0.000 Creating connection with server4:443 with v1 0.079 Setting up connection for downloading https://server4:443/bgzdandckd at 38:27.484 on ClientConnection[e0e827e63928a9eb/9b6054dc8d663163(V1) with server4/193.167.100.100:443] 0.080 Original destination connection id: e0e827e63928a9eb (scid: 9b6054dc8d663163) >- CryptoStream[I|ClientHello] 0.262 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.463/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.257 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.302 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ5] CryptoFrame[0,123] 0.321 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.521/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.347 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 131 millis, based on 0.479/Handshake, because peerAwaitingAddressValidation | RTT:44/22 0.347 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 0.302 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] >- CryptoStream[H|Finished] 0.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 131 millis, based on 0.513/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:44/22 0.378 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.382 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 0.383 Starting downloading https://server4:443/bgzdandckd at 38:27.804 on ClientConnection[e0e827e63928a9eb/9b6054dc8d663163(V1) with server4/193.167.100.100:443] 0.302 <- (1) Packet A|2|S0|9b6054dc8d663163|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 0.402 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 131 millis, based on 0.534/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:44/22 0.403 Discarding pn space Initial because first Handshake message is being sent 0.408 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 131 millis, based on 0.540/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:44/22 0.408 -> Packet A|0|S0|d3504c6bc618b271|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ11] 0.410 <- (2) Packet A|3|S0|9b6054dc8d663163|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|99a73a4051eb27c4|27600a1cbcc1f6e44282c6e66f8b1355] 0.415 State is set to Confirmed reschedule loss detection timer for PTO over 94 millis, based on 0.510/Handshake, because ackElicitingInFlight | RTT:44/22 reschedule loss detection timer for PTO over 149 millis, based on 0.565/App, because ackElicitingInFlight | RTT:44/22 0.416 Discarding pn space Handshake because HandshakeDone is received 0.435 -> Packet A|1|S0|d3504c6bc618b271|32|1 AckFrame[3-2|Δ19] 0.565 loss detection timeout handler running Sending probe 0, because no ack since 0.408. Current RTT: 44/22. 0.567 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 313 millis, based on 0.882/App, because ackElicitingInFlight | RTT:44/22 0.568 -> Packet PA|2|S0|d3504c6bc618b271|47|1 StreamFrame[0(CIB),0,17,fin] 0.881 loss detection timeout handler running Sending probe 1, because no ack since 0.568. Current RTT: 44/22. 0.882 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 627 millis, based on 1.510/App, because ackElicitingInFlight | RTT:44/22 0.882 -> Packet PA|3|S0|d3504c6bc618b271|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 627 millis, based on 1.512/App, because ackElicitingInFlight | RTT:44/22 0.884 -> Packet PA|4|S0|d3504c6bc618b271|47|1 StreamFrame[0(CIB),0,17,fin] 0.918 <- (3) Packet A|4|S0|9b6054dc8d663163|34|1 AckFrame[4-3,1|Δ0] 0.921 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 156 millis, based on 1.078/App, because ackElicitingInFlight | RTT:44/22 0.921 -> Packet A|5|S0|d3504c6bc618b271|47|1 StreamFrame[0(CIB),0,17,fin] 0.921 Cwnd(-): 6000; inflight: 47 reschedule loss detection timer for PTO over 156 millis, based on 1.078/App, because ackElicitingInFlight | RTT:44/22 1.078 loss detection timeout handler running Sending probe 0, because no ack since 0.921. Current RTT: 43/19. 1.078 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 287 millis, based on 1.367/App, because ackElicitingInFlight | RTT:43/19 1.079 -> Packet PA|6|S0|d3504c6bc618b271|47|1 StreamFrame[0(CIB),0,17,fin] 1.111 <- (4) Packet A|6|S0|9b6054dc8d663163|37|1 AckFrame[6,4-3,1|Δ1] 1.112 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.112 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 134 millis, based on 1.247/App, because ackElicitingInFlight | RTT:42/17 1.112 -> Packet A|7|S0|d3504c6bc618b271|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4|Δ0] 1.247 loss detection timeout handler running Sending probe 0, because no ack since 1.112. Current RTT: 42/17. 1.247 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 269 millis, based on 1.518/App, because ackElicitingInFlight | RTT:42/17 1.248 -> Packet PA|8|S0|d3504c6bc618b271|47|1 StreamFrame[0(CIB),0,17,fin] 1.280 <- (5) Packet A|8|S0|9b6054dc8d663163|40|2 AckFrame[8,6,4-3,1|Δ1] PingFrame[] 1.281 Cwnd(-): 3000; inflight: 0 1.281 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 1.281 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 125 millis, based on 1.407/App, because ackElicitingInFlight | RTT:41/15 1.281 -> Packet A|9|S0|d3504c6bc618b271|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6,4|Δ0] 1.301 -> Packet A|10|S0|d3504c6bc618b271|36|1 AckFrame[8,6,4|Δ19] 1.313 <- (6) Packet A|9|S0|9b6054dc8d663163|1055|1 StreamFrame[0(CIB),0,1024,fin] 1.316 Finished downloading https://server4:443/bgzdandckd at 38:28.736 on ClientConnection[e0e827e63928a9eb/9b6054dc8d663163(V1) with server4/193.167.100.100:443] 1.318 Closing ClientConnection[e0e827e63928a9eb/9b6054dc8d663163(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.320 Creating connection with server4:443 with v1 1.321 Setting up connection for downloading https://server4:443/mvitfagzvw at 38:28.741 on ClientConnection[cb7246a9acb7f8bb/6b8aafa59de7db3d(V1) with server4/193.167.100.100:443] 1.321 Original destination connection id: cb7246a9acb7f8bb (scid: 6b8aafa59de7db3d) >- CryptoStream[I|ClientHello] 1.324 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.320 -> Packet A|11|S0|d3504c6bc618b271|40|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,6,4|Δ5] reschedule loss detection timer for PTO over 199 millis, based on 1.524/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.324 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.523 loss detection timeout handler running Sending probe 0, because no ack since 1.324. Current RTT: 100/25. 1.523 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.524 (Probe is an initial retransmit) 1.525 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.925/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.524 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.558 <- (1) Packet I|3|L|176|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 1.558 probe count not reset on ack because handshake not yet confirmed 1.559 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.959/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.563 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.757/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.562 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) 1.558 <- (1) Packet H|4|L|764|1 CryptoFrame[0,717] >- CryptoStream[H|Finished] 1.568 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.762/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.568 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.570 Starting downloading https://server4:443/mvitfagzvw at 38:28.990 on ClientConnection[cb7246a9acb7f8bb/6b8aafa59de7db3d(V1) with server4/193.167.100.100:443] 1.558 <- (1) Packet A|5|S0|6b8aafa59de7db3d|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 1.570 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.668/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.571 Discarding pn space Initial because first Handshake message is being sent 1.569 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 1.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.668/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.571 -> Packet A|0|S0|266323bf2352ff91|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 1.603 <- (2) Packet A|7|S0|6b8aafa59de7db3d|33|1 AckFrame[0|Δ1] 1.604 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.701/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.604 <- (3) Packet A|8|S0|6b8aafa59de7db3d|1055|1 StreamFrame[0(CIB),0,1024,fin] 1.605 Finished downloading https://server4:443/mvitfagzvw at 38:29.026 on ClientConnection[cb7246a9acb7f8bb/6b8aafa59de7db3d(V1) with server4/193.167.100.100:443] 1.606 Closing ClientConnection[cb7246a9acb7f8bb/6b8aafa59de7db3d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.606 -> Packet A|1|S0|266323bf2352ff91|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 1.606 Creating connection with server4:443 with v1 1.607 Setting up connection for downloading https://server4:443/slebytlkbw at 38:29.028 on ClientConnection[11b60cbe6a3a5b15/39571769a0473aff(V1) with server4/193.167.100.100:443] 1.607 Original destination connection id: 11b60cbe6a3a5b15 (scid: 39571769a0473aff) >- CryptoStream[I|ClientHello] 1.610 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.810/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.610 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.644 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 1.645 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.845/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.644 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 1.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.752/Handshake, because peerAwaitingAddressValidation | RTT:34/17 1.649 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 1.653 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.756/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.653 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.655 Starting downloading https://server4:443/slebytlkbw at 38:29.075 on ClientConnection[11b60cbe6a3a5b15/39571769a0473aff(V1) with server4/193.167.100.100:443] 1.644 <- (1) Packet A|2|S0|39571769a0473aff|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 1.656 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.758/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.656 Discarding pn space Initial because first Handshake message is being sent 1.656 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.758/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.656 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|7dec44bc3dd6586e|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0]] 1.685 <- (2) Packet A|3|S0|39571769a0473aff|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|900c5fff01b73b88|e8311d1d6fd10d4a9340b3db6f7150f8] 1.686 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 1.755/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 97 millis, based on 1.783/App, because ackElicitingInFlight | RTT:34/17 1.686 Discarding pn space Handshake because HandshakeDone is received 1.689 <- (3) Packet A|5|S0|39571769a0473aff|1055|1 StreamFrame[0(CIB),0,1024,fin] 1.690 Finished downloading https://server4:443/slebytlkbw at 38:29.111 on ClientConnection[11b60cbe6a3a5b15/39571769a0473aff(V1) with server4/193.167.100.100:443] 1.690 Closing ClientConnection[11b60cbe6a3a5b15/39571769a0473aff(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.690 -> Packet A|1|S0|7dec44bc3dd6586e|34|1 AckFrame[5,3-2|Δ3] 1.692 Creating connection with server4:443 with v1 1.692 -> Packet A|2|S0|7dec44bc3dd6586e|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 1.693 Setting up connection for downloading https://server4:443/pdjxizgvmq at 38:29.113 on ClientConnection[c28b1c533028a702/a7bbd2d9ad01f606(V1) with server4/193.167.100.100:443] 1.693 Original destination connection id: c28b1c533028a702 (scid: a7bbd2d9ad01f606) >- CryptoStream[I|ClientHello] 1.695 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.895/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.695 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.894 loss detection timeout handler running Sending probe 0, because no ack since 1.695. Current RTT: 100/25. 1.895 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.895 (Probe is an initial retransmit) 1.896 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.296/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.895 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.931 <- (1) Packet I|3|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 1.931 <- (1) Packet H|4|L|765|1 CryptoFrame[0,718] 1.936 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 2.336/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.936 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 1.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 2.339/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.939 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.940 Starting downloading https://server4:443/pdjxizgvmq at 38:29.361 on ClientConnection[c28b1c533028a702/a7bbd2d9ad01f606(V1) with server4/193.167.100.100:443] 1.931 <- (1) Packet A|5|S0|a7bbd2d9ad01f606|264|2 CryptoFrame[0,89] Padding(144) -< CryptoStream[A|NewSessionTicket] 1.