, StatelessResetToken: 0x1d63e5806dadb8d7be88957bfaefa5d3} 2025/04/30 09:16:21 server -> Sending packet 3 (315 bytes) for connection 4a1c0c3379e98815, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 68414229, StatelessResetToken: 0xe6ac7d14246b17e94a2e0dcc874be8bd} 2025/04/30 09:16:21 server -> &wire.NewTokenFrame{Token: 0xa54502c10f39a54ed98849df941101b54e0fcb812d664d465a54c4b4de13c9195a829dee258554cb94ae576d70071feaa94845a8d490fd0fb31688321e32cb1206e8fe79bdc81c38623d432fe311bebeafa270525d1d} 2025/04/30 09:16:21 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:21 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 8714e323, StatelessResetToken: 0x1d63e5806dadb8d7be88957bfaefa5d3} 2025/04/30 09:16:21 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:21 server <- Reading packet 0 (45 bytes) for connection 6a5b3aa3, 1-RTT 2025/04/30 09:16:21 server Short Header{DestConnectionID: 6a5b3aa3, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:21 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:21 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:21 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:21 server -> Sending packet 4 (43 bytes) for connection 4a1c0c3379e98815, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 101.419µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:21 Received request: GET /dhivedugvv 2025/04/30 09:16:21 server -> Sending packet 5 (1061 bytes) for connection 4a1c0c3379e98815, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:21 server Short Header{DestConnectionID: fe30ec8d3a24995ed1396c507a099c13, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:21 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:22 server <- Reading packet 1 (141 bytes) for connection 68414229, 1-RTT 2025/04/30 09:16:22 server Short Header{DestConnectionID: 68414229, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:22 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 1.248ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:22 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: b378d2e0b2b55b1c5c1fcb6956a2f74e, StatelessResetToken: 0x716e091f752a61914f2e9fc46795c44e} 2025/04/30 09:16:22 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 292080d18fdd202b182256ac4ccf56d7, StatelessResetToken: 0x9412f15f95e802349dfddb13f3e817ec} 2025/04/30 09:16:22 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 1fa82c850339047a93487cfc1da8e960, StatelessResetToken: 0x4559696840e9b92335a0bb93b9f7443c} 2025/04/30 09:16:22 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:22 Retiring connection ID 6a5b3aa3 in 5s. 2025/04/30 09:16:22 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:22 server -> Sending packet 6 (45 bytes) for connection 4a1c0c3379e98815, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: b378d2e0b2b55b1c5c1fcb6956a2f74e, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 191.448µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:22 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:22 server Loss detection alarm fired in loss timer mode. Loss time: 2025-04-30 09:16:22.025773122 +0000 UTC m=+5.542066760 2025/04/30 09:16:22 server lost packet 4 (time threshold) 2025/04/30 09:16:22 server -> Sending packet 9 (37 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:22 server <- Reading packet 2 (43 bytes) for connection 68414229, 1-RTT 2025/04/30 09:16:22 server Short Header{DestConnectionID: 68414229, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:22 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 26.224ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:22 server newly acked packets (1): [3] 2025/04/30 09:16:22 server ECN capability confirmed. 2025/04/30 09:16:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:22 server -> Sending packet 7 (315 bytes) for connection 3ec7174f5efdb35f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.NewTokenFrame{Token: 0xc02eeb205f1ddf12ad0356f1c2433dd3f747193a26b41f642cc230f76b25cbf2c83cfdd13e71fa9c0877cbddfdc3d3247d429b2c8ee6ba3217d898a61944ea383e01b49567399119d24de2460321774297ee8e86a412} 2025/04/30 09:16:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 23442af2, StatelessResetToken: 0xf58fd6dd8872f1494d949b31bb5aa87b} 2025/04/30 09:16:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7fe99c6b, StatelessResetToken: 0x874d33d0d447855fa434473913eb7eab} 2025/04/30 09:16:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:22 server Skipping packet number 6 2025/04/30 09:16:22 server -> Sending packet 8 (1061 bytes) for connection 3ec7174f5efdb35f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:22 server -> Sending packet 9 (1366 bytes) for connection 3ec7174f5efdb35f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.PingFrame{} 2025/04/30 09:16:22 server <- Reading packet 4 (43 bytes) for connection 68414229, 1-RTT 2025/04/30 09:16:22 server Short Header{DestConnectionID: 68414229, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:22 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 110.768ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:22 server <- &wire.PingFrame{} 2025/04/30 09:16:22 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:22 server -> Sending packet 7 (45 bytes) for connection 4a1c0c3379e98815, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: b378d2e0b2b55b1c5c1fcb6956a2f74e, PacketNumber: 7, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 98.594µs, ECT0: 4, ECT1: 0, CE: 0} 2025/04/30 09:16:22 server <- Reading packet 6 (43 bytes) for connection 68414229, 1-RTT 2025/04/30 09:16:22 server Short Header{DestConnectionID: 68414229, PacketNumber: 6, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:22 server <- &wire.AckFrame{LargestAcked: 4, LowestAcked: 2, DelayTime: 110.768ms, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:16:22 server <- &wire.PingFrame{} 2025/04/30 09:16:22 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:16:22 server -> Sending packet 8 (47 bytes) for connection 4a1c0c3379e98815, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: b378d2e0b2b55b1c5c1fcb6956a2f74e, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.AckFrame{LargestAcked: 6, LowestAcked: 0, AckRanges: {{Largest: 6, Smallest: 6}, {Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 0}}, DelayTime: 177.421µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:22 