2025/04/30 09:13:16 Increased receive buffer size to 14336 kiB 2025/04/30 09:13:16 Increased send buffer size to 14336 kiB 2025/04/30 09:13:16 Setting DF for IPv4 and IPv6. 2025/04/30 09:13:16 Activating reading of ECN bits for IPv4 and IPv6. 2025/04/30 09:13:16 Activating reading of packet info for IPv4 and IPv6. 2025/04/30 09:13:16 server Listening for udp connections on [::]:443 2025/04/30 09:13:17 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:13:17 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:13:17 server Client offered version 0x57414954, sending Version Negotiation 2025/04/30 09:13:18 server <- Received Initial packet. 2025/04/30 09:13:18 Created qlog file: /logs/qlog/abd8c69fea194ad3.sqlog 2025/04/30 09:13:18 server Changing connection ID to 257051d0. 2025/04/30 09:13:18 Adding connection IDs abd8c69fea194ad3 and 257051d0 for a new connection. 2025/04/30 09:13:18 server <- Reading packet 0 (1252 bytes) for connection abd8c69fea194ad3, Initial 2025/04/30 09:13:18 server Long Header{Type: Initial, DestConnectionID: abd8c69fea194ad3, SrcConnectionID: fa70264dd555d7d0fbdb772a0734ad24, Token: (empty), PacketNumber: 0, PacketNumberLen: 1, Length: 1218, Version: v1} 2025/04/30 09:13:18 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:13:18 server Installed Handshake Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:13:18 server Installed Handshake Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:13:18 server Installed 1-RTT Write keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:13:18 server Processed Transport Parameters: &wire.TransportParameters{OriginalDestinationConnectionID: (empty), InitialSourceConnectionID: fa70264dd555d7d0fbdb772a0734ad24, InitialMaxStreamDataBidiLocal: 3750000, InitialMaxStreamDataBidiRemote: 3750000, InitialMaxStreamDataUni: 3750000, InitialMaxData: 3750000, MaxBidiStreamNum: 100, MaxUniStreamNum: 100, MaxIdleTimeout: 5m0s, AckDelayExponent: 3, MaxAckDelay: 25ms, ActiveConnectionIDLimit: 3} 2025/04/30 09:13:18 Adding connection ID 08867bb8. 2025/04/30 09:13:18 Adding connection ID 09548882. 2025/04/30 09:13:18 server -> Sending coalesced packet (2 parts, 1280 bytes) for connection abd8c69fea194ad3 2025/04/30 09:13:18 server Long Header{Type: Initial, DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, SrcConnectionID: 257051d0, Token: (empty), PacketNumber: 0, PacketNumberLen: 2, Length: 418, Version: v1} 2025/04/30 09:13:18 server -> &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 0s, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:13:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:13:18 server Long Header{Type: Handshake, DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, SrcConnectionID: 257051d0, PacketNumber: 0, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 09:13:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 09:13:18 server Short Header{DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, PacketNumber: 0, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:13:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 0, ConnectionID: 08867bb8, StatelessResetToken: 0x39904b69adc0c27724975ede5cabd265} 2025/04/30 09:13:18 server -> &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 0, ConnectionID: 09548882, StatelessResetToken: 0xce1db27f97c1663922dc4b753a43816d} 2025/04/30 09:13:18 Tracking 4 connection IDs and 0 reset tokens. 