From 63096562a0beeffe66f66ef8fcbe14c140b68595 Mon Sep 17 00:00:00 2001 From: Marten Seemann Date: Thu, 2 Jan 2020 14:52:35 +0800 Subject: [PATCH] log the packet size of dropped packets --- session.go | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/session.go b/session.go index d4cd63b10..3cb2b9084 100644 --- a/session.go +++ b/session.go @@ -684,7 +684,7 @@ func (s *session) handleSinglePacket(p *receivedPacket, hdr *wire.Header) bool / // The server can change the source connection ID with the first Handshake packet. // After this, all packets with a different source connection have to be ignored. if s.receivedFirstPacket && hdr.IsLongHeader && !hdr.SrcConnectionID.Equal(s.handshakeDestConnID) { - s.logger.Debugf("Dropping %s packet with unexpected source connection ID: %s (expected %s)", hdr.PacketType(), hdr.SrcConnectionID, s.handshakeDestConnID) + s.logger.Debugf("Dropping %s packet (%d bytes) with unexpected source connection ID: %s (expected %s)", hdr.PacketType(), len(p.data), hdr.SrcConnectionID, s.handshakeDestConnID) return false } // drop 0-RTT packets, if we are a client @@ -696,7 +696,7 @@ func (s *session) handleSinglePacket(p *receivedPacket, hdr *wire.Header) bool / if err != nil { switch err { case handshake.ErrKeysDropped: - s.logger.Debugf("Dropping %s packet because we already dropped the keys.", hdr.PacketType()) + s.logger.Debugf("Dropping %s packet (%d bytes) because we already dropped the keys.", hdr.PacketType(), len(p.data)) case handshake.ErrKeysNotYetAvailable: // Sealer for this encryption level not yet available. // Try again later. @@ -707,7 +707,7 @@ func (s *session) handleSinglePacket(p *receivedPacket, hdr *wire.Header) bool / default: // This might be a packet injected by an attacker. // Drop it. - s.logger.Debugf("Dropping %s packet that could not be unpacked. Error: %s", hdr.PacketType(), err) + s.logger.Debugf("Dropping %s packet (%d bytes) that could not be unpacked. Error: %s", hdr.PacketType(), len(p.data), err) } return false }