server <- Reading packet 3 (65 bytes) for connection 0f2152c0, Handshake 2025/04/30 09:16:22 server Long Header{Type: Handshake, DestConnectionID: 0f2152c0, SrcConnectionID: 17ed45836d6e86ebddf1790d33cbc021, PacketNumber: 3, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:22 server Dropping Initial keys. 2025/04/30 09:16:22 server <- &wire.PingFrame{} 2025/04/30 09:16:22 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 1 2025/04/30 09:16:22 server -> Sending packet 1 (219 bytes) for connection aedf12c1ef87937a, Handshake 2025/04/30 09:16:22 server Long Header{Type: Handshake, DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, SrcConnectionID: 0f2152c0, PacketNumber: 1, PacketNumberLen: 2, Length: 190, Version: v1} 2025/04/30 09:16:22 server -> &wire.AckFrame{LargestAcked: 3, LowestAcked: 3, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:16:22 server -> Sending packet 2 (211 bytes) for connection aedf12c1ef87937a, Handshake 2025/04/30 09:16:22 server Long Header{Type: Handshake, DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, SrcConnectionID: 0f2152c0, PacketNumber: 2, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:16:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:16:22 server <- Reading packet 5 (65 bytes) for connection 0f2152c0, Handshake 2025/04/30 09:16:22 server Long Header{Type: Handshake, DestConnectionID: 0f2152c0, SrcConnectionID: 17ed45836d6e86ebddf1790d33cbc021, PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:22 server <- &wire.PingFrame{} 2025/04/30 09:16:22 server -> Sending packet 3 (57 bytes) for connection aedf12c1ef87937a, Handshake 2025/04/30 09:16:22 server Long Header{Type: Handshake, DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, SrcConnectionID: 0f2152c0, PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:16:22 server -> &wire.AckFrame{LargestAcked: 5, LowestAcked: 3, AckRanges: {{Largest: 5, Smallest: 5}, {Largest: 3, Smallest: 3}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:16:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:22 server -> Sending packet 10 (1061 bytes) for connection 4a1c0c3379e98815, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: b378d2e0b2b55b1c5c1fcb6956a2f74e, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:22 server Skipping packet number 9 2025/04/30 09:16:22 server -> Sending packet 11 (37 bytes) for connection 4a1c0c3379e98815, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: b378d2e0b2b55b1c5c1fcb6956a2f74e, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:22 server <- Reading packet 7 (43 bytes) for connection 68414229, 1-RTT 2025/04/30 09:16:22 server Short Header{DestConnectionID: 68414229, PacketNumber: 7, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:22 server <- &wire.AckFrame{LargestAcked: 10, LowestAcked: 8, AckRanges: {{Largest: 10, Smallest: 10}, {Largest: 8, Smallest: 8}}, DelayTime: 304µs, ECT0: 5, ECT1: 0, CE: 0} 2025/04/30 09:16:22 server newly acked packets (1): [10] 2025/04/30 09:16:22 server updated RTT: 32.874ms (σ: 12.355ms) 2025/04/30 09:16:22 server -> Sending packet 12 (1366 bytes) for connection 4a1c0c3379e98815, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: b378d2e0b2b55b1c5c1fcb6956a2f74e, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.PingFrame{} 2025/04/30 09:16:22 server -> Sending packet 13 (38 bytes) for connection 4a1c0c3379e98815, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: b378d2e0b2b55b1c5c1fcb6956a2f74e, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:22 server <- Reading packet 8 (43 bytes) for connection 68414229, 1-RTT 2025/04/30 09:16:22 server Short Header{DestConnectionID: 68414229, PacketNumber: 8, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:22 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:22 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:22 Replacing connection for connection IDs [68414229 8714e323] with a closed connection. 2025/04/30 09:16:22 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:22 server Connection 4a1c0c3379e98815 closed. 2025/04/30 09:16:22 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:16:22 server -> Sending packet 4 (211 bytes) for connection aedf12c1ef87937a, Handshake 2025/04/30 09:16:22 server Long Header{Type: Handshake, DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, SrcConnectionID: 0f2152c0, PacketNumber: 4, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:16:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:16:22 server -> Sending packet 5 (211 bytes) for connection aedf12c1ef87937a, Handshake 2025/04/30 09:16:22 server Long Header{Type: Handshake, DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, SrcConnectionID: 0f2152c0, PacketNumber: 5, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:16:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:16:22 server Queueing packet (45 bytes) for later decryption 2025/04/30 09:16:22 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 3 2025/04/30 09:16:22 server -> Sending packet 6 (211 bytes) for connection aedf12c1ef87937a, Handshake 2025/04/30 09:16:22 server Long Header{Type: Handshake, DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, SrcConnectionID: 0f2152c0, PacketNumber: 6, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:16:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:16:22 server -> Sending packet 7 (211 bytes) for connection aedf12c1ef87937a, Handshake 2025/04/30 09:16:22 server Long Header{Type: Handshake, DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, SrcConnectionID: 0f2152c0, PacketNumber: 7, PacketNumberLen: 2, Length: 182, Version: v1} 2025/04/30 09:16:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 160, Offset + Data length: 160} 2025/04/30 09:16:22 server <- Reading packet 7 (65 bytes) for connection 0f2152c0, Handshake 2025/04/30 09:16:22 server Long Header{Type: Handshake, DestConnectionID: 0f2152c0, SrcConnectionID: 17ed45836d6e86ebddf1790d33cbc021, PacketNumber: 7, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:16:22 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 2.712ms} 2025/04/30 09:16:22 server newly acked packets (1): [7] 2025/04/30 09:16:22 server updated RTT: 32.575369ms (σ: 16.287684ms) 2025/04/30 09:16:22 server Canceling loss detection timer. 2025/04/30 09:16:22 Tracking 200 connection IDs and 4 reset tokens. 