2025/04/30 09:13:18 server Loss detection alarm for Initial fired in PTO mode. PTO count: 1 2025/04/30 09:13:18 server -> Sending packet 1 (1280 bytes) for connection abd8c69fea194ad3, Initial 2025/04/30 09:13:18 server Long Header{Type: Initial, DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, SrcConnectionID: 257051d0, Token: (empty), PacketNumber: 1, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:13:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:13:18 server -> Sending packet 2 (1280 bytes) for connection abd8c69fea194ad3, Initial 2025/04/30 09:13:18 server Long Header{Type: Initial, DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, SrcConnectionID: 257051d0, Token: (empty), PacketNumber: 2, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:13:18 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:13:18 server Canceling loss detection timer. 2025/04/30 09:13:18 server Amplification window limited. Received 1252 bytes, already sent out 3840 bytes 2025/04/30 09:13:19 server <- Reading packet 2 (1200 bytes) for connection abd8c69fea194ad3, Initial 2025/04/30 09:13:19 server Long Header{Type: Initial, DestConnectionID: abd8c69fea194ad3, SrcConnectionID: fa70264dd555d7d0fbdb772a0734ad24, Token: (empty), PacketNumber: 2, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:13:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:13:19 server Loss detection alarm for Handshake fired in PTO mode. PTO count: 2 2025/04/30 09:13:19 server -> Sending packet 1 (749 bytes) for connection abd8c69fea194ad3, Handshake 2025/04/30 09:13:19 server Long Header{Type: Handshake, DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, SrcConnectionID: 257051d0, PacketNumber: 1, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 09:13:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 09:13:19 server -> Sending packet 2 (749 bytes) for connection abd8c69fea194ad3, Handshake 2025/04/30 09:13:19 server Long Header{Type: Handshake, DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, SrcConnectionID: 257051d0, PacketNumber: 2, PacketNumberLen: 2, Length: 720, Version: v1} 2025/04/30 09:13:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 698, Offset + Data length: 698} 2025/04/30 09:13:19 server -> Sending packet 3 (58 bytes) for connection abd8c69fea194ad3, Initial 2025/04/30 09:13:19 server Long Header{Type: Initial, DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, SrcConnectionID: 257051d0, Token: (empty), PacketNumber: 3, PacketNumberLen: 2, Length: 28, Version: v1} 2025/04/30 09:13:19 server -> &wire.AckFrame{LargestAcked: 2, LowestAcked: 0, AckRanges: {{Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:13:19 server <- Reading packet 4 (1200 bytes) for connection abd8c69fea194ad3, Initial 2025/04/30 09:13:19 server Long Header{Type: Initial, DestConnectionID: abd8c69fea194ad3, SrcConnectionID: fa70264dd555d7d0fbdb772a0734ad24, Token: (empty), PacketNumber: 4, PacketNumberLen: 1, Length: 1166, Version: v1} 2025/04/30 09:13:19 server <- &wire.CryptoFrame{Offset: 0, Data length: 287, Offset + Data length: 287} 2025/04/30 09:13:19 server -> Sending packet 4 (60 bytes) for connection abd8c69fea194ad3, Initial 2025/04/30 09:13:19 server Long Header{Type: Initial, DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, SrcConnectionID: 257051d0, Token: (empty), PacketNumber: 4, PacketNumberLen: 2, Length: 30, Version: v1} 2025/04/30 09:13:19 server -> &wire.AckFrame{LargestAcked: 4, LowestAcked: 0, AckRanges: {{Largest: 4, Smallest: 4}, {Largest: 2, Smallest: 2}, {Largest: 0, Smallest: 0}}, DelayTime: 0s, ECT0: 3, ECT1: 0, CE: 0} 2025/04/30 09:13:19 server Loss detection alarm for Initial fired in