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.141/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.941 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 199 millis, based on 2.141/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.941 -> [Packet H|1|L|46|1 AckFrame[4|Δ0], Packet A|0|S0|6deeac1fbbcd3aed|47|1 StreamFrame[0(CIB),0,17,fin]] 1.961 -> Packet A|1|S0|6deeac1fbbcd3aed|32|1 AckFrame[5|Δ19] 1.971 <- (2) Packet A|6|S0|a7bbd2d9ad01f606|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|d70209d7a5f67909|f0368c0e3cddf14ddcc9ec3ad2fd4a0d] 1.971 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 2.139/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 2.166/App, because ackElicitingInFlight | RTT:100/25 1.971 Discarding pn space Handshake because HandshakeDone is received 1.991 -> Packet A|2|S0|6deeac1fbbcd3aed|32|1 AckFrame[6-5|Δ19] 2.099 <- (3) Packet A|9|S0|a7bbd2d9ad01f606|29|2 PingFrame[] Padding(1) 2.119 -> Packet A|3|S0|6deeac1fbbcd3aed|34|1 AckFrame[9,6-5|Δ19] 2.150 <- (4) Packet A|10|S0|a7bbd2d9ad01f606|1055|1 StreamFrame[0(CIB),0,1024,fin] 2.151 Finished downloading https://server4:443/pdjxizgvmq at 38:29.572 on ClientConnection[c28b1c533028a702/a7bbd2d9ad01f606(V1) with server4/193.167.100.100:443] 2.152 Closing ClientConnection[c28b1c533028a702/a7bbd2d9ad01f606(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.152 Creating connection with server4:443 with v1 2.152 -> Packet A|4|S0|6deeac1fbbcd3aed|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,6-5|Δ0] 2.153 Setting up connection for downloading https://server4:443/wagzwvlocp at 38:29.573 on ClientConnection[b73788b7ff6f433b/8a4666e305cc4d51(V1) with server4/193.167.100.100:443] 2.153 Original destination connection id: b73788b7ff6f433b (scid: 8a4666e305cc4d51) >- CryptoStream[I|ClientHello] 2.155 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.355/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.155 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.189 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 2.190 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.391/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.189 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 2.195 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.297/Handshake, because peerAwaitingAddressValidation | RTT:34/17 2.194 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 2.198 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.300/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.198 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.199 Starting downloading https://server4:443/wagzwvlocp at 38:29.619 on ClientConnection[b73788b7ff6f433b/8a4666e305cc4d51(V1) with server4/193.167.100.100:443] 2.199 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 2.189 <- (1) Packet A|2|S0|8a4666e305cc4d51|259|2 CryptoFrame[0,89] Padding(139) -< CryptoStream[A|NewSessionTicket] 2.200 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.200 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.302/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 101 millis, based on 2.302/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.200 Discarding pn space Initial because first Handshake message is being sent 2.199 -> Packet A|0|S0|3eefba5805aa53b1|47|1 StreamFrame[0(CIB),0,17,fin] 2.219 -> Packet A|1|S0|3eefba5805aa53b1|32|1 AckFrame[2|Δ19] 2.229 <- (2) Packet A|3|S0|8a4666e305cc4d51|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4efd2bdfafcd8485|0279bc77b118a22563c57abe313da5f4] 2.229 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 2.300/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 96 millis, based on 2.326/App, because ackElicitingInFlight | RTT:34/17 2.230 Discarding pn space Handshake because HandshakeDone is received 2.249 -> Packet A|2|S0|3eefba5805aa53b1|32|1 AckFrame[3-2|Δ19] 2.326 loss detection timeout handler running Sending probe 0, because no ack since 2.199. Current RTT: 34/17. 2.326 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 2.580/App, because ackElicitingInFlight | RTT:34/17 2.326 -> Packet PA|3|S0|3eefba5805aa53b1|47|1 StreamFrame[0(CIB),0,17,fin] 2.354 <- (3) Packet A|4|S0|8a4666e305cc4d51|29|2 PingFrame[] Padding(1) 2.359 <- (4) Packet A|6|S0|8a4666e305cc4d51|1055|1 StreamFrame[0(CIB),0,1024,fin] 2.360 Finished downloading https://server4:443/wagzwvlocp at 38:29.781 on ClientConnection[b73788b7ff6f433b/8a4666e305cc4d51(V1) with server4/193.167.100.100:443] 2.360 Closing ClientConnection[b73788b7ff6f433b/8a4666e305cc4d51(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.360 -> Packet A|4|S0|3eefba5805aa53b1|34|1 AckFrame[6,4-2|Δ5] 2.361 Creating connection with server4:443 with v1 2.361 -> Packet A|5|S0|3eefba5805aa53b1|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-2|Δ0] 2.361 Setting up connection for downloading https://server4:443/dsuzfxjckr at 38:29.782 on ClientConnection[bfed919bb9af9f8d/ee0cbe9e5ff21830(V1) with server4/193.167.100.100:443] 2.361 Original destination connection id: bfed919bb9af9f8d (scid: ee0cbe9e5ff21830) >- CryptoStream[I|ClientHello] 2.363 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.563/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.363 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.562 loss detection timeout handler running Sending probe 0, because no ack since 2.363. Current RTT: 100/25. 2.563 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.563 (Probe is an initial retransmit) 2.563 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.963/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.563 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.598 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ2] CryptoFrame[0,123] 2.599 probe count not reset on ack because handshake not yet confirmed 2.600 Retransmitting CryptoFrame[0,257] on level Initial 2.600 Cwnd(-): 6000; inflight: 0 2.600 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.000/Initial, because peerAwaitingAddressValidation | RTT:100/25 2.600 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.000/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.600 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 2.598 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 2.604 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 2.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.604 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 2.608 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 2.814/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.607 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.608 Starting downloading https://server4:443/dsuzfxjckr at 38:30.029 on ClientConnection[bfed919bb9af9f8d/ee0cbe9e5ff21830(V1) with server4/193.167.100.100:443] 2.598 <- (1) Packet A|2|S0|ee0cbe9e5ff21830|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 2.609 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.712/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.609 Discarding pn space Initial because first Handshake message is being sent 2.609 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.712/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.609 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|35fd7c15f78c5b4d|47|1 StreamFrame[0(CIB),0,17,fin]] 2.629 -> Packet A|1|S0|35fd7c15f78c5b4d|32|1 AckFrame[2|Δ19] 2.641 <- (2) Packet A|4|S0|ee0cbe9e5ff21830|33|1 AckFrame[0|Δ1] 2.641 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.744/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.642 <- (3) Packet A|5|S0|ee0cbe9e5ff21830|1055|1 StreamFrame[0(CIB),0,1024,fin] 2.643 Finished downloading https://server4:443/dsuzfxjckr at 38:30.064 on ClientConnection[bfed919bb9af9f8d/ee0cbe9e5ff21830(V1) with server4/193.167.100.100:443] 2.643 Closing ClientConnection[bfed919bb9af9f8d/ee0cbe9e5ff21830(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.644 Creating connection with server4:443 with v1 2.644 Setting up connection for downloading https://server4:443/ocaekefopf at 38:30.065 on ClientConnection[5a01f4fcbabc55c7/b35569b0715deff8(V1) with server4/193.167.100.100:443] 2.645 Original destination connection id: 5a01f4fcbabc55c7 (scid: b35569b0715deff8) 2.644 -> Packet A|2|S0|35fd7c15f78c5b4d|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] >- CryptoStream[I|ClientHello] 2.646 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.846/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.646 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.770 <- (4) Packet A|6|S0|ee0cbe9e5ff21830|29|2 PingFrame[] Padding(1) 2.771 -> Packet A|3|S0|35fd7c15f78c5b4d|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 2.846 loss detection timeout handler running Sending probe 0, because no ack since 2.646. Current RTT: 100/25. 2.846 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.846 (Probe is an initial retransmit) 2.846 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.246/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.846 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.879 <- (1) Packet I|3|L|176|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 2.880 probe count not reset on ack because handshake not yet confirmed 2.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.280/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.879 <- (1) Packet H|4|L|764|1 CryptoFrame[0,717] 2.883 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.077/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.883 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 2.886 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.080/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.886 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.887 Starting downloading https://server4:443/ocaekefopf at 38:30.307 on ClientConnection[5a01f4fcbabc55c7/b35569b0715deff8(V1) with server4/193.167.100.100:443] 2.879 <- (1) Packet A|5|S0|b35569b0715deff8|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 2.887 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.984/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.888 Discarding pn space Initial because first Handshake message is being sent 2.888 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.985/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.888 -> [Packet H|1|L|46|1 AckFrame[4|Δ0], Packet A|0|S0|47b99b3946c6696d|47|1 StreamFrame[0(CIB),0,17,fin]] 2.907 -> Packet A|1|S0|47b99b3946c6696d|32|1 AckFrame[5|Δ19] 2.984 loss detection timeout handler running Sending probe 0, because no ack since 2.886. Current RTT: 33/16. 2.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.984 (Probe is a handshake retransmit) 2.985 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.179/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.985 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 3.124 <- (2) Packet A|9|S0|b35569b0715deff8|29|2 PingFrame[] Padding(1) 3.144 -> Packet A|2|S0|47b99b3946c6696d|34|1 AckFrame[9,5|Δ19] 3.178 loss detection timeout handler running Sending probe 1, because no ack since 2.888. Current RTT: 33/16. 3.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.178 (Probe is a handshake retransmit) 3.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 3.567/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.178 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 3.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 3.571/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.183 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 3.534 <- (3) Packet A|10|S0|b35569b0715deff8|29|2 PingFrame[] Padding(1) 3.554 -> Packet A|3|S0|47b99b3946c6696d|34|1 AckFrame[10-9,5|Δ19] 3.570 loss detection timeout handler running Sending probe 2, because no ack since 2.888. Current RTT: 33/16. 3.570 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.570 (Probe is a handshake retransmit) 3.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 4.347/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.571 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 3.572 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 4.348/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.572 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 3.586 <- (4) Packet A|11|S0|b35569b0715deff8|1084|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|9ab40b2e0a12589f|b2802dbb8995fcc3d7ea1b4c066cb6af] StreamFrame[0(CIB),0,1024,fin] 3.587 State is set to Confirmed reschedule loss detection timer for PTO over 276 millis, based on 3.864/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -577 millis, based on 3.010/App, because ackElicitingInFlight | RTT:33/16 3.587 loss detection timeout handler running Sending probe 0, because no ack since 2.888. Current RTT: 33/16. 3.587 (Probe is retransmit on level App) 3.587 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 243 millis, based on 3.832/App, because ackElicitingInFlight | RTT:33/16 3.588 Finished downloading https://server4:443/ocaekefopf at 38:31.008 on ClientConnection[5a01f4fcbabc55c7/b35569b0715deff8(V1) with server4/193.167.100.100:443] 3.588 -> Packet PA|4|S0|47b99b3946c6696d|47|1 StreamFrame[0(CIB),0,17,fin] 3.588 Closing ClientConnection[5a01f4fcbabc55c7/b35569b0715deff8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.588 -> Packet A|5|S0|47b99b3946c6696d|37|2 ConnectionCloseFrame[0|0|] AckFrame[11-9,5|Δ0] 3.589 Creating connection with server4:443 with v1 3.589 Setting up connection for downloading https://server4:443/bmauaaqeqi at 38:31.010 on ClientConnection[8aaccf988521cbd8/e0034f4387df7a3a(V1) with server4/193.167.100.100:443] 3.589 Original destination connection id: 8aaccf988521cbd8 (scid: e0034f4387df7a3a) >- CryptoStream[I|ClientHello] 3.591 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.791/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.591 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.790 loss detection timeout handler running Sending probe 0, because no ack since 3.591. Current RTT: 100/25. 3.791 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.791 (Probe is an initial retransmit) 3.791 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.191/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.791 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.190 loss detection timeout handler running Sending probe 1, because no ack since 3.791. Current RTT: 100/25. 4.190 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.190 (Probe is an initial retransmit) 4.191 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.991/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.191 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.192 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.992/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.192 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.227 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[3|Δ1] CryptoFrame[0,123] 4.227 probe count not reset on ack because handshake not yet confirmed 4.227 Retransmitting CryptoFrame[0,257] on level Initial 4.227 Cwnd(-): 6000; inflight: 1200 4.228 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 4.227 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 4.230 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 4.233 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.234 Starting downloading https://server4:443/bmauaaqeqi at 38:31.654 on ClientConnection[8aaccf988521cbd8/e0034f4387df7a3a(V1) with server4/193.167.100.100:443] 4.227 <- (1) Packet A|2|S0|e0034f4387df7a3a|259|2 CryptoFrame[0,89] Padding(139) -< CryptoStream[A|NewSessionTicket] 4.234 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.336/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.234 Discarding pn space Initial because first Handshake message is being sent 4.234 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.337/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.234 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|75ce78b5f931f02f|47|1 StreamFrame[0(CIB),0,17,fin]] 4.254 -> Packet A|1|S0|75ce78b5f931f02f|32|1 AckFrame[2|Δ19] 4.262 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 4.264 <- (3) Packet A|6|S0|e0034f4387df7a3a|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|64307962569c53f9|ebb151ecdf463ca9f67f64a8678da1c4] 4.265 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 4.335/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 96 millis, based on 4.361/App, because ackElicitingInFlight | RTT:34/17 4.265 Discarding pn space Handshake because HandshakeDone is received 4.284 -> Packet A|2|S0|75ce78b5f931f02f|34|1 AckFrame[6,2|Δ19] 4.317 <- (4) Packet A|7|S0|e0034f4387df7a3a|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 4.339 -> Packet A|3|S0|75ce78b5f931f02f|34|1 AckFrame[7-6,2|Δ19] 4.361 loss detection timeout handler running Sending probe 0, because no ack since 4.234. Current RTT: 34/17. 