2025/04/30 09:16:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 09:16:22 server -> Sending packet 12 (1061 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:22 server -> Sending packet 13 (1061 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:22 server Destroying connection: timeout: no recent network activity 2025/04/30 09:16:22 Error accepting stream: timeout: no recent network activity 2025/04/30 09:16:22 Removing connection ID 919019bc6114c87d. 2025/04/30 09:16:22 Removing connection ID 912de6d9. 2025/04/30 09:16:22 Removing connection ID b32df9f2. 2025/04/30 09:16:22 Removing connection ID 91dbc8e3. 2025/04/30 09:16:22 server Connection 919019bc6114c87d closed. 2025/04/30 09:16:22 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 09:16:22 server -> Sending packet 11 (315 bytes) for connection 3ec7174f5efdb35f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.NewTokenFrame{Token: 0xc02eeb205f1ddf12ad0356f1c2433dd3f747193a26b41f642cc230f76b25cbf2c83cfdd13e71fa9c0877cbddfdc3d3247d429b2c8ee6ba3217d898a61944ea383e01b49567399119d24de2460321774297ee8e86a412} 2025/04/30 09:16:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7fe99c6b, StatelessResetToken: 0x874d33d0d447855fa434473913eb7eab} 2025/04/30 09:16:22 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 23442af2, StatelessResetToken: 0xf58fd6dd8872f1494d949b31bb5aa87b} 2025/04/30 09:16:22 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:22 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:22 server Skipping packet number 10 2025/04/30 09:16:22 server -> Sending packet 12 (1061 bytes) for connection 3ec7174f5efdb35f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:22 server Short Header{DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:22 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:22 Removing connection ID 57ab678ef976cdb7 after it has been retired. 2025/04/30 09:16:22 Removing connection ID a1bffb21 after it has been retired. 2025/04/30 09:16:22 Removing connection ID ca0a5eb4fbaf3c71 after it has been retired. 2025/04/30 09:16:22 Removing connection ID 3426baee after it has been retired. 2025/04/30 09:16:22 Removing connection ID 5c2c656f0265f3b8 after it has been retired. 2025/04/30 09:16:22 Removing connection ID a79af2a0 after it has been retired. 2025/04/30 09:16:22 Removing connection ID 239b72c345ee7832 after it has been retired. 2025/04/30 09:16:22 Removing connection ID 3f71ac0c after it has been retired. 2025/04/30 09:16:22 Removing connection ID d52a7d49a0992d4d after it has been retired. 2025/04/30 09:16:22 Removing connection ID ec9e41ea after it has been retired. 2025/04/30 09:16:22 Removing connection IDs [022f8f0f 161ce9f6] for a closed connection after it has been retired. 2025/04/30 09:16:22 Removing connection ID b00ef77e7156cbda after it has been retired. 2025/04/30 09:16:22 Removing connection IDs [6ee5af31 bd25437c] for a closed connection after it has been retired. 2025/04/30 09:16:22 Removing connection ID 09785eac after it has been retired. 2025/04/30 09:16:22 Removing connection ID a8a82c7728e52f1b after it has been retired. 2025/04/30 09:16:22 Removing connection IDs [c181b447 86c4423e] for a closed connection after it has been retired. 2025/04/30 09:16:22 Removing connection ID cbb379ff after it has been retired. 2025/04/30 09:16:22 Removing connection IDs [9ee3bc63 b63e6bc6] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection ID 361b43c33ab9281b after it has been retired. 2025/04/30 09:16:23 Removing connection ID 2ea59512a7c0eb2d after it has been retired. 2025/04/30 09:16:23 Removing connection ID 0c3276f8d7457497 after it has been retired. 2025/04/30 09:16:23 Removing connection ID ca377306 after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [536565e6 ea489489] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [a03ca1e0 d7e157b3] for a closed connection after it has been retired. 2025/04/30 09:16:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 09:16:23 server -> Sending packet 13 (37 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:23 Removing connection ID 47da095ad5cddb1a after it has been retired. 2025/04/30 09:16:23 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:23 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:23 server Skipping packet number 12 2025/04/30 09:16:23 server -> Sending packet 14 (1061 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:23 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:23 Removing connection ID 16f03cc6e5b26eef after it has been retired. 2025/04/30 09:16:23 Removing connection ID d429a4c1 after it has been retired. 2025/04/30 09:16:23 Removing connection ID 59df3dabf2d2cfc3 after it has been retired. 2025/04/30 09:16:23 Removing connection ID 83383ad88193b5ea after it has been retired. 2025/04/30 09:16:23 Removing connection ID 3b59850fbfc10840 after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [28aba658 18389604] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection ID d75f080c after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [ec2a3824 464d7906] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection ID d9a533bb after it has been retired. 2025/04/30 09:16:23 Removing connection ID 2314a335e78e3f50 after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [b08817b7 852d49d6] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection ID 4aa98a3cac3831e2 after it has been retired. 2025/04/30 09:16:23 Removing connection ID afea0bf6 after it has been retired. 2025/04/30 09:16:23 Removing connection ID e5d7a671 after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [ef03a9ed d31cd7f3] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [0c448182 ccfe9bf4] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection ID b2a32056 after it has been retired. 2025/04/30 09:16:23 Removing connection ID bdb82ed28ef934eb after it has been retired. 2025/04/30 09:16:23 Removing connection ID 7e77de277db38b13 after it has been retired. 2025/04/30 09:16:23 Removing connection ID d9ef85fb after it has been retired. 2025/04/30 09:16:23 Removing connection ID d08a1bb7 after it has been retired. 2025/04/30 09:16:23 Removing connection ID 2042160d39233ae2 after it has been retired. 2025/04/30 09:16:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 09:16:23 server -> Sending packet 14 (315 bytes) for connection 3ec7174f5efdb35f, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:23 server Short Header{DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 14, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:23 server -> &wire.NewTokenFrame{Token: 0xc02eeb205f1ddf12ad0356f1c2433dd3f747193a26b41f642cc230f76b25cbf2c83cfdd13e71fa9c0877cbddfdc3d3247d429b2c8ee6ba3217d898a61944ea383e01b49567399119d24de2460321774297ee8e86a412} 2025/04/30 09:16:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 7fe99c6b, StatelessResetToken: 0x874d33d0d447855fa434473913eb7eab} 2025/04/30 09:16:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 23442af2, StatelessResetToken: 0xf58fd6dd8872f1494d949b31bb5aa87b} 2025/04/30 09:16:23 server Skipping packet number 13 2025/04/30 09:16:23 server -> Sending packet 15 (1061 bytes) for connection 3ec7174f5efdb35f, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:23 server Short Header{DestConnectionID: 97dcf4a2eada4d67dde71470a189e746, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:23 Removing connection ID 5a613032 after it has been retired. 2025/04/30 09:16:23 Removing connection ID 8a32fede7efbd0af after it has been retired. 2025/04/30 09:16:23 Removing connection ID 73b8fc7e after it has been retired. 2025/04/30 09:16:23 Removing connection ID 988c637e89230fbb after it has been retired. 2025/04/30 09:16:23 Removing connection ID 127b0cf1 after it has been retired. 2025/04/30 09:16:23 Removing connection ID 431ec75933692438 after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [e792b4cd e0b0f4de] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [0f422bf2 6269ac2a ea7b5a83] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection ID 5f08893e5cb7fdf3 after it has been retired. 2025/04/30 09:16:23 Removing connection ID 137493c9da2f9617 after it has been retired. 2025/04/30 09:16:23 Removing connection ID fe9d7b6e after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [d3d1a46b 493823b8] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection ID 1b97988f after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [e5ce62dc a27661c0] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [972f42a5 f6a4bce0] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection ID 7d0530c8 after it has been retired. 2025/04/30 09:16:23 Removing connection ID 014e4c4a2551465e after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [cbbcfd6c e6f1a773] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection ID 93e680d2 after it has been retired. 2025/04/30 09:16:23 Removing connection ID 1ddd4b88ec3a6a47 after it has been retired. 2025/04/30 09:16:23 Removing connection ID 4a78d3ca after it has been retired. 2025/04/30 09:16:23 Removing connection ID 2cb96ffa81389a50 after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [6620dc9b 44727a38 eb08d516] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection ID c5b7ab7260106ffc after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [6f922994 6b11bd31 5acf5010] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection ID 945f23e1 after it has been retired. 2025/04/30 09:16:23 Removing connection ID ab07d183 after it has been retired. 2025/04/30 09:16:23 Removing connection ID 58bef5b3cf0c542b after it has been retired. 2025/04/30 09:16:23 Removing connection IDs [eb51bc7e 9c5cac1b] for a closed connection after it has been retired. 2025/04/30 09:16:23 Removing connection ID d2d4f6e175286d27 after it has been retired. 2025/04/30 09:16:23 Removing connection ID 6a570dbf after it has been retired. 2025/04/30 09:16:23 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 09:16:23 server -> Sending packet 17 (315 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:23 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:23 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:23 server -> &wire.NewTokenFrame{Token: 0x2fb564c4c2d6511d44b1cc8fc2e7562721d93e05ab7c48bc313be34ccf586ad20554b7fa0b4f047631cf31f3fc4cb6a6976c5ef4320e2bcbcea8d308e2864b5a5161c56c9d042b9aec0934f655ab71ef1f01340895ed} 2025/04/30 09:16:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a33dec00, StatelessResetToken: 0xc2f2e031b27fef560214b297ae05ceca} 2025/04/30 09:16:23 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e43ee67, StatelessResetToken: 0x6e7b5076306826ffa6ba777f39f3c4b4} 2025/04/30 09:16:23 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:23 server Skipping packet number 16 2025/04/30 09:16:23 server -> Sending packet 18 (1061 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:23 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:23 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:24 Removing connection IDs [3abce2d5 8ae8280d] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [e3f1aa62 d1afec0a] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection ID b83f6a0205a40a6e after it has been retired. 2025/04/30 09:16:24 Removing connection ID f795f1c967e84efe after it has been retired. 2025/04/30 09:16:24 Removing connection ID 27a07e73 after it has been retired. 2025/04/30 09:16:24 Removing connection ID 6c8597d5 after it has been retired. 2025/04/30 09:16:24 Removing connection ID 7c31deeda1d39e4b after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [5a1cd8be 6a9f19a4] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection ID 51048799 after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [ef7f3645 d6fb60be] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [e2b01c13 114c4367] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [d8c65de1 06fcd54a] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection ID d4036efe after it has been retired. 2025/04/30 09:16:24 Removing connection ID 22f63df3968fc5c7 after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [0408fc7f 09df6d68] for a closed connection after it has been retired. 2025/04/30 09:16:24 server <- Reading packet 2 (43 bytes) for connection 7fe99c6b, 1-RTT 2025/04/30 09:16:24 server Short Header{DestConnectionID: 7fe99c6b, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:24 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:24 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:24 Replacing connection for connection IDs [0f89496a 23442af2 7fe99c6b] with a closed connection. 2025/04/30 09:16:24 server Connection 3ec7174f5efdb35f closed. 2025/04/30 09:16:24 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:24 Removing connection IDs [b4602a63 df11895e f00f35f3] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [3cd7eebe 225dae09] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [276675ad 29c277fa] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [a063cdd8 60737bfd] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection ID 7cec7afe after it has been retired. 2025/04/30 09:16:24 Removing connection ID e6dd69b4e01d63b5 after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [4260bcbb c0addfc8] for a closed connection after it has been retired. 2025/04/30 09:16:24 Tracking 60 connection IDs and 4 reset tokens. 2025/04/30 09:16:24 Removing connection ID 5c9054a7 after it has been retired. 2025/04/30 09:16:24 Removing connection ID 09f318948ab81e43 after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [91d02eb7 e3c5a0bb] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection ID 50f9d8a38e97dc3c after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [4f8dbce6 2b4fdf7f 52d4679b] for a closed connection after it has been retired. 2025/04/30 09:16:24 server Dropping long header packet of type Handshake (65 bytes) 2025/04/30 09:16:24 server Dropping long header packet of type Handshake (65 bytes) 2025/04/30 09:16:24 Removing connection ID aa5c56edc5fc68b1 after it has been retired. 2025/04/30 09:16:24 Removing connection ID 3ae4925c294f84fd after it has been retired. 2025/04/30 09:16:24 Removing connection ID ce88b12b after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [65159697 55a4b84b] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection ID 999aabb4 after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [ddf1065d f98d648b] for a closed connection after it has been retired. 2025/04/30 09:16:24 Removing connection IDs [2d8123b9 a07da2c7] for a closed connection after it has been retired. 2025/04/30 09:16:25 Removing connection ID 75dfef6789fc6f9b after it has been retired. 2025/04/30 09:16:25 Removing connection ID 77aafbc422e2300a after it has been retired. 2025/04/30 09:16:25 Removing connection ID 14d541ec after it has been retired. 2025/04/30 09:16:25 Removing connection ID 1c575ceb70394d27 after it has been retired. 2025/04/30 09:16:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:25 server -> Sending packet 11 (38 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:25 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 11, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:25 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:25 server Skipping packet number 10 2025/04/30 09:16:25 server -> Sending packet 12 (37 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:25 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:25 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:25 server -> Sending packet 13 (1366 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:25 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:25 server -> &wire.PingFrame{} 2025/04/30 09:16:25 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 09:16:25 server -> Sending packet 17 (37 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:25 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:25 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:25 server Skipping packet number 16 2025/04/30 09:16:25 server -> Sending packet 18 (1061 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:25 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:25 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:25 Removing connection IDs [af66ac64 c531b71b] for a closed connection after it has been retired. 2025/04/30 09:16:25 Removing connection ID db9311d9 after it has been retired. 2025/04/30 09:16:25 Removing connection ID 1876f6699d61049f after it has been retired. 2025/04/30 09:16:25 Removing connection IDs [5b50263d c485ac68] for a closed connection after it has been retired. 2025/04/30 09:16:26 Removing connection ID 9cf81dea37aacfaa after it has been retired. 2025/04/30 09:16:26 Removing connection ID 194987bd after it has been retired. 2025/04/30 09:16:26 Removing connection IDs [ae57b4db 25630b00] for a closed connection after it has been retired. 2025/04/30 09:16:26 Removing connection ID 35b0909e after it has been retired. 2025/04/30 09:16:26 server <- Reading packet 11 (95 bytes) for connection 0f2152c0, Handshake 2025/04/30 09:16:26 server Long Header{Type: Handshake, DestConnectionID: 0f2152c0, SrcConnectionID: 17ed45836d6e86ebddf1790d33cbc021, PacketNumber: 11, PacketNumberLen: 1, Length: 66, Version: v1} 2025/04/30 09:16:26 server <- &wire.AckFrame{LargestAcked: 7, LowestAcked: 4, AckRanges: {{Largest: 7, Smallest: 7}, {Largest: 5, Smallest: 4}}, DelayTime: 30.811992s} 2025/04/30 09:16:26 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:16:26 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:16:26 Retiring connection ID aedf12c1ef87937a in 5s. 2025/04/30 09:16:26 server Dropping Handshake keys. 2025/04/30 09:16:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 1 2025/04/30 09:16:26 server -> Sending packet 2 (315 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:26 server Short Header{DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0f2325, StatelessResetToken: 0x27b69f354ef28ccffc4b80f469d1b96d} 2025/04/30 09:16:26 server -> &wire.NewTokenFrame{Token: 0x1d866559a2299c698217a625db7d21e5b540bbf335845caf10a384f9b9f0385b81e9a28db7aaff7e616d0d36e44334c9b5180b881e0d7b4d0064cafb5176f50a923292c0eca27da2836dc414311f7a138a61fb229433} 2025/04/30 09:16:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec93da11, StatelessResetToken: 0x8c8913c2eebb3424c3029d07f53ec425} 2025/04/30 09:16:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:26 server -> Sending packet 3 (315 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:26 server Short Header{DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, PacketNumber: 3, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:26 server -> &wire.NewTokenFrame{Token: 0x1d866559a2299c698217a625db7d21e5b540bbf335845caf10a384f9b9f0385b81e9a28db7aaff7e616d0d36e44334c9b5180b881e0d7b4d0064cafb5176f50a923292c0eca27da2836dc414311f7a138a61fb229433} 2025/04/30 09:16:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0f2325, StatelessResetToken: 0x27b69f354ef28ccffc4b80f469d1b96d} 2025/04/30 09:16:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec93da11, StatelessResetToken: 0x8c8913c2eebb3424c3029d07f53ec425} 2025/04/30 09:16:26 server <- Reading packet 0 (45 bytes) for connection 0f2152c0, 1-RTT 2025/04/30 09:16:26 server Short Header{DestConnectionID: 0f2152c0, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:26 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:16:26 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:16:26 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:16:26 server -> Sending packet 4 (46 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:26 server Short Header{DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, PacketNumber: 4, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:26 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 3.997471128s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:26 Received request: GET /xztaxiqwif 2025/04/30 09:16:26 server -> Sending packet 5 (1061 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:26 server Short Header{DestConnectionID: 17ed45836d6e86ebddf1790d33cbc021, PacketNumber: 5, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:26 server <- Reading packet 1 (141 bytes) for connection 5f0f2325, 1-RTT 2025/04/30 09:16:26 server Short Header{DestConnectionID: 5f0f2325, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:26 server <- &wire.AckFrame{LargestAcked: 2, LowestAcked: 2, DelayTime: 1.176ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:26 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: 02e55e019a4afa2efaf2e4aeb159684c, StatelessResetToken: 0xe40d8fcc2c0c2e060e10f154fbbe62ad} 2025/04/30 09:16:26 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 2c7429fee894300a8c4ed90417076f3f, StatelessResetToken: 0x5cac477e842a5b6b9cce34b7c3897e9b} 2025/04/30 09:16:26 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: fe29f5497f15b40be904e7540061c1d7, StatelessResetToken: 0xe93d6894b2dbcfed0025465d8770255a} 2025/04/30 09:16:26 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:26 Retiring connection ID 0f2152c0 in 5s. 2025/04/30 09:16:26 server Setting ACK timer to max ack delay: 25ms 2025/04/30 09:16:26 server -> Sending packet 6 (45 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:26 server Short Header{DestConnectionID: 02e55e019a4afa2efaf2e4aeb159684c, PacketNumber: 6, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:26 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 171.731µs, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:16:26 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:26 Tracking 27 connection IDs and 5 reset tokens. 2025/04/30 09:16:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:26 server -> Sending packet 8 (315 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:26 server Short Header{DestConnectionID: 02e55e019a4afa2efaf2e4aeb159684c, PacketNumber: 8, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:26 server -> &wire.NewTokenFrame{Token: 0x1d866559a2299c698217a625db7d21e5b540bbf335845caf10a384f9b9f0385b81e9a28db7aaff7e616d0d36e44334c9b5180b881e0d7b4d0064cafb5176f50a923292c0eca27da2836dc414311f7a138a61fb229433} 2025/04/30 09:16:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0f2325, StatelessResetToken: 0x27b69f354ef28ccffc4b80f469d1b96d} 2025/04/30 09:16:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec93da11, StatelessResetToken: 0x8c8913c2eebb3424c3029d07f53ec425} 2025/04/30 09:16:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:26 server Skipping packet number 7 2025/04/30 09:16:26 server -> Sending packet 9 (1061 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:26 server Short Header{DestConnectionID: 02e55e019a4afa2efaf2e4aeb159684c, PacketNumber: 9, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:26 server -> Sending packet 10 (1366 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:26 server Short Header{DestConnectionID: 02e55e019a4afa2efaf2e4aeb159684c, PacketNumber: 10, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:26 server -> &wire.PingFrame{} 2025/04/30 09:16:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 09:16:26 server -> Sending packet 15 (1061 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:26 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:26 server -> Sending packet 16 (1061 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:26 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:26 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:26 Removing connection ID 3ec7174f5efdb35f after it has been retired. 2025/04/30 09:16:26 Removing connection ID 46b82446eb13089f after it has been retired. 2025/04/30 09:16:26 Removing connection ID 59dfeafd after it has been retired. 2025/04/30 09:16:26 Removing connection IDs [5d8231df 3614cd79] for a closed connection after it has been retired. 2025/04/30 09:16:26 Removing connection ID 4a1c0c3379e98815 after it has been retired. 2025/04/30 09:16:26 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 09:16:26 server -> Sending packet 12 (37 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:26 server Short Header{DestConnectionID: 02e55e019a4afa2efaf2e4aeb159684c, PacketNumber: 12, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:26 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:26 server Skipping packet number 11 2025/04/30 09:16:26 server -> Sending packet 13 (315 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:26 server Short Header{DestConnectionID: 02e55e019a4afa2efaf2e4aeb159684c, PacketNumber: 13, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:26 server -> &wire.NewTokenFrame{Token: 0x1d866559a2299c698217a625db7d21e5b540bbf335845caf10a384f9b9f0385b81e9a28db7aaff7e616d0d36e44334c9b5180b881e0d7b4d0064cafb5176f50a923292c0eca27da2836dc414311f7a138a61fb229433} 2025/04/30 09:16:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec93da11, StatelessResetToken: 0x8c8913c2eebb3424c3029d07f53ec425} 2025/04/30 09:16:26 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:26 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:26 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0f2325, StatelessResetToken: 0x27b69f354ef28ccffc4b80f469d1b96d} 2025/04/30 09:16:27 Removing connection ID 6a5b3aa3 after it has been retired. 2025/04/30 09:16:27 Removing connection IDs [68414229 8714e323] for a closed connection after it has been retired. 2025/04/30 09:16:27 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 09:16:27 server -> Sending packet 15 (1061 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:27 server Short Header{DestConnectionID: 02e55e019a4afa2efaf2e4aeb159684c, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:27 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:27 server Skipping packet number 14 2025/04/30 09:16:27 server -> Sending packet 16 (37 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:27 server Short Header{DestConnectionID: 02e55e019a4afa2efaf2e4aeb159684c, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:27 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 09:16:28 server -> Sending packet 20 (315 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:28 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:28 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a33dec00, StatelessResetToken: 0xc2f2e031b27fef560214b297ae05ceca} 2025/04/30 09:16:28 server -> &wire.NewTokenFrame{Token: 0x2fb564c4c2d6511d44b1cc8fc2e7562721d93e05ab7c48bc313be34ccf586ad20554b7fa0b4f047631cf31f3fc4cb6a6976c5ef4320e2bcbcea8d308e2864b5a5161c56c9d042b9aec0934f655ab71ef1f01340895ed} 2025/04/30 09:16:28 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:28 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e43ee67, StatelessResetToken: 0x6e7b5076306826ffa6ba777f39f3c4b4} 2025/04/30 09:16:28 server Skipping packet number 19 2025/04/30 09:16:28 server -> Sending packet 21 (1061 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:28 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:28 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 4 2025/04/30 09:16:28 server -> Sending packet 16 (37 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:28 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:28 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:28 server Skipping packet number 15 2025/04/30 09:16:28 server -> Sending packet 17 (1061 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:28 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 17, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:28 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:28 Tracking 18 connection IDs and 5 reset tokens. 2025/04/30 09:16:29 Removing connection IDs [0f89496a 23442af2 7fe99c6b] for a closed connection after it has been retired. 2025/04/30 09:16:29 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 09:16:29 server -> Sending packet 18 (315 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:29 server Short Header{DestConnectionID: 02e55e019a4afa2efaf2e4aeb159684c, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:29 server -> &wire.NewTokenFrame{Token: 0x1d866559a2299c698217a625db7d21e5b540bbf335845caf10a384f9b9f0385b81e9a28db7aaff7e616d0d36e44334c9b5180b881e0d7b4d0064cafb5176f50a923292c0eca27da2836dc414311f7a138a61fb229433} 2025/04/30 09:16:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 5f0f2325, StatelessResetToken: 0x27b69f354ef28ccffc4b80f469d1b96d} 2025/04/30 09:16:29 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:29 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:29 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: ec93da11, StatelessResetToken: 0x8c8913c2eebb3424c3029d07f53ec425} 2025/04/30 09:16:29 server Skipping packet number 17 2025/04/30 09:16:29 server -> Sending packet 19 (1061 bytes) for connection aedf12c1ef87937a, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:29 server Short Header{DestConnectionID: 02e55e019a4afa2efaf2e4aeb159684c, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:29 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:30 server <- Reading packet 2 (43 bytes) for connection 5f0f2325, 1-RTT 2025/04/30 09:16:30 server Short Header{DestConnectionID: 5f0f2325, PacketNumber: 2, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:16:30 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:16:30 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:16:30 Replacing connection for connection IDs [5f0f2325 ec93da11] with a closed connection. 2025/04/30 09:16:30 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:16:30 server Connection aedf12c1ef87937a closed. 2025/04/30 09:16:30 Tracking 15 connection IDs and 4 reset tokens. 2025/04/30 09:16:31 Removing connection ID aedf12c1ef87937a after it has been retired. 2025/04/30 09:16:31 Removing connection ID 0f2152c0 after it has been retired. 2025/04/30 09:16:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 2 2025/04/30 09:16:32 server -> Sending packet 15 (38 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:32 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 15, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:32 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:32 server Skipping packet number 14 2025/04/30 09:16:32 server -> Sending packet 16 (37 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:32 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 16, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:32 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:32 Tracking 13 connection IDs and 4 reset tokens. 2025/04/30 09:16:32 server Dropping long header packet of type Handshake (65 bytes) 2025/04/30 09:16:32 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 09:16:32 server -> Sending packet 20 (37 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:32 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:32 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:32 server Skipping packet number 19 2025/04/30 09:16:32 server -> Sending packet 21 (1061 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:32 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 21, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:32 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:34 Tracking 13 connection IDs and 4 reset tokens. 2025/04/30 09:16:35 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 09:16:35 server -> Sending packet 18 (1061 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:35 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:35 server -> Sending packet 19 (1061 bytes) for connection c5b7ab7260106ffc, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:35 server Short Header{DestConnectionID: 845b7a3c5dae0e61f979c0df22f3388a, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:35 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:35 Removing connection IDs [5f0f2325 ec93da11] for a closed connection after it has been retired. 2025/04/30 09:16:36 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 7 2025/04/30 09:16:36 server -> Sending packet 23 (315 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:36 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:36 server -> &wire.CryptoFrame{Offset: 0, Data length: 138, Offset + Data length: 138} 2025/04/30 09:16:36 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:16:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: a33dec00, StatelessResetToken: 0xc2f2e031b27fef560214b297ae05ceca} 2025/04/30 09:16:36 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 3e43ee67, StatelessResetToken: 0x6e7b5076306826ffa6ba777f39f3c4b4} 2025/04/30 09:16:36 server -> &wire.NewTokenFrame{Token: 0x2fb564c4c2d6511d44b1cc8fc2e7562721d93e05ab7c48bc313be34ccf586ad20554b7fa0b4f047631cf31f3fc4cb6a6976c5ef4320e2bcbcea8d308e2864b5a5161c56c9d042b9aec0934f655ab71ef1f01340895ed} 2025/04/30 09:16:36 server Skipping packet number 22 2025/04/30 09:16:36 server -> Sending packet 24 (1061 bytes) for connection 1c575ceb70394d27, 1-RTT (ECN: Not-ECT) 2025/04/30 09:16:36 server Short Header{DestConnectionID: b61e561d4652589208f01108d7d8a42d, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:36 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:36 Tracking 11 connection IDs and 4 reset tokens. 2025/04/30 09:16:38 Tracking 11 connection IDs and 4 reset tokens. 2025/04/30 09:16:38 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 5 2025/04/30 09:16:38 server -> Sending packet 19 (37 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:38 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:38 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:38 server Skipping packet number 18 2025/04/30 09:16:38 server -> Sending packet 20 (1061 bytes) for connection 0c3276f8d7457497, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:38 server Short Header{DestConnectionID: d707cf58c24878556d93d6ea826eb655, PacketNumber: 20, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:38 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:40 Tracking 11 connection IDs and 4 reset tokens. 2025/04/30 09:16:42 Tracking 11 connection IDs and 4 reset tokens. 2025/04/30 09:16:44 Tracking 11 connection IDs and 4 reset tokens. 2025/04/30 09:16:45 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 3 2025/04/30 09:16:45 server -> Sending packet 18 (38 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:45 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 18, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:45 server -> &wire.MaxStreamsFrame{Type: bidi, MaxStreamNum: 101} 2025/04/30 09:16:45 server Skipping packet number 17 2025/04/30 09:16:45 server -> Sending packet 19 (37 bytes) for connection 75dfef6789fc6f9b, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:45 server Short Header{DestConnectionID: c8e652b638da3e065c560a7548afe35f, PacketNumber: 19, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:45 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:46 Tracking 11 connection IDs and 4 reset tokens. 2025/04/30 09:16:47 server Loss detection alarm for 1-RTT fired in PTO mode. PTO count: 6 2025/04/30 09:16:47 server -> Sending packet 23 (37 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:47 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 23, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:47 server -> &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:16:47 server Skipping packet number 22 2025/04/30 09:16:47 server -> Sending packet 24 (1061 bytes) for connection 59df3dabf2d2cfc3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:16:47 server Short Header{DestConnectionID: 43dc49775ed7248ddd3b5fbaf51283d9, PacketNumber: 24, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:16:47 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:16:48 server Destroying connection: timeout: no recent network activity 2025/04/30 09:16:48 Removing connection ID 8801efa8. 2025/04/30 09:16:48 Removing connection ID 76507ea6. 2025/04/30 09:16:48 Error accepting stream: timeout: no recent network activity 2025/04/30 09:16:48 server Connection 59df3dabf2d2cfc3 closed. 2025/04/30 09:16:48 Tracking 9 connection IDs and 3 reset tokens. 2025/04/30 09:16:48 server Destroying connection: timeout: no recent network activity 2025/04/30 09:16:48 Removing connection ID d57ab261. 2025/04/30 09:16:48 Removing connection ID 3f03f47f. 2025/04/30 09:16:48 Error accepting stream: timeout: no recent network activity 2025/04/30 09:16:48 server Connection 0c3276f8d7457497 closed. 2025/04/30 09:16:48 server Dropping long header packet of type Handshake (65 bytes) 2025/04/30 09:16:48 server Destroying connection: timeout: no recent network activity 2025/04/30 09:16:48 Removing connection ID b6d56067. 2025/04/30 09:16:48 Removing connection ID 533b7ef2. 2025/04/30 09:16:48 Error accepting stream: timeout: no recent network activity 2025/04/30 09:16:48 server Connection c5b7ab7260106ffc closed. 2025/04/30 09:16:50 server Destroying connection: timeout: no recent network activity 2025/04/30 09:16:50 Removing connection ID 3e43ee67. 2025/04/30 09:16:50 Removing connection ID a33dec00. 2025/04/30 09:16:50 Removing connection ID 77eebc4d. 2025/04/30 09:16:50 Error accepting stream: timeout: no recent network activity 2025/04/30 09:16:50 server Connection 1c575ceb70394d27 closed. 2025/04/30 09:16:50 Tracking 2 connection IDs and 1 reset tokens. 2025/04/30 09:16:52 server Destroying connection: timeout: no recent network activity 2025/04/30 09:16:52 Removing connection ID 304b83f1. 2025/04/30 09:16:52 Error accepting stream: timeout: no recent network activity 2025/04/30 09:16:52 Removing connection ID 0a58a395. 2025/04/30 09:16:52 server Connection 75dfef6789fc6f9b closed. 2025/04/30 09:16:52 Tracking 0 connection IDs and 0 reset tokens. 2025/04/30 09:17:20 server Dropping long header packet of type Handshake (65 bytes) 2025/04/30 09:18:24 server Dropping long header packet of type Handshake (65 bytes) 2025/04/30 09:18:24 server Dropping long header packet of type Handshake (65 bytes) 2025/04/30 09:20:32 server Dropping long header packet of type Handshake (65 bytes) 2025/04/30 09:20:32 server Dropping long header packet of type Handshake (65 bytes)