PTO mode. PTO count: 3 2025/04/30 09:13:19 server -> Sending packet 5 (1280 bytes) for connection abd8c69fea194ad3, Initial 2025/04/30 09:13:19 server Long Header{Type: Initial, DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, SrcConnectionID: 257051d0, Token: (empty), PacketNumber: 5, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:13:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:13:19 server -> Sending packet 6 (1280 bytes) for connection abd8c69fea194ad3, Initial 2025/04/30 09:13:19 server Long Header{Type: Initial, DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, SrcConnectionID: 257051d0, Token: (empty), PacketNumber: 6, PacketNumberLen: 2, Length: 1250, Version: v1} 2025/04/30 09:13:19 server -> &wire.CryptoFrame{Offset: 0, Data length: 123, Offset + Data length: 123} 2025/04/30 09:13:20 server Parsed a coalesced packet. Part 1: 66 bytes. Remaining: 1186 bytes. 2025/04/30 09:13:20 server <- Reading packet 5 (66 bytes) for connection 08867bb8, Initial 2025/04/30 09:13:20 server Long Header{Type: Initial, DestConnectionID: 08867bb8, SrcConnectionID: fa70264dd555d7d0fbdb772a0734ad24, Token: (empty), PacketNumber: 5, PacketNumberLen: 1, Length: 36, Version: v1} 2025/04/30 09:13:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19.92ms} 2025/04/30 09:13:20 server Parsed a coalesced packet. Part 2: 1186 bytes. Remaining: 0 bytes. 2025/04/30 09:13:20 server <- Reading packet 0 (1186 bytes) for connection 08867bb8, Handshake 2025/04/30 09:13:20 server Long Header{Type: Handshake, DestConnectionID: 08867bb8, SrcConnectionID: fa70264dd555d7d0fbdb772a0734ad24, PacketNumber: 0, PacketNumberLen: 1, Length: 1157, Version: v1} 2025/04/30 09:13:20 server Dropping Initial keys. 2025/04/30 09:13:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 19.92ms} 2025/04/30 09:13:20 server <- &wire.CryptoFrame{Offset: 0, Data length: 36, Offset + Data length: 36} 2025/04/30 09:13:20 server Installed 1-RTT Read keys (using TLS_AES_128_GCM_SHA256) 2025/04/30 09:13:20 Retiring connection ID abd8c69fea194ad3 in 5s. 2025/04/30 09:13:20 server Dropping Handshake keys. 2025/04/30 09:13:20 server <- Reading packet 0 (43 bytes) for connection 08867bb8, 1-RTT 2025/04/30 09:13:20 server Short Header{DestConnectionID: 08867bb8, PacketNumber: 0, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:13:20 server <- &wire.AckFrame{LargestAcked: 0, LowestAcked: 0, DelayTime: 2.488ms} 2025/04/30 09:13:20 server newly acked packets (1): [0] 2025/04/30 09:13:20 server updated RTT: 1.506871093s (σ: 753.435546ms) 2025/04/30 09:13:20 server Canceling loss detection timer. 2025/04/30 09:13:20 server <- &wire.RetireConnectionIDFrame{SequenceNumber: 0} 2025/04/30 09:13:20 Retiring connection ID 257051d0 in 5s. 2025/04/30 09:13:20 server Queueing ACK because the first packet should be acknowledged. 2025/04/30 09:13:20 server <- Reading packet 1 (45 bytes) for connection 08867bb8, 1-RTT 2025/04/30 09:13:20 server Short Header{DestConnectionID: 08867bb8, PacketNumber: 1, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:13:20 server <- &wire.StreamFrame{StreamID: 0, Fin: false, Offset: 0, Data length: 0, Offset + Data length: 0} 2025/04/30 09:13:20 server <- &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 17, Offset + Data length: 17} 2025/04/30 09:13:20 server -> Sending packet 1 (272 bytes) for connection abd8c69fea194ad3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:13:20 server Short Header{DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, PacketNumber: 1, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:13:20 server -> &wire.AckFrame{LargestAcked: 1, LowestAcked: 0, DelayTime: 481.2µs, ECT0: 2, ECT1: 0, CE: 0} 2025/04/30 09:13:20 server -> &wire.HandshakeDoneFrame{} 2025/04/30 09:13:20 server -> &wire.CryptoFrame{Offset: 0, Data length: 135, Offset + Data length: 135} 2025/04/30 09:13:20 server -> &wire.NewTokenFrame{Token: 0x33e80d46b1384d3779e7c82fdda5160ce770392c7ab2e48c7d050ae09f930776eaa4b28115b11b4d969576d8c423dd56d88099d067878ebacbbb751abad922ef4a5645c39ff2eb936af8b9028d9daf2a66097d65e7e9} 2025/04/30 09:13:20 Received request: GET /tznjmmrmrl 2025/04/30 09:13:20 server -> Sending packet 2 (1061 bytes) for connection abd8c69fea194ad3, 1-RTT (ECN: ECT(0)) 2025/04/30 09:13:20 server Short Header{DestConnectionID: fa70264dd555d7d0fbdb772a0734ad24, PacketNumber: 2, PacketNumberLen: 2, KeyPhase: 0} 2025/04/30 09:13:20 server -> &wire.StreamFrame{StreamID: 0, Fin: true, Offset: 0, Data length: 1024, Offset + Data length: 1024} 2025/04/30 09:13:20 Tracking 4 connection IDs and 0 reset tokens. 2025/04/30 09:13:21 server Dropping %!s(logging.PacketType=5) packet (1452 bytes) that could not be unpacked. Error: decryption failed 2025/04/30 09:13:21 server <- Reading packet 3 (139 bytes) for connection 08867bb8, 1-RTT 2025/04/30 09:13:21 server Short Header{DestConnectionID: 08867bb8, PacketNumber: 3, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:13:21 server <- &wire.AckFrame{LargestAcked: 1, LowestAcked: 1, DelayTime: 1.04ms, ECT0: 1, ECT1: 0, CE: 0} 2025/04/30 09:13:21 server newly acked packets (1): [1] 2025/04/30 09:13:21 server updated RTT: 1.506551s (σ: 565.715ms) 2025/04/30 09:13:21 server ECN capability confirmed. 2025/04/30 09:13:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 1, RetirePriorTo: 1, ConnectionID: c6b220f800966cca2c88d4f65f6880a8, StatelessResetToken: 0x336ec667209b459d4ca488338d7de668} 2025/04/30 09:13:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 2, RetirePriorTo: 1, ConnectionID: 447539216000e84cc89feafd0e63ca15, StatelessResetToken: 0xaa89c186974c934a8d1b6d9d7a9d998b} 2025/04/30 09:13:21 server <- &wire.NewConnectionIDFrame{SequenceNumber: 3, RetirePriorTo: 1, ConnectionID: 86e1f045a779ace29e6a373001d2e218, StatelessResetToken: 0x6bc5e1b9c37c19ef04226e2bb55d245c} 2025/04/30 09:13:21 server Queuing ACK because there's a new missing packet to report. 2025/04/30 09:13:21 server Ignoring all packets below 2. 2025/04/30 09:13:21 server <- Reading packet 4 (43 bytes) for connection 08867bb8, 1-RTT 2025/04/30 09:13:21 server Short Header{DestConnectionID: 08867bb8, PacketNumber: 4, PacketNumberLen: 1, KeyPhase: 0} 2025/04/30 09:13:21 server <- &wire.ConnectionCloseFrame{IsApplicationError:false, ErrorCode:0x0, FrameType:0x0, ReasonPhrase:""} 2025/04/30 09:13:21 server Closing connection with error: NO_ERROR (remote) 2025/04/30 09:13:21 Replacing connection for connection IDs [09548882 08867bb8] with a closed connection. 2025/04/30 09:13:21 Error accepting stream: NO_ERROR (remote) 2025/04/30 09:13:21 server Connection abd8c69fea194ad3 closed. 2025/04/30 09:13:22 Tracking 4 connection IDs and 0 reset tokens. 2025/04/30 09:13:24 Tracking 4 connection IDs and 0 reset tokens. 2025/04/30 09:13:25 Removing connection ID 257051d0 after it has been retired. 2025/04/30 09:13:25 Removing connection ID abd8c69fea194ad3 after it has been retired. 2025/04/30 09:13:26 Removing connection IDs [09548882 08867bb8] for a closed connection after it has been retired. 2025/04/30 09:13:26 Tracking 0 connection IDs and 0 reset tokens.