4.361 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 4.615/App, because ackElicitingInFlight | RTT:34/17 4.361 -> Packet PA|4|S0|75ce78b5f931f02f|47|1 StreamFrame[0(CIB),0,17,fin] 4.393 <- (5) Packet A|8|S0|e0034f4387df7a3a|33|1 AckFrame[4-1|Δ1] 4.394 Cwnd(-): 3000; inflight: 0 4.394 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 4.394 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 114 millis, based on 4.509/App, because ackElicitingInFlight | RTT:34/14 4.394 -> Packet A|5|S0|75ce78b5f931f02f|47|1 StreamFrame[0(CIB),0,17,fin] 4.394 <- (6) Packet A|9|S0|e0034f4387df7a3a|1055|1 StreamFrame[0(CIB),0,1024,fin] 4.395 Finished downloading https://server4:443/bmauaaqeqi at 38:31.815 on ClientConnection[8aaccf988521cbd8/e0034f4387df7a3a(V1) with server4/193.167.100.100:443] 4.395 Closing ClientConnection[8aaccf988521cbd8/e0034f4387df7a3a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.395 -> Packet A|6|S0|75ce78b5f931f02f|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 4.396 Creating connection with server4:443 with v1 4.396 Setting up connection for downloading https://server4:443/mxexcnkwne at 38:31.817 on ClientConnection[2871933936322698/1f9ff2de16c6e10f(V1) with server4/193.167.100.100:443] 4.396 Original destination connection id: 2871933936322698 (scid: 1f9ff2de16c6e10f) >- CryptoStream[I|ClientHello] 4.398 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.598/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.398 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.597 loss detection timeout handler running Sending probe 0, because no ack since 4.398. Current RTT: 100/25. 4.597 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.597 (Probe is an initial retransmit) 4.598 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.998/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.598 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.631 <- (1) Packet I|3|L|176|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 4.631 probe count not reset on ack because handshake not yet confirmed 4.632 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.032/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.631 <- (1) Packet H|4|L|765|1 CryptoFrame[0,718] 4.635 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.830/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.635 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 4.638 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.832/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.638 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.639 Starting downloading https://server4:443/mxexcnkwne at 38:32.060 on ClientConnection[2871933936322698/1f9ff2de16c6e10f(V1) with server4/193.167.100.100:443] 4.631 <- (1) Packet A|5|S0|1f9ff2de16c6e10f|259|2 CryptoFrame[0,89] Padding(139) 4.640 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.834/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket] 4.640 -> [Packet H|1|L|46|1 AckFrame[4|Δ0], Packet A|0|S0|b427b3b8aa8e9e6f|47|1 StreamFrame[0(CIB),0,17,fin]] 4.640 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.737/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.640 Discarding pn space Initial because first Handshake message is being sent 4.659 -> Packet A|1|S0|b427b3b8aa8e9e6f|32|1 AckFrame[5|Δ19] 4.736 loss detection timeout handler running Sending probe 0, because no ack since 4.638. Current RTT: 33/16. 4.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.737 (Probe is a handshake retransmit) 4.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.931/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.737 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 4.779 <- (2) Packet H|6|L|45|2 PingFrame[] Padding(1) 4.779 <- (2) Packet A|7|S0|1f9ff2de16c6e10f|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 4.780 -> Packet H|3|L|48|1 AckFrame[6,4|Δ0] 4.799 -> Packet A|2|S0|b427b3b8aa8e9e6f|34|1 AckFrame[7,5|Δ19] 4.930 loss detection timeout handler running Sending probe 1, because no ack since 4.640. Current RTT: 33/16. 4.930 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.930 (Probe is a handshake retransmit) 4.931 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 5.319/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.931 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 4.932 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 5.320/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.932 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 4.962 <- (3) Packet A|10|S0|1f9ff2de16c6e10f|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b4eb871c8642b2a0|1a1d6c2f04b71cf4bf8e9e5a2196ae92] 4.962 State is set to Confirmed reschedule loss detection timer for PTO over 165 millis, based on 5.128/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -200 millis, based on 4.762/App, because ackElicitingInFlight | RTT:33/16 4.963 loss detection timeout handler running 4.963 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 4.640. Current RTT: 33/16. 4.963 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 5.207/App, because ackElicitingInFlight | RTT:33/16 4.963 -> Packet PA|3|S0|b427b3b8aa8e9e6f|47|1 StreamFrame[0(CIB),0,17,fin] 4.982 -> Packet A|4|S0|b427b3b8aa8e9e6f|36|1 AckFrame[10,7,5|Δ19] 4.996 <- (4) Packet A|12|S0|1f9ff2de16c6e10f|1055|1 StreamFrame[0(CIB),0,1024,fin] 4.997 Finished downloading https://server4:443/mxexcnkwne at 38:32.417 on ClientConnection[2871933936322698/1f9ff2de16c6e10f(V1) with server4/193.167.100.100:443] 4.997 Closing ClientConnection[2871933936322698/1f9ff2de16c6e10f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.997 -> Packet A|5|S0|b427b3b8aa8e9e6f|41|2 ConnectionCloseFrame[0|0|] AckFrame[12,10,7,5|Δ0] 4.997 Creating connection with server4:443 with v1 4.998 Setting up connection for downloading https://server4:443/ndgkpznemd at 38:32.418 on ClientConnection[bb5d0e3cc7acf4e3/0591e6be8a5c1e25(V1) with server4/193.167.100.100:443] 4.998 Original destination connection id: bb5d0e3cc7acf4e3 (scid: 0591e6be8a5c1e25) >- CryptoStream[I|ClientHello] 4.999 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.199/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.999 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.034 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 5.035 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.235/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.034 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 5.037 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.139/Handshake, because peerAwaitingAddressValidation | RTT:34/17 5.037 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 5.040 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.142/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.040 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.041 Starting downloading https://server4:443/ndgkpznemd at 38:32.461 on ClientConnection[bb5d0e3cc7acf4e3/0591e6be8a5c1e25(V1) with server4/193.167.100.100:443] 5.034 <- (1) Packet A|2|S0|0591e6be8a5c1e25|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 5.041 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.041 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.041 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|3578f40468054442|47|1 StreamFrame[0(CIB),0,17,fin]] 5.041 Discarding pn space Initial because first Handshake message is being sent 5.061 -> Packet A|1|S0|3578f40468054442|32|1 AckFrame[2|Δ19] 5.143 loss detection timeout handler running Sending probe 0, because no ack since 5.040. Current RTT: 34/17. 5.143 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.143 (Probe is a handshake retransmit) 5.143 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 5.347/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.143 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 5.174 <- (2) Packet A|3|S0|0591e6be8a5c1e25|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|288f7c65602d429b|8d98d52df24b86628a9b781279117b1d] 5.175 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 5.295/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 5.168/App, because ackElicitingInFlight | RTT:34/17 5.175 loss detection timeout handler running 5.175 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 5.041. Current RTT: 34/17. 5.175 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 5.429/App, because ackElicitingInFlight | RTT:34/17 5.175 -> Packet PA|2|S0|3578f40468054442|47|1 StreamFrame[0(CIB),0,17,fin] 5.195 -> Packet A|3|S0|3578f40468054442|32|1 AckFrame[3-2|Δ19] 5.429 loss detection timeout handler running Sending probe 1, because no ack since 5.175. Current RTT: 34/17. 5.429 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 5.937/App, because ackElicitingInFlight | RTT:34/17 5.429 -> Packet PA|4|S0|3578f40468054442|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 5.938/App, because ackElicitingInFlight | RTT:34/17 5.430 -> Packet PA|5|S0|3578f40468054442|47|1 StreamFrame[0(CIB),0,17,fin] 5.461 <- (3) Packet A|4|S0|0591e6be8a5c1e25|32|1 AckFrame[5-3|Δ0] 5.462 Cwnd(-): 6000; inflight: 0 5.462 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 5.462 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 114 millis, based on 5.577/App, because ackElicitingInFlight | RTT:34/14 5.462 -> Packet A|6|S0|3578f40468054442|47|1 StreamFrame[0(CIB),0,17,fin] 5.462 <- (4) Packet A|5|S0|0591e6be8a5c1e25|1055|1 StreamFrame[0(CIB),0,1024,fin] 5.463 Finished downloading https://server4:443/ndgkpznemd at 38:32.883 on ClientConnection[bb5d0e3cc7acf4e3/0591e6be8a5c1e25(V1) with server4/193.167.100.100:443] 5.463 Closing ClientConnection[bb5d0e3cc7acf4e3/0591e6be8a5c1e25(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.464 Creating connection with server4:443 with v1 5.463 -> Packet A|7|S0|3578f40468054442|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 5.464 Setting up connection for downloading https://server4:443/twaokmzjox at 38:32.885 on ClientConnection[ce74499f6ea5c139/36944c8f3a6d9c26(V1) with server4/193.167.100.100:443] 5.464 Original destination connection id: ce74499f6ea5c139 (scid: 36944c8f3a6d9c26) >- CryptoStream[I|ClientHello] 5.466 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.666/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.466 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.494 <- (5) Packet A|6|S0|0591e6be8a5c1e25|33|1 AckFrame[6-3|Δ1] 5.494 -> Packet A|8|S0|3578f40468054442|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 5.501 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 5.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.701/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.501 <- (1) Packet H|1|L|766|1 CryptoFrame[0,719] 5.504 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.606/Handshake, because peerAwaitingAddressValidation | RTT:34/17 5.504 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.507 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.609/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.507 -> Packet H|0|L|80|1 CryptoFrame[0,36] 5.501 <- (1) Packet A|2|S0|36944c8f3a6d9c26|257|2 CryptoFrame[0,89] Padding(137) -< CryptoStream[A|NewSessionTicket] 5.507 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.609/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.507 Discarding pn space Initial because first Handshake message is being sent 5.507 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 5.508 Starting downloading https://server4:443/twaokmzjox at 38:32.928 on ClientConnection[ce74499f6ea5c139/36944c8f3a6d9c26(V1) with server4/193.167.100.100:443] 5.508 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.610/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.508 -> Packet A|0|S0|ec426d825297f3b6|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 5.538 <- (2) Packet A|3|S0|36944c8f3a6d9c26|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|92a1dd9d2da7b25f|6f5596216bd203d8e50020f8f8d9a760] 5.539 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 5.609/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 96 millis, based on 5.635/App, because ackElicitingInFlight | RTT:34/17 5.539 Discarding pn space Handshake because HandshakeDone is received 5.541 <- (3) Packet A|5|S0|36944c8f3a6d9c26|1055|1 StreamFrame[0(CIB),0,1024,fin] 5.541 Finished downloading https://server4:443/twaokmzjox at 38:32.962 on ClientConnection[ce74499f6ea5c139/36944c8f3a6d9c26(V1) with server4/193.167.100.100:443] 5.541 -> Packet A|1|S0|ec426d825297f3b6|34|1 AckFrame[5,3-2|Δ2] 5.541 Closing ClientConnection[ce74499f6ea5c139/36944c8f3a6d9c26(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.542 Creating connection with server4:443 with v1 5.542 -> Packet A|2|S0|ec426d825297f3b6|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 5.543 Setting up connection for downloading https://server4:443/kgvbnriewm at 38:32.963 on ClientConnection[92ec11890f64d144/4568d56bed105c8c(V1) with server4/193.167.100.100:443] 5.543 Original destination connection id: 92ec11890f64d144 (scid: 4568d56bed105c8c) >- CryptoStream[I|ClientHello] 5.544 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.744/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.544 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.580 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 5.581 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.781/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.580 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 5.584 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 5.687/Handshake, because peerAwaitingAddressValidation | RTT:35/17 5.584 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 5.586 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 5.689/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 5.586 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.587 Starting downloading https://server4:443/kgvbnriewm at 38:33.007 on ClientConnection[92ec11890f64d144/4568d56bed105c8c(V1) with server4/193.167.100.100:443] 5.580 <- (1) Packet A|2|S0|4568d56bed105c8c|258|2 CryptoFrame[0,89] Padding(138) 5.587 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 5.587 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 5.690/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 5.587 Discarding pn space Initial because first Handshake message is being sent 5.587 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 5.690/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 5.587 -> Packet A|0|S0|641b7082bc496330|47|1 StreamFrame[0(CIB),0,17,fin] 5.607 -> Packet A|1|S0|641b7082bc496330|32|1 AckFrame[2|Δ19] 5.617 <- (2) Packet A|3|S0|4568d56bed105c8c|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c9db30cbbffb4710|74f564ccf89cbd2996fccbc26d8ab845] 5.618 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 5.689/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 97 millis, based on 5.715/App, because ackElicitingInFlight | RTT:35/17 5.618 Discarding pn space Handshake because HandshakeDone is received 5.620 <- (3) Packet A|5|S0|4568d56bed105c8c|1055|1 StreamFrame[0(CIB),0,1024,fin] 5.621 Finished downloading https://server4:443/kgvbnriewm at 38:33.041 on ClientConnection[92ec11890f64d144/4568d56bed105c8c(V1) with server4/193.167.100.100:443] 5.620 -> Packet A|2|S0|641b7082bc496330|34|1 AckFrame[5,3-2|Δ2] 5.621 Closing ClientConnection[92ec11890f64d144/4568d56bed105c8c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.621 -> Packet A|3|S0|641b7082bc496330|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 5.621 Creating connection with server4:443 with v1 5.622 Setting up connection for downloading https://server4:443/shrtfwjvzn at 38:33.042 on ClientConnection[0d3188550109a1a5/41787b7d0d585ef7(V1) with server4/193.167.100.100:443] 5.622 Original destination connection id: 0d3188550109a1a5 (scid: 41787b7d0d585ef7) >- CryptoStream[I|ClientHello] 5.624 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.824/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.623 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.658 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 5.659 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.859/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.658 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 5.661 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.763/Handshake, because peerAwaitingAddressValidation | RTT:34/17 5.661 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 5.665 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.767/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.664 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.665 Starting downloading https://server4:443/shrtfwjvzn at 38:33.086 on ClientConnection[0d3188550109a1a5/41787b7d0d585ef7(V1) with server4/193.167.100.100:443] 5.658 <- (1) Packet A|2|S0|41787b7d0d585ef7|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 5.665 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.767/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.665 Discarding pn space Initial because first Handshake message is being sent 5.666 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.768/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.665 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|33bdb345a37d08f1|47|1 StreamFrame[0(CIB),0,17,fin]] 5.685 -> Packet A|1|S0|33bdb345a37d08f1|32|1 AckFrame[2|Δ19] 5.696 <- (2) Packet A|3|S0|41787b7d0d585ef7|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|26cc21edbe0f69c6|3b4284da0e1a5ea9c86ecee93ce0a11f] 5.696 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 5.766/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 96 millis, based on 5.792/App, because ackElicitingInFlight | RTT:34/17 5.696 Discarding pn space Handshake because HandshakeDone is received 5.698 <- (3) Packet A|5|S0|41787b7d0d585ef7|1055|1 StreamFrame[0(CIB),0,1024,fin] 5.699 Finished downloading https://server4:443/shrtfwjvzn at 38:33.120 on ClientConnection[0d3188550109a1a5/41787b7d0d585ef7(V1) with server4/193.167.100.100:443] 5.699 -> Packet A|2|S0|33bdb345a37d08f1|34|1 AckFrame[5,3-2|Δ2] 5.699 Closing ClientConnection[0d3188550109a1a5/41787b7d0d585ef7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.700 -> Packet A|3|S0|33bdb345a37d08f1|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 5.700 Creating connection with server4:443 with v1 5.701 Setting up connection for downloading https://server4:443/drojwqjpiu at 38:33.121 on ClientConnection[6ffeeffe3beaa0d3/c041a39041b4bf89(V1) with server4/193.167.100.100:443] 5.701 Original destination connection id: 6ffeeffe3beaa0d3 (scid: c041a39041b4bf89) >- CryptoStream[I|ClientHello] 5.702 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.902/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.702 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.902 loss detection timeout handler running Sending probe 0, because no ack since 5.702. Current RTT: 100/25. 5.902 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.902 (Probe is an initial retransmit) 5.902 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.302/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.902 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.137 <- (1) Packet I|6|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 6.137 <- (1) Packet H|7|L|765|1 CryptoFrame[0,718] 6.142 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 6.542/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.142 -> Packet I|2|L|1201|2 Token=[] AckFrame[6|Δ0] Padding(1153) >- CryptoStream[H|Finished] 6.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 6.545/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.144 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.145 Starting downloading https://server4:443/drojwqjpiu at 38:33.565 on ClientConnection[6ffeeffe3beaa0d3/c041a39041b4bf89(V1) with server4/193.167.100.100:443] 6.137 <- (1) Packet A|8|S0|c041a39041b4bf89|264|2 CryptoFrame[0,89] Padding(144) 6.145 -> Packet H|1|L|46|1 AckFrame[7|Δ0] -< CryptoStream[A|NewSessionTicket] 6.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.345/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.145 Discarding pn space Initial because first Handshake message is being sent 6.146 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.346/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.145 -> Packet A|0|S0|9c2ba77586e76708|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8|Δ0] 6.345 loss detection timeout handler running Sending probe 0, because no ack since 6.144. Current RTT: 100/25. 6.345 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.345 (Probe is a handshake retransmit) 6.345 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 6.745/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.345 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 6.498 <- (2) Packet A|12|S0|c041a39041b4bf89|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 6.518 -> Packet A|1|S0|9c2ba77586e76708|34|1 AckFrame[12,8|Δ19] 6.549 <- (3) Packet A|13|S0|c041a39041b4bf89|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b7dad32fff4d3fba|7ecb37f98bba0a75ae1b42df74d7641f] 6.550 State is set to Confirmed reschedule loss detection timer for PTO over 45 millis, based on 6.595/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -179 millis, based on 6.370/App, because ackElicitingInFlight | RTT:100/25 6.550 loss detection timeout handler running 6.550 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 6.145. Current RTT: 100/25. 6.550 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 7.000/App, because ackElicitingInFlight | RTT:100/25 6.550 -> Packet PA|2|S0|9c2ba77586e76708|47|1 StreamFrame[0(CIB),0,17,fin] 6.570 -> Packet A|3|S0|9c2ba77586e76708|34|1 AckFrame[13-12,8|Δ19] 6.582 <- (4) Packet A|14|S0|c041a39041b4bf89|33|1 AckFrame[2-1|Δ1] 6.583 Cwnd(-): 6000; inflight: 0 6.583 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.583 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 6.699/App, because ackElicitingInFlight | RTT:31/15 6.583 -> Packet A|4|S0|9c2ba77586e76708|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[13|Δ0] 6.583 <- (5) Packet A|15|S0|c041a39041b4bf89|1055|1 StreamFrame[0(CIB),0,1024,fin] 6.584 Finished downloading https://server4:443/drojwqjpiu at 38:34.004 on ClientConnection[6ffeeffe3beaa0d3/c041a39041b4bf89(V1) with server4/193.167.100.100:443] 6.584 Closing ClientConnection[6ffeeffe3beaa0d3/c041a39041b4bf89(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.584 -> Packet A|5|S0|9c2ba77586e76708|35|2 ConnectionCloseFrame[0|0|] AckFrame[15-13|Δ0] 6.584 Creating connection with server4:443 with v1 6.585 Setting up connection for downloading https://server4:443/txcqtzvamv at 38:34.006 on ClientConnection[e439c5b3e085f773/b983b4284baa5794(V1) with server4/193.167.100.100:443] 6.585 Original destination connection id: e439c5b3e085f773 (scid: b983b4284baa5794) >- CryptoStream[I|ClientHello] 6.587 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.787/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.586 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.621 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 6.622 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.822/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.621 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 6.624 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.726/Handshake, because peerAwaitingAddressValidation | RTT:34/17 6.624 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 6.627 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.729/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.627 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.627 Starting downloading https://server4:443/txcqtzvamv at 38:34.048 on ClientConnection[e439c5b3e085f773/b983b4284baa5794(V1) with server4/193.167.100.100:443] 6.627 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 6.621 <- (1) Packet A|2|S0|b983b4284baa5794|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 6.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.730/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.628 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 101 millis, based on 6.730/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.628 -> Packet A|0|S0|b0f31770cc99a71a|47|1 StreamFrame[0(CIB),0,17,fin] 6.647 -> Packet A|1|S0|b0f31770cc99a71a|32|1 AckFrame[2|Δ19] 6.729 loss detection timeout handler running Sending probe 0, because no ack since 6.627. Current RTT: 34/17. 6.729 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.729 (Probe is a handshake retransmit) 6.730 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 6.934/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.730 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 6.739 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 6.740 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] 6.739 <- (2) Packet A|4|S0|b983b4284baa5794|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 6.759 -> Packet A|2|S0|b0f31770cc99a71a|34|1 AckFrame[4,2|Δ19] 6.761 <- (3) Packet A|5|S0|b983b4284baa5794|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e09ab200c49ac9a7|58d58e35a90f45d2bff15770a9e3e92a] 6.761 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 6.882/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 6.755/App, because ackElicitingInFlight | RTT:34/17 6.762 Discarding pn space Handshake because HandshakeDone is received 6.762 loss detection timeout handler running Sending probe 0, because no ack since 6.628. Current RTT: 34/17. 6.762 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 7.016/App, because ackElicitingInFlight | RTT:34/17 6.762 -> Packet PA|3|S0|b0f31770cc99a71a|47|1 StreamFrame[0(CIB),0,17,fin] 6.781 -> Packet A|4|S0|b0f31770cc99a71a|34|1 AckFrame[5-4,2|Δ19] 6.795 <- (4) Packet A|7|S0|b983b4284baa5794|1055|1 StreamFrame[0(CIB),0,1024,fin] 6.796 Finished downloading https://server4:443/txcqtzvamv at 38:34.216 on ClientConnection[e439c5b3e085f773/b983b4284baa5794(V1) with server4/193.167.100.100:443] 6.796 Closing ClientConnection[e439c5b3e085f773/b983b4284baa5794(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.796 -> Packet A|5|S0|b0f31770cc99a71a|39|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4,2|Δ0] 6.796 Creating connection with server4:443 with v1 6.797 Setting up connection for downloading https://server4:443/qhvzsjjfym at 38:34.218 on ClientConnection[6776edf4175cb624/090a495e11e1c17a(V1) with server4/193.167.100.100:443] 6.797 Original destination connection id: 6776edf4175cb624 (scid: 090a495e11e1c17a) >- CryptoStream[I|ClientHello] 6.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.999/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.798 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.833 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 6.834 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.034/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.836 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.833 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] reschedule loss detection timer for PTO over 101 millis, based on 6.938/Handshake, because peerAwaitingAddressValidation | RTT:34/17 6.836 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 6.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.940/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.838 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.839 Starting downloading https://server4:443/qhvzsjjfym at 38:34.259 on ClientConnection[6776edf4175cb624/090a495e11e1c17a(V1) with server4/193.167.100.100:443] 6.833 <- (1) Packet A|2|S0|090a495e11e1c17a|258|2 CryptoFrame[0,89] Padding(138) 6.839 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 6.839 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.941/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.839 -> Packet A|0|S0|6ad2615dac5bbaf4|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 6.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.942/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.840 Discarding pn space Initial because first Handshake message is being sent 6.859 -> Packet A|1|S0|6ad2615dac5bbaf4|32|1 AckFrame[2|Δ19] 6.941 loss detection timeout handler running Sending probe 0, because no ack since 6.838. Current RTT: 34/17. 6.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.941 (Probe is a handshake retransmit) 6.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 7.145/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.941 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 6.969 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 6.969 <- (2) Packet A|4|S0|090a495e11e1c17a|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 6.970 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] 6.972 <- (3) Packet A|5|S0|090a495e11e1c17a|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|905937a930a2fd9d|39ef9d65237b80a1200bfd8bbbad6d5a] 6.972 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 7.093/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 6.966/App, because ackElicitingInFlight | RTT:34/17 6.973 loss detection timeout handler running 6.973 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 6.839. Current RTT: 34/17. 6.973 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 7.227/App, because ackElicitingInFlight | RTT:34/17 6.973 -> Packet PA|2|S0|6ad2615dac5bbaf4|55|2 AckFrame[5-4,2|Δ2] StreamFrame[0(CIB),0,17,fin] 7.109 <- (4) Packet A|6|S0|090a495e11e1c17a|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 7.129 -> Packet A|3|S0|6ad2615dac5bbaf4|34|1 AckFrame[6-4,2|Δ19] 7.226 loss detection timeout handler running Sending probe 1, because no ack since 6.973. Current RTT: 34/17. 7.226 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 7.734/App, because ackElicitingInFlight | RTT:34/17 7.226 -> Packet PA|4|S0|6ad2615dac5bbaf4|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 7.735/App, because ackElicitingInFlight | RTT:34/17 7.227 -> Packet PA|5|S0|6ad2615dac5bbaf4|47|1 StreamFrame[0(CIB),0,17,fin] 7.735 loss detection timeout handler running Sending probe 2, because no ack since 7.227. Current RTT: 34/17. 7.735 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1015 millis, based on 8.751/App, because ackElicitingInFlight | RTT:34/17 7.735 -> Packet PA|6|S0|6ad2615dac5bbaf4|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1015 millis, based on 8.752/App, because ackElicitingInFlight | RTT:34/17 7.736 -> Packet PA|7|S0|6ad2615dac5bbaf4|47|1 StreamFrame[0(CIB),0,17,fin] 7.769 <- (5) Packet A|9|S0|090a495e11e1c17a|35|1 AckFrame[7-6,3|Δ1] 7.769 Cwnd(-): 6000; inflight: 0 7.769 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.769 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 7.880/App, because ackElicitingInFlight | RTT:34/13 7.769 -> Packet A|8|S0|6ad2615dac5bbaf4|47|1 StreamFrame[0(CIB),0,17,fin] 7.801 <- (6) Packet A|10|S0|090a495e11e1c17a|35|1 AckFrame[8-6,3|Δ1] 7.802 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.770 <- (7) Packet A|14|S0|090a495e11e1c17a|29|2 PingFrame[] Padding(1) 9.790 -> Packet A|9|S0|6ad2615dac5bbaf4|34|1 AckFrame[14,10-9|Δ19] 9.822 <- (8) Packet A|15|S0|090a495e11e1c17a|1055|1 StreamFrame[0(CIB),0,1024,fin] 9.823 Finished downloading https://server4:443/qhvzsjjfym at 38:37.243 on ClientConnection[6776edf4175cb624/090a495e11e1c17a(V1) with server4/193.167.100.100:443] 9.823 Closing ClientConnection[6776edf4175cb624/090a495e11e1c17a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.823 -> Packet A|10|S0|6ad2615dac5bbaf4|37|2 ConnectionCloseFrame[0|0|] AckFrame[15-14,10-9|Δ0] 9.823 Creating connection with server4:443 with v1 9.824 Setting up connection for downloading https://server4:443/azybahsnfz at 38:37.244 on ClientConnection[ab2666adab2a00ad/d1cad7f3877bb81b(V1) with server4/193.167.100.100:443] 9.824 Original destination connection id: ab2666adab2a00ad (scid: d1cad7f3877bb81b) >- CryptoStream[I|ClientHello] 9.826 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.026/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.825 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.861 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 9.862 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.062/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.861 <- (1) Packet H|1|L|766|1 CryptoFrame[0,719] 9.864 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 9.967/Handshake, because peerAwaitingAddressValidation | RTT:35/17 9.864 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 9.867 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 9.970/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 9.867 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.867 Starting downloading https://server4:443/azybahsnfz at 38:37.288 on ClientConnection[ab2666adab2a00ad/d1cad7f3877bb81b(V1) with server4/193.167.100.100:443] 9.861 <- (1) Packet A|2|S0|d1cad7f3877bb81b|257|2 CryptoFrame[0,89] Padding(137) -< CryptoStream[A|NewSessionTicket] 9.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 9.971/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 9.868 Discarding pn space Initial because first Handshake message is being sent 9.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 9.971/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 9.868 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|ad9a31eb044a541a|47|1 StreamFrame[0(CIB),0,17,fin]] 9.888 -> Packet A|1|S0|ad9a31eb044a541a|32|1 AckFrame[2|Δ19] 9.970 loss detection timeout handler running Sending probe 0, because no ack since 9.867. Current RTT: 35/17. 9.970 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.970 (Probe is a handshake retransmit) 9.971 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 10.177/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 9.971 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 10.146 <- (2) Packet A|4|S0|d1cad7f3877bb81b|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 10.165 -> Packet A|2|S0|ad9a31eb044a541a|34|1 AckFrame[4,2|Δ19] 10.176 loss detection timeout handler running Sending probe 1, because no ack since 9.868. Current RTT: 35/17. 10.176 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.176 (Probe is a handshake retransmit) 10.177 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 10.589/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 10.177 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 10.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 10.590/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 10.178 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 10.196 <- (3) Packet A|5|S0|d1cad7f3877bb81b|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a336379d4c43d51b|62451a874254c90054310006df08d35d] 10.197 State is set to Confirmed reschedule loss detection timer for PTO over 183 millis, based on 10.380/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -200 millis, based on 9.996/App, because ackElicitingInFlight | RTT:35/17 10.197 Discarding pn space Handshake because HandshakeDone is received 10.197 loss detection timeout handler running Sending probe 0, because no ack since 9.868. Current RTT: 35/17. 10.197 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 10.453/App, because ackElicitingInFlight | RTT:35/17 10.197 -> Packet PA|3|S0|ad9a31eb044a541a|47|1 StreamFrame[0(CIB),0,17,fin] 10.216 -> Packet A|4|S0|ad9a31eb044a541a|34|1 AckFrame[5-4,2|Δ19] 10.229 <- (4) Packet A|6|S0|d1cad7f3877bb81b|33|1 AckFrame[3-2|Δ1] 10.229 Cwnd(-): 6000; inflight: 0 10.229 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.229 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 115 millis, based on 10.346/App, because ackElicitingInFlight | RTT:35/14 10.230 -> Packet A|5|S0|ad9a31eb044a541a|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 10.262 <- (5) Packet A|8|S0|d1cad7f3877bb81b|36|2 AckFrame[5,3-2|Δ1] PingFrame[] 10.262 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.281 -> Packet A|6|S0|ad9a31eb044a541a|34|1 AckFrame[8,6|Δ19] 10.313 <- (6) Packet A|9|S0|d1cad7f3877bb81b|1055|1 StreamFrame[0(CIB),0,1024,fin] 10.314 Finished downloading https://server4:443/azybahsnfz at 38:37.734 on ClientConnection[ab2666adab2a00ad/d1cad7f3877bb81b(V1) with server4/193.167.100.100:443] 10.314 Closing ClientConnection[ab2666adab2a00ad/d1cad7f3877bb81b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.314 -> Packet A|7|S0|ad9a31eb044a541a|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,6|Δ0] 10.314 Creating connection with server4:443 with v1 10.315 Setting up connection for downloading https://server4:443/qluocqtdww at 38:37.735 on ClientConnection[4fc99bcf7c664d97/c64f31356afbf156(V1) with server4/193.167.100.100:443] 10.315 Original destination connection id: 4fc99bcf7c664d97 (scid: c64f31356afbf156) >- CryptoStream[I|ClientHello] 10.316 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.517/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.316 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.452 <- (7) Packet A|10|S0|d1cad7f3877bb81b|29|2 PingFrame[] Padding(1) 10.452 -> Packet A|8|S0|ad9a31eb044a541a|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,6|Δ0] 10.516 loss detection timeout handler running Sending probe 0, because no ack since 10.316. Current RTT: 100/25. 10.516 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.516 (Probe is an initial retransmit) 10.516 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.916/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.516 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.551 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 10.552 probe count not reset on ack because handshake not yet confirmed 10.552 Retransmitting CryptoFrame[0,257] on level Initial 10.552 Cwnd(-): 6000; inflight: 0 10.552 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.952/Initial, because peerAwaitingAddressValidation | RTT:100/25 10.552 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 10.756/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.552 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 10.551 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 10.555 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 10.759/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.555 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 10.558 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 10.762/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.558 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.558 Starting downloading https://server4:443/qluocqtdww at 38:37.979 on ClientConnection[4fc99bcf7c664d97/c64f31356afbf156(V1) with server4/193.167.100.100:443] 10.551 <- (1) Packet A|2|S0|c64f31356afbf156|258|2 CryptoFrame[0,89] Padding(138) 10.558 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 10.558 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.660/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.559 Discarding pn space Initial because first Handshake message is being sent 10.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.661/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.559 -> Packet A|0|S0|5312e2450f5a0966|47|1 StreamFrame[0(CIB),0,17,fin] 10.578 -> Packet A|1|S0|5312e2450f5a0966|32|1 AckFrame[2|Δ19] 10.585 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.589 <- (3) Packet A|6|S0|c64f31356afbf156|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5d2619593657fe9a|f11a41c5dd68c14822010e698b191faa] 10.590 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 10.660/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 10.686/App, because ackElicitingInFlight | RTT:34/17 10.590 Discarding pn space Handshake because HandshakeDone is received 10.591 <- (4) Packet A|7|S0|c64f31356afbf156|33|1 AckFrame[0|Δ1] 10.591 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.592 <- (5) Packet A|8|S0|c64f31356afbf156|1055|1 StreamFrame[0(CIB),0,1024,fin] 10.592 -> Packet A|2|S0|5312e2450f5a0966|34|1 AckFrame[8-6,2|Δ2] 10.592 Finished downloading https://server4:443/qluocqtdww at 38:38.013 on ClientConnection[4fc99bcf7c664d97/c64f31356afbf156(V1) with server4/193.167.100.100:443] 10.592 Closing ClientConnection[4fc99bcf7c664d97/c64f31356afbf156(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.593 -> Packet A|3|S0|5312e2450f5a0966|37|2 ConnectionCloseFrame[0|0|] AckFrame[8-6,2|Δ0] 10.593 Creating connection with server4:443 with v1 10.594 Setting up connection for downloading https://server4:443/dcszpqzihw at 38:38.014 on ClientConnection[51baf94663fc4071/5edb633cb6ded305(V1) with server4/193.167.100.100:443] 10.594 Original destination connection id: 51baf94663fc4071 (scid: 5edb633cb6ded305) >- CryptoStream[I|ClientHello] 10.595 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.795/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.595 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.630 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 10.631 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.831/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.630 <- (1) Packet H|1|L|766|1 CryptoFrame[0,719] 10.633 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.735/Handshake, because peerAwaitingAddressValidation | RTT:34/17 10.633 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 10.635 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.737/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.635 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.635 Starting downloading https://server4:443/dcszpqzihw at 38:38.056 on ClientConnection[51baf94663fc4071/5edb633cb6ded305(V1) with server4/193.167.100.100:443] 10.630 <- (1) Packet A|2|S0|5edb633cb6ded305|257|2 CryptoFrame[0,89] Padding(137) 10.635 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 10.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.738/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.636 Discarding pn space Initial because first Handshake message is being sent 10.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.738/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.636 -> Packet A|0|S0|41390c21ecd19aae|47|1 StreamFrame[0(CIB),0,17,fin] 10.655 -> Packet A|1|S0|41390c21ecd19aae|32|1 AckFrame[2|Δ19] 10.737 loss detection timeout handler running Sending probe 0, because no ack since 10.635. Current RTT: 34/17. 10.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.737 (Probe is a handshake retransmit) 10.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 10.941/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.737 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 10.940 loss detection timeout handler running Sending probe 1, because no ack since 10.636. Current RTT: 34/17. 10.940 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.941 (Probe is a handshake retransmit) 10.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 11.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.941 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 10.942 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 11.350/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.942 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 10.972 <- (2) Packet A|6|S0|5edb633cb6ded305|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|03d832150822ed51|30bf8341d0ee2a8314bb162baebca352] 10.973 State is set to Confirmed reschedule loss detection timer for PTO over 171 millis, based on 11.144/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -210 millis, based on 10.763/App, because ackElicitingInFlight | RTT:34/17 10.973 loss detection timeout handler running Sending probe 0, because no ack since 10.636. Current RTT: 34/17. 10.973 (Probe is retransmit on level App) 10.973 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 253 millis, based on 11.227/App, because ackElicitingInFlight | RTT:34/17 10.973 -> Packet PA|2|S0|41390c21ecd19aae|47|1 StreamFrame[0(CIB),0,17,fin] 10.992 -> Packet A|3|S0|41390c21ecd19aae|34|1 AckFrame[6,2|Δ19] 11.006 <- (3) Packet A|8|S0|5edb633cb6ded305|1055|1 StreamFrame[0(CIB),0,1024,fin] 11.007 Finished downloading https://server4:443/dcszpqzihw at 38:38.427 on ClientConnection[51baf94663fc4071/5edb633cb6ded305(V1) with server4/193.167.100.100:443] 11.007 Closing ClientConnection[51baf94663fc4071/5edb633cb6ded305(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.007 -> Packet A|4|S0|41390c21ecd19aae|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,6,2|Δ0] 11.007 Creating connection with server4:443 with v1 11.008 Setting up connection for downloading https://server4:443/jnnaevhhfx at 38:38.428 on ClientConnection[64babf211146cad5/098e1985bd1232ae(V1) with server4/193.167.100.100:443] 11.008 Original destination connection id: 64babf211146cad5 (scid: 098e1985bd1232ae) >- CryptoStream[I|ClientHello] 11.010 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.210/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.009 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.023 <- (4) Packet A|9|S0|5edb633cb6ded305|120|1 CryptoFrame[0,89] 11.024 -> Packet A|5|S0|41390c21ecd19aae|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,6,2|Δ0] 11.209 loss detection timeout handler running Sending probe 0, because no ack since 11.009. Current RTT: 100/25. 11.209 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.209 (Probe is an initial retransmit) 11.209 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.609/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.209 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.608 loss detection timeout handler running Sending probe 1, because no ack since 11.209. Current RTT: 100/25. 11.608 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.609 (Probe is an initial retransmit) 11.609 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 12.409/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.609 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.610 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 12.410/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.610 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.643 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ1] CryptoFrame[0,123] 11.644 probe count not reset on ack because handshake not yet confirmed 11.644 Retransmitting CryptoFrame[0,257] on level Initial 11.644 Cwnd(-): 6000; inflight: 1200 11.644 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 12.444/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.644 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 12.052/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.644 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 11.643 <- (1) Packet H|1|L|766|1 CryptoFrame[0,719] 11.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 12.055/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.647 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 11.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 12.057/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.649 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.649 Starting downloading https://server4:443/jnnaevhhfx at 38:39.070 on ClientConnection[64babf211146cad5/098e1985bd1232ae(V1) with server4/193.167.100.100:443] 11.649 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 11.643 <- (1) Packet A|2|S0|098e1985bd1232ae|257|2 CryptoFrame[0,89] Padding(137) 11.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 12.058/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 -< CryptoStream[A|NewSessionTicket] 11.650 -> Packet A|0|S0|2cba9596a6f2c3cd|47|1 StreamFrame[0(CIB),0,17,fin] 11.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 11.752/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.650 Discarding pn space Initial because first Handshake message is being sent 11.669 -> Packet A|1|S0|2cba9596a6f2c3cd|32|1 AckFrame[2|Δ19] 11.678 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 11.680 <- (3) Packet A|6|S0|098e1985bd1232ae|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4677a7039cbb9c3c|8eced30bc517ed299b9fd3bca3ee2fa2] 11.680 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 11.751/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 96 millis, based on 11.777/App, because ackElicitingInFlight | RTT:34/17 11.681 Discarding pn space Handshake because HandshakeDone is received 11.683 <- (4) Packet A|8|S0|098e1985bd1232ae|1055|1 StreamFrame[0(CIB),0,1024,fin] 11.683 Finished downloading https://server4:443/jnnaevhhfx at 38:39.104 on ClientConnection[64babf211146cad5/098e1985bd1232ae(V1) with server4/193.167.100.100:443] 11.683 Closing ClientConnection[64babf211146cad5/098e1985bd1232ae(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.683 -> Packet A|2|S0|2cba9596a6f2c3cd|36|1 AckFrame[8,6,2|Δ2] 11.684 -> Packet A|3|S0|2cba9596a6f2c3cd|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,6,2|Δ0] 11.684 Creating connection with server4:443 with v1 11.684 Setting up connection for downloading https://server4:443/xszmpukwze at 38:39.105 on ClientConnection[4af453c6a4ff6282/0c53a639911e31c1(V1) with server4/193.167.100.100:443] 11.684 Original destination connection id: 4af453c6a4ff6282 (scid: 0c53a639911e31c1) >- CryptoStream[I|ClientHello] 11.686 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.886/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.686 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.837 <- (5) Packet A|10|S0|098e1985bd1232ae|121|2 PingFrame[] CryptoFrame[0,89] 11.837 -> Packet A|4|S0|2cba9596a6f2c3cd|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,6,2|Δ0] 11.885 loss detection timeout handler running Sending probe 0, because no ack since 11.686. Current RTT: 100/25. 11.885 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.885 (Probe is an initial retransmit) 11.885 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.285/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.885 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.119 <- (1) Packet I|6|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 12.119 <- (1) Packet H|7|L|765|1 CryptoFrame[0,718] 12.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 12.522/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.121 -> Packet I|2|L|1201|2 Token=[] AckFrame[6|Δ0] Padding(1153) >- CryptoStream[H|Finished] 12.124 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 12.524/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.124 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.125 Starting downloading https://server4:443/xszmpukwze at 38:39.546 on ClientConnection[4af453c6a4ff6282/0c53a639911e31c1(V1) with server4/193.167.100.100:443] 12.119 <- (1) Packet A|8|S0|0c53a639911e31c1|264|2 CryptoFrame[0,89] Padding(144) 12.125 -> Packet H|1|L|46|1 AckFrame[7|Δ0] -< CryptoStream[A|NewSessionTicket] 12.125 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.325/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.125 Discarding pn space Initial because first Handshake message is being sent 12.125 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.326/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.125 -> Packet A|0|S0|3a99e7b50f63caf9|47|1 StreamFrame[0(CIB),0,17,fin] 12.145 -> Packet A|1|S0|3a99e7b50f63caf9|32|1 AckFrame[8|Δ19] 12.156 <- (2) Packet A|9|S0|0c53a639911e31c1|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|da99e4aef15a74fc|bb2e27c6ffee699d5d5b685013dcbe9a] 12.156 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 12.324/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 12.350/App, because ackElicitingInFlight | RTT:100/25 12.156 Discarding pn space Handshake because HandshakeDone is received 12.175 -> Packet A|2|S0|3a99e7b50f63caf9|32|1 AckFrame[9-8|Δ19] 12.350 loss detection timeout handler running Sending probe 0, because no ack since 12.125. Current RTT: 100/25. 12.351 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 12.801/App, because ackElicitingInFlight | RTT:100/25 12.351 -> Packet PA|3|S0|3a99e7b50f63caf9|47|1 StreamFrame[0(CIB),0,17,fin] 12.382 <- (3) Packet A|11|S0|0c53a639911e31c1|35|1 AckFrame[3,1|Δ1] 12.383 Cwnd(-): 6000; inflight: 0 12.383 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.383 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 12.499/App, because ackElicitingInFlight | RTT:31/15 12.383 -> Packet A|4|S0|3a99e7b50f63caf9|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[9|Δ0] 12.384 <- (4) Packet A|12|S0|0c53a639911e31c1|1055|1 StreamFrame[0(CIB),0,1024,fin] 12.384 Finished downloading https://server4:443/xszmpukwze at 38:39.805 on ClientConnection[4af453c6a4ff6282/0c53a639911e31c1(V1) with server4/193.167.100.100:443] 12.384 Closing ClientConnection[4af453c6a4ff6282/0c53a639911e31c1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.385 Creating connection with server4:443 with v1 12.385 -> Packet A|5|S0|3a99e7b50f63caf9|37|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,9|Δ0] 12.385 Setting up connection for downloading https://server4:443/achmvoxxor at 38:39.806 on ClientConnection[120fb08ac0be0ddb/12a126d68a3311f6(V1) with server4/193.167.100.100:443] 12.385 Original destination connection id: 120fb08ac0be0ddb (scid: 12a126d68a3311f6) >- CryptoStream[I|ClientHello] 12.386 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.587/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.386 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.586 loss detection timeout handler running Sending probe 0, because no ack since 12.386. Current RTT: 100/25. 12.586 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.586 (Probe is an initial retransmit) 12.586 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.986/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.586 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.617 <- (5) Packet A|13|S0|0c53a639911e31c1|29|2 PingFrame[] Padding(1) 12.618 -> Packet A|6|S0|3a99e7b50f63caf9|37|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,9|Δ0] 12.622 <- (1) Packet I|3|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 12.625 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 13.025/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.622 <- (1) Packet H|4|L|765|1 CryptoFrame[0,718] 12.625 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 12.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 13.028/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.628 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.628 Starting downloading https://server4:443/achmvoxxor at 38:40.049 on ClientConnection[120fb08ac0be0ddb/12a126d68a3311f6(V1) with server4/193.167.100.100:443] 12.622 <- (1) Packet A|5|S0|12a126d68a3311f6|264|2 CryptoFrame[0,89] Padding(144) -< CryptoStream[A|NewSessionTicket] 12.629 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.829/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.629 Discarding pn space Initial because first Handshake message is being sent 12.629 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.829/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.629 -> [Packet H|1|L|46|1 AckFrame[4|Δ0], Packet A|0|S0|455e3b97c7893bf2|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0]] 12.755 <- (2) Packet H|6|L|765|1 CryptoFrame[0,718] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.755 <- (2) Packet A|7|S0|12a126d68a3311f6|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 12.756 -> Packet H|2|L|48|1 AckFrame[6,4|Δ0] 12.775 -> Packet A|1|S0|455e3b97c7893bf2|34|1 AckFrame[7,5|Δ19] 12.828 loss detection timeout handler running Sending probe 0, because no ack since 12.628. Current RTT: 100/25. 12.828 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.828 (Probe is a handshake retransmit) 12.829 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 13.229/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.828 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 12.976 <- (3) Packet A|9|S0|12a126d68a3311f6|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 12.995 -> Packet A|2|S0|455e3b97c7893bf2|36|1 AckFrame[9,7,5|Δ19] 13.026 <- (4) Packet A|10|S0|12a126d68a3311f6|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|562ca01ef2596dd3|90690f1f1401758160e538cb55bb3893] 13.027 State is set to Confirmed reschedule loss detection timer for PTO over 52 millis, based on 13.079/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -172 millis, based on 12.854/App, because ackElicitingInFlight | RTT:100/25 13.027 Discarding pn space Handshake because HandshakeDone is received 13.027 loss detection timeout handler running Sending probe 0, because no ack since 12.629. Current RTT: 100/25. 13.027 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 13.477/App, because ackElicitingInFlight | RTT:100/25 13.027 -> Packet PA|3|S0|455e3b97c7893bf2|47|1 StreamFrame[0(CIB),0,17,fin] 13.046 -> Packet A|4|S0|455e3b97c7893bf2|36|1 AckFrame[10-9,7,5|Δ19] 13.059 <- (5) Packet A|11|S0|12a126d68a3311f6|33|1 AckFrame[3-2|Δ1] 13.059 Cwnd(-): 6000; inflight: 0 13.059 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.059 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 13.175/App, because ackElicitingInFlight | RTT:31/15 13.059 -> Packet A|5|S0|455e3b97c7893bf2|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[10|Δ0] 13.060 <- (6) Packet A|12|S0|12a126d68a3311f6|1055|1 StreamFrame[0(CIB),0,1024,fin] 13.060 Finished downloading https://server4:443/achmvoxxor at 38:40.481 on ClientConnection[120fb08ac0be0ddb/12a126d68a3311f6(V1) with server4/193.167.100.100:443] 13.060 Closing ClientConnection[120fb08ac0be0ddb/12a126d68a3311f6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.061 -> Packet A|6|S0|455e3b97c7893bf2|35|2 ConnectionCloseFrame[0|0|] AckFrame[12-10|Δ0] 13.061 Creating connection with server4:443 with v1 13.062 Setting up connection for downloading https://server4:443/mlmdngrigs at 38:40.483 on ClientConnection[826fc7558f80c666/2ed9d3f471b1c7ec(V1) with server4/193.167.100.100:443] 13.062 Original destination connection id: 826fc7558f80c666 (scid: 2ed9d3f471b1c7ec) >- CryptoStream[I|ClientHello] 13.063 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.263/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.063 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.098 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 13.099 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.299/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.098 <- (1) Packet H|1|L|766|1 CryptoFrame[0,719] 13.101 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.203/Handshake, because peerAwaitingAddressValidation | RTT:34/17 13.101 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 13.103 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.104 Starting downloading https://server4:443/mlmdngrigs at 38:40.524 on ClientConnection[826fc7558f80c666/2ed9d3f471b1c7ec(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 13.206/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.103 -> Packet H|0|L|80|1 CryptoFrame[0,36] 13.098 <- (1) Packet A|2|S0|2ed9d3f471b1c7ec|257|2 CryptoFrame[0,89] Padding(137) -< CryptoStream[A|NewSessionTicket] 13.104 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 13.104 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.206/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.104 Discarding pn space Initial because first Handshake message is being sent 13.104 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.206/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.104 -> Packet A|0|S0|44b67f63f1507f7f|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 13.205 loss detection timeout handler running Sending probe 0, because no ack since 13.103. Current RTT: 34/17. 13.205 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.205 (Probe is a handshake retransmit) 13.206 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 13.410/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.206 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 13.215 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 13.215 <- (2) Packet A|4|S0|2ed9d3f471b1c7ec|120|1 CryptoFrame[0,89] 13.215 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] -< CryptoStream[A|NewSessionTicket] 13.235 -> Packet A|1|S0|44b67f63f1507f7f|34|1 AckFrame[4,2|Δ19] 13.319 <- (3) Packet H|5|L|45|2 PingFrame[] Padding(1) 13.320 -> Packet H|4|L|50|1 AckFrame[5,3,1|Δ0] 13.319 <- (3) Packet A|6|S0|2ed9d3f471b1c7ec|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 13.339 -> Packet A|2|S0|44b67f63f1507f7f|36|1 AckFrame[6,4,2|Δ19] 13.409 loss detection timeout handler running Sending probe 1, because no ack since 13.104. Current RTT: 34/17. 13.409 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.409 (Probe is a handshake retransmit) 13.409 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 13.817/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.409 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 13.410 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 13.818/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.410 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 13.441 <- (4) Packet A|9|S0|2ed9d3f471b1c7ec|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|729e6833c202e753|11e7503a42fc6ad3255146509cdf4d03] 13.441 State is set to Confirmed reschedule loss detection timer for PTO over 171 millis, based on 13.612/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -209 millis, based on 13.231/App, because ackElicitingInFlight | RTT:34/17 13.441 Discarding pn space Handshake because HandshakeDone is received 13.441 loss detection timeout handler running Sending probe 0, because no ack since 13.104. Current RTT: 34/17. 13.441 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 13.695/App, because ackElicitingInFlight | RTT:34/17 13.441 -> Packet PA|3|S0|44b67f63f1507f7f|47|1 StreamFrame[0(CIB),0,17,fin] 13.461 -> Packet A|4|S0|44b67f63f1507f7f|38|1 AckFrame[9,6,4,2|Δ19] 13.475 <- (5) Packet A|10|S0|2ed9d3f471b1c7ec|33|1 AckFrame[3|Δ2] 13.475 Cwnd(-): 6000; inflight: 0 13.475 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.475 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 13.586/App, because ackElicitingInFlight | RTT:34/13 13.475 -> Packet A|5|S0|44b67f63f1507f7f|58|2 StreamFrame[0(CIB),0,17,fin] AckFrame[9,6,4,2|Δ0] 13.507 <- (6) Packet A|13|S0|2ed9d3f471b1c7ec|33|1 AckFrame[5-3|Δ1] 13.508 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.576 <- (7) Packet A|14|S0|2ed9d3f471b1c7ec|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 13.596 -> Packet A|6|S0|44b67f63f1507f7f|34|1 AckFrame[14-13,10|Δ19] 13.627 <- (8) Packet A|15|S0|2ed9d3f471b1c7ec|1055|1 StreamFrame[0(CIB),0,1024,fin] 13.628 Finished downloading https://server4:443/mlmdngrigs at 38:41.049 on ClientConnection[826fc7558f80c666/2ed9d3f471b1c7ec(V1) with server4/193.167.100.100:443] 13.628 Closing ClientConnection[826fc7558f80c666/2ed9d3f471b1c7ec(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.628 -> Packet A|7|S0|44b67f63f1507f7f|37|2 ConnectionCloseFrame[0|0|] AckFrame[15-13,10|Δ0] 13.629 Creating connection with server4:443 with v1 13.629 Setting up connection for downloading https://server4:443/bgdegwclvp at 38:41.050 on ClientConnection[18a1c9c60d974bc0/229fa469024aa4b3(V1) with server4/193.167.100.100:443] 13.629 Original destination connection id: 18a1c9c60d974bc0 (scid: 229fa469024aa4b3) >- CryptoStream[I|ClientHello] 13.631 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.831/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.631 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.665 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 13.666 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.866/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.665 <- (1) Packet H|1|L|766|1 CryptoFrame[0,719] 13.668 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.770/Handshake, because peerAwaitingAddressValidation | RTT:34/17 13.668 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.671 -> Packet H|0|L|80|1 CryptoFrame[0,36] 13.665 <- (1) Packet A|2|S0|229fa469024aa4b3|257|2 CryptoFrame[0,89] Padding(137) -< CryptoStream[A|NewSessionTicket] 13.671 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 13.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.671 Discarding pn space Initial because first Handshake message is being sent 13.671 Starting downloading https://server4:443/bgdegwclvp at 38:41.092 on ClientConnection[18a1c9c60d974bc0/229fa469024aa4b3(V1) with server4/193.167.100.100:443] 13.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.774/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.672 -> Packet A|0|S0|59da0900f85be848|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 13.704 <- (9) Packet A|16|S0|2ed9d3f471b1c7ec|29|2 PingFrame[] Padding(1) 13.704 -> Packet A|8|S0|44b67f63f1507f7f|37|2 ConnectionCloseFrame[0|0|] AckFrame[15-13,10|Δ0] 13.705 <- (2) Packet A|5|S0|229fa469024aa4b3|1055|1 StreamFrame[0(CIB),0,1024,fin] 13.706 Finished downloading https://server4:443/bgdegwclvp at 38:41.127 on ClientConnection[18a1c9c60d974bc0/229fa469024aa4b3(V1) with server4/193.167.100.100:443] 13.706 Closing ClientConnection[18a1c9c60d974bc0/229fa469024aa4b3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.706 -> Packet A|1|S0|59da0900f85be848|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 13.706 Creating connection with server4:443 with v1 13.707 Setting up connection for downloading https://server4:443/ycdafdrqsq at 38:41.127 on ClientConnection[d2f1f611bda2b761/f5e8fd3f072470ae(V1) with server4/193.167.100.100:443] 13.707 Original destination connection id: d2f1f611bda2b761 (scid: f5e8fd3f072470ae) >- CryptoStream[I|ClientHello] 13.708 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.908/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.708 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.743 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 13.743 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.943/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.743 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 13.746 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.848/Handshake, because peerAwaitingAddressValidation | RTT:34/17 13.746 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 13.748 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.850/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.748 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.748 Starting downloading https://server4:443/ycdafdrqsq at 38:41.169 on ClientConnection[d2f1f611bda2b761/f5e8fd3f072470ae(V1) with server4/193.167.100.100:443] 13.748 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 13.743 <- (1) Packet A|2|S0|f5e8fd3f072470ae|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 13.748 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.850/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.748 Discarding pn space Initial because first Handshake message is being sent 13.748 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.850/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.748 -> Packet A|0|S0|c8cad7986e8e5e59|47|1 StreamFrame[0(CIB),0,17,fin] 13.768 -> Packet A|1|S0|c8cad7986e8e5e59|32|1 AckFrame[2|Δ19] 13.779 <- (2) Packet A|3|S0|f5e8fd3f072470ae|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|6fb10a5632dca661|502fc11248b220327c4e9a1a4d79e44a] 13.779 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 13.850/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 13.875/App, because ackElicitingInFlight | RTT:34/17 13.780 Discarding pn space Handshake because HandshakeDone is received 13.799 -> Packet A|2|S0|c8cad7986e8e5e59|32|1 AckFrame[3-2|Δ19] 13.859 <- (10) Packet A|17|S0|2ed9d3f471b1c7ec|29|2 PingFrame[] Padding(1) 13.859 -> Packet A|9|S0|44b67f63f1507f7f|37|2 ConnectionCloseFrame[0|0|] AckFrame[15-13,10|Δ0] 13.875 loss detection timeout handler running Sending probe 0, because no ack since 13.748. Current RTT: 34/17. 13.875 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 14.129/App, because ackElicitingInFlight | RTT:34/17 13.875 -> Packet PA|3|S0|c8cad7986e8e5e59|47|1 StreamFrame[0(CIB),0,17,fin] 13.909 <- (3) Packet A|5|S0|f5e8fd3f072470ae|1055|1 StreamFrame[0(CIB),0,1024,fin] 13.910 Finished downloading https://server4:443/ycdafdrqsq at 38:41.330 on ClientConnection[d2f1f611bda2b761/f5e8fd3f072470ae(V1) with server4/193.167.100.100:443] 13.910 Closing ClientConnection[d2f1f611bda2b761/f5e8fd3f072470ae(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.910 -> Packet A|4|S0|c8cad7986e8e5e59|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 13.910 Creating connection with server4:443 with v1 13.911 Setting up connection for downloading https://server4:443/irnrlxmaiv at 38:41.331 on ClientConnection[43d1234400445058/a85bbe2a939aa6a3(V1) with server4/193.167.100.100:443] 13.911 Original destination connection id: 43d1234400445058 (scid: a85bbe2a939aa6a3) >- CryptoStream[I|ClientHello] 13.912 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.112/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.912 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.111 loss detection timeout handler running Sending probe 0, because no ack since 13.912. Current RTT: 100/25. 14.111 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.111 (Probe is an initial retransmit) 14.111 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.511/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.111 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.146 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 14.146 probe count not reset on ack because handshake not yet confirmed 14.147 Retransmitting CryptoFrame[0,257] on level Initial 14.147 Cwnd(-): 6000; inflight: 0 14.147 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.547/Initial, because peerAwaitingAddressValidation | RTT:100/25 14.147 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 14.351/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.147 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 14.146 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 14.149 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 14.353/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.149 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 14.152 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 203 millis, based on 14.356/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.152 -> Packet H|0|L|80|1 CryptoFrame[0,36] 14.152 Starting downloading https://server4:443/irnrlxmaiv at 38:41.572 on ClientConnection[43d1234400445058/a85bbe2a939aa6a3(V1) with server4/193.167.100.100:443] 14.146 <- (1) Packet A|2|S0|a85bbe2a939aa6a3|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 14.152 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 14.152 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 14.254/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.152 Discarding pn space Initial because first Handshake message is being sent 14.153 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 14.255/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.152 -> Packet A|0|S0|1a35825e90003ebc|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 14.180 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 14.183 <- (3) Packet A|6|S0|a85bbe2a939aa6a3|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|3ec1d472f19f65b4|e39e45ce8b1a69738de4b86a528d6ac6] 14.183 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 14.254/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 14.279/App, because ackElicitingInFlight | RTT:34/17 14.184 Discarding pn space Handshake because HandshakeDone is received 14.203 -> Packet A|1|S0|1a35825e90003ebc|34|1 AckFrame[6,2|Δ19] 14.279 loss detection timeout handler running Sending probe 0, because no ack since 14.152. Current RTT: 34/17. 14.279 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 14.533/App, because ackElicitingInFlight | RTT:34/17 14.279 -> Packet PA|2|S0|1a35825e90003ebc|47|1 StreamFrame[0(CIB),0,17,fin] 14.311 <- (4) Packet A|7|S0|a85bbe2a939aa6a3|33|1 AckFrame[2|Δ1] 14.311 Cwnd(-): 3000; inflight: 0 14.311 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 14.311 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 114 millis, based on 14.427/App, because ackElicitingInFlight | RTT:34/14 14.312 -> Packet A|3|S0|1a35825e90003ebc|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6,2|Δ0] 14.312 <- (5) Packet A|8|S0|a85bbe2a939aa6a3|1055|1 StreamFrame[0(CIB),0,1024,fin] 14.312 Finished downloading https://server4:443/irnrlxmaiv at 38:41.733 on ClientConnection[43d1234400445058/a85bbe2a939aa6a3(V1) with server4/193.167.100.100:443] 14.312 Closing ClientConnection[43d1234400445058/a85bbe2a939aa6a3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.313 -> Packet A|4|S0|1a35825e90003ebc|37|2 ConnectionCloseFrame[0|0|] AckFrame[8-6,2|Δ0] 14.313 Creating connection with server4:443 with v1 14.314 Setting up connection for downloading https://server4:443/ypsxaicnbn at 38:41.734 on ClientConnection[da91c53c497ff20e/f8bf523b49e938e4(V1) with server4/193.167.100.100:443] 14.314 Original destination connection id: da91c53c497ff20e (scid: f8bf523b49e938e4) >- CryptoStream[I|ClientHello] 14.315 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.515/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.315 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.514 loss detection timeout handler running Sending probe 0, because no ack since 14.315. Current RTT: 100/25. 14.514 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.514 (Probe is an initial retransmit) 14.515 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.915/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.515 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.914 loss detection timeout handler running Sending probe 1, because no ack since 14.515. Current RTT: 100/25. 14.914 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.914 (Probe is an initial retransmit) 14.914 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.715/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.914 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.915 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.715/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.915 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.951 <- (1) Packet I|3|L|176|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 14.951 probe count not reset on ack because handshake not yet confirmed 14.951 Retransmitting CryptoFrame[0,257] on level Initial 14.951 Cwnd(-): 6000; inflight: 0 14.951 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.751/Initial, because peerAwaitingAddressValidation | RTT:100/25 14.951 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 411 millis, based on 15.363/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 14.951 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 14.951 <- (1) Packet H|4|L|765|1 CryptoFrame[0,718] 14.954 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 15.366/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 14.954 -> Packet I|5|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 14.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 15.368/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 14.956 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.956 Starting downloading https://server4:443/ypsxaicnbn at 38:42.377 on ClientConnection[da91c53c497ff20e/f8bf523b49e938e4(V1) with server4/193.167.100.100:443] 14.951 <- (1) Packet A|5|S0|f8bf523b49e938e4|259|2 CryptoFrame[0,89] Padding(139) 14.956 -> Packet H|1|L|46|1 AckFrame[4|Δ0] -< CryptoStream[A|NewSessionTicket] 14.957 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 15.060/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 14.957 Discarding pn space Initial because first Handshake message is being sent 14.957 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 15.060/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 14.957 -> Packet A|0|S0|dd3aa8823cd5ba66|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 14.987 <- (2) Packet A|6|S0|f8bf523b49e938e4|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|d2ac3a8a7273563a|668170b46dc514bd6814ff8116dc8cdf] 14.988 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 15.059/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 97 millis, based on 15.085/App, because ackElicitingInFlight | RTT:35/17 14.988 Discarding pn space Handshake because HandshakeDone is received 14.989 <- (3) Packet A|7|S0|f8bf523b49e938e4|33|1 AckFrame[0|Δ1] 14.989 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.007 -> Packet A|1|S0|dd3aa8823cd5ba66|32|1 AckFrame[7-6|Δ19] 15.109 <- (4) Packet A|9|S0|f8bf523b49e938e4|29|2 PingFrame[] Padding(1) 15.128 -> Packet A|2|S0|dd3aa8823cd5ba66|34|1 AckFrame[9,7-6|Δ19] 15.160 <- (5) Packet A|10|S0|f8bf523b49e938e4|1055|1 StreamFrame[0(CIB),0,1024,fin] 15.160 Finished downloading https://server4:443/ypsxaicnbn at 38:42.581 on ClientConnection[da91c53c497ff20e/f8bf523b49e938e4(V1) with server4/193.167.100.100:443] 15.160 Closing ClientConnection[da91c53c497ff20e/f8bf523b49e938e4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.161 -> Packet A|3|S0|dd3aa8823cd5ba66|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,7-6|Δ0] 15.161 Creating connection with server4:443 with v1 15.161 Setting up connection for downloading https://server4:443/nhfhaiycds at 38:42.582 on ClientConnection[5b6273ba0802feeb/39c089f79ea7c742(V1) with server4/193.167.100.100:443] 15.161 Original destination connection id: 5b6273ba0802feeb (scid: 39c089f79ea7c742) >- CryptoStream[I|ClientHello] 15.163 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.363/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.163 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.362 loss detection timeout handler running Sending probe 0, because no ack since 15.163. Current RTT: 100/25. 15.362 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.362 (Probe is an initial retransmit) 15.362 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.762/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.362 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.598 <- (1) Packet I|3|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 15.598 <- (1) Packet H|4|L|765|1 CryptoFrame[0,718] 15.601 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 16.001/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.601 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 15.604 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 16.004/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.604 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.604 Starting downloading https://server4:443/nhfhaiycds at 38:43.025 on ClientConnection[5b6273ba0802feeb/39c089f79ea7c742(V1) with server4/193.167.100.100:443] 15.604 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 15.598 <- (1) Packet A|5|S0|39c089f79ea7c742|264|2 CryptoFrame[0,89] Padding(144) -< CryptoStream[A|NewSessionTicket] 15.605 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.805/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.605 Discarding pn space Initial because first Handshake message is being sent 15.605 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.805/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.605 -> Packet A|0|S0|3738cc68c85752ea|47|1 StreamFrame[0(CIB),0,17,fin] 15.624 -> Packet A|1|S0|3738cc68c85752ea|32|1 AckFrame[5|Δ19] 15.716 <- (2) Packet H|6|L|45|2 PingFrame[] Padding(1) 15.716 <- (2) Packet A|7|S0|39c089f79ea7c742|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 15.716 -> Packet H|2|L|48|1 AckFrame[6,4|Δ0] 15.736 -> Packet A|2|S0|3738cc68c85752ea|34|1 AckFrame[7,5|Δ19] 15.804 loss detection timeout handler running Sending probe 0, because no ack since 15.604. Current RTT: 100/25. 15.804 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.804 (Probe is a handshake retransmit) 15.804 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 16.204/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.804 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 15.836 <- (3) Packet A|8|S0|39c089f79ea7c742|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|bd8d8818ffe672bc|0d92f7229e1910c055cccddd11310eb3] 15.836 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 16.055/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -6 millis, based on 15.830/App, because ackElicitingInFlight | RTT:100/25 15.836 loss detection timeout handler running 15.836 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 15.605. Current RTT: 100/25. 15.836 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 16.286/App, because ackElicitingInFlight | RTT:100/25 15.836 -> Packet PA|3|S0|3738cc68c85752ea|47|1 StreamFrame[0(CIB),0,17,fin] 15.856 -> Packet A|4|S0|3738cc68c85752ea|34|1 AckFrame[8-7,5|Δ19] 15.868 <- (4) Packet A|9|S0|39c089f79ea7c742|33|1 AckFrame[3|Δ1] 15.869 Cwnd(-): 6000; inflight: 0 15.869 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.869 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 15.985/App, because ackElicitingInFlight | RTT:31/15 15.869 -> Packet A|5|S0|3738cc68c85752ea|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8-7,5|Δ0] 15.869 <- (5) Packet A|10|S0|39c089f79ea7c742|1055|1 StreamFrame[0(CIB),0,1024,fin] 15.870 Finished downloading https://server4:443/nhfhaiycds at 38:43.291 on ClientConnection[5b6273ba0802feeb/39c089f79ea7c742(V1) with server4/193.167.100.100:443] 15.870 Closing ClientConnection[5b6273ba0802feeb/39c089f79ea7c742(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.870 -> Packet A|6|S0|3738cc68c85752ea|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-7,5|Δ0] 15.871 Creating connection with server4:443 with v1 15.871 Setting up connection for downloading https://server4:443/cskriltdny at 38:43.292 on ClientConnection[a48e2d9347bf4fc9/3cb1ddda0853e084(V1) with server4/193.167.100.100:443] 15.871 Original destination connection id: a48e2d9347bf4fc9 (scid: 3cb1ddda0853e084) >- CryptoStream[I|ClientHello] 15.873 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.073/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.873 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.901 <- (6) Packet A|11|S0|39c089f79ea7c742|33|1 AckFrame[5-3|Δ1] 15.901 -> Packet A|7|S0|3738cc68c85752ea|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-7,5|Δ0] 15.907 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 15.908 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.108/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.907 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 15.910 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.012/Handshake, because peerAwaitingAddressValidation | RTT:34/17 15.910 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 15.912 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.014/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.912 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.912 Starting downloading https://server4:443/cskriltdny at 38:43.333 on ClientConnection[a48e2d9347bf4fc9/3cb1ddda0853e084(V1) with server4/193.167.100.100:443] 15.907 <- (1) Packet A|2|S0|3cb1ddda0853e084|258|2 CryptoFrame[0,89] Padding(138) 15.912 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 15.913 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.015/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.913 Discarding pn space Initial because first Handshake message is being sent 15.913 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.015/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.913 -> Packet A|0|S0|df3514c0eeafb530|47|1 StreamFrame[0(CIB),0,17,fin] 15.932 -> Packet A|1|S0|df3514c0eeafb530|32|1 AckFrame[2|Δ19] 15.945 <- (2) Packet A|4|S0|3cb1ddda0853e084|33|1 AckFrame[0|Δ1] 15.945 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.047/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.946 <- (3) Packet A|5|S0|3cb1ddda0853e084|1055|1 StreamFrame[0(CIB),0,1024,fin] 15.947 Finished downloading https://server4:443/cskriltdny at 38:43.367 on ClientConnection[a48e2d9347bf4fc9/3cb1ddda0853e084(V1) with server4/193.167.100.100:443] 15.947 Closing ClientConnection[a48e2d9347bf4fc9/3cb1ddda0853e084(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.947 -> Packet A|2|S0|df3514c0eeafb530|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 15.947 Creating connection with server4:443 with v1 15.948 Setting up connection for downloading https://server4:443/ajculhcbbg at 38:43.369 on ClientConnection[680bcb8d542861ee/03b7a5a5422b3735(V1) with server4/193.167.100.100:443] 15.948 Original destination connection id: 680bcb8d542861ee (scid: 03b7a5a5422b3735) >- CryptoStream[I|ClientHello] 15.949 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.149/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.949 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.149 loss detection timeout handler running Sending probe 0, because no ack since 15.949. Current RTT: 100/25. 16.149 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.149 (Probe is an initial retransmit) 16.149 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.549/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.149 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.184 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 16.185 probe count not reset on ack because handshake not yet confirmed 16.185 Retransmitting CryptoFrame[0,257] on level Initial 16.185 Cwnd(-): 6000; inflight: 0 16.185 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.585/Initial, because peerAwaitingAddressValidation | RTT:100/25 16.185 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 16.391/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.185 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 16.184 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 16.188 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 16.394/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.187 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 16.190 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 16.396/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.190 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.190 Starting downloading https://server4:443/ajculhcbbg at 38:43.611 on ClientConnection[680bcb8d542861ee/03b7a5a5422b3735(V1) with server4/193.167.100.100:443] 16.190 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 16.184 <- (1) Packet A|2|S0|03b7a5a5422b3735|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 16.190 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 16.293/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.191 Discarding pn space Initial because first Handshake message is being sent 16.191 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 16.294/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.191 -> Packet A|0|S0|529e9f35c28f9e81|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 16.221 <- (2) Packet A|3|S0|03b7a5a5422b3735|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|bab1b6f5769e8efa|128c9e7c22e56a87c736ded9f808ae29] 16.221 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 16.293/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 97 millis, based on 16.319/App, because ackElicitingInFlight | RTT:35/17 16.221 Discarding pn space Handshake because HandshakeDone is received 16.224 <- (3) Packet A|5|S0|03b7a5a5422b3735|1055|1 StreamFrame[0(CIB),0,1024,fin] 16.224 -> Packet A|1|S0|529e9f35c28f9e81|34|1 AckFrame[5,3-2|Δ2] 16.224 Finished downloading https://server4:443/ajculhcbbg at 38:43.645 on ClientConnection[680bcb8d542861ee/03b7a5a5422b3735(V1) with server4/193.167.100.100:443] 16.224 Closing ClientConnection[680bcb8d542861ee/03b7a5a5422b3735(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.224 -> Packet A|2|S0|529e9f35c28f9e81|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 16.225 Creating connection with server4:443 with v1 16.225 Setting up connection for downloading https://server4:443/baxevmnmfy at 38:43.646 on ClientConnection[f303e5420d6e13f1/d9c81a98308390da(V1) with server4/193.167.100.100:443] 16.225 Original destination connection id: f303e5420d6e13f1 (scid: d9c81a98308390da) >- CryptoStream[I|ClientHello] 16.226 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.426/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.226 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.261 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 16.262 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.462/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.261 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 16.264 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 16.367/Handshake, because peerAwaitingAddressValidation | RTT:35/17 16.264 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 16.266 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 16.369/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.266 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.267 Starting downloading https://server4:443/baxevmnmfy at 38:43.687 on ClientConnection[f303e5420d6e13f1/d9c81a98308390da(V1) with server4/193.167.100.100:443] 16.267 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 16.261 <- (1) Packet A|2|S0|d9c81a98308390da|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 16.267 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 16.370/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.267 Discarding pn space Initial because first Handshake message is being sent 16.267 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 16.370/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.267 -> Packet A|0|S0|6bf980c3d6bd7644|47|1 StreamFrame[0(CIB),0,17,fin] 16.286 -> Packet A|1|S0|6bf980c3d6bd7644|32|1 AckFrame[2|Δ19] 16.298 <- (2) Packet A|3|S0|d9c81a98308390da|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|edb2adc4968af305|13b6964e8351c16a3ecffe3d6e0a7fce] 16.298 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 16.369/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 97 millis, based on 16.395/App, because ackElicitingInFlight | RTT:35/17 16.298 Discarding pn space Handshake because HandshakeDone is received 16.317 -> Packet A|2|S0|6bf980c3d6bd7644|32|1 AckFrame[3-2|Δ19] 16.395 loss detection timeout handler running Sending probe 0, because no ack since 16.267. Current RTT: 35/17. 16.395 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 16.651/App, because ackElicitingInFlight | RTT:35/17 16.395 -> Packet PA|3|S0|6bf980c3d6bd7644|47|1 StreamFrame[0(CIB),0,17,fin] 16.427 <- (3) Packet A|4|S0|d9c81a98308390da|33|1 AckFrame[3-1|Δ1] 16.428 Cwnd(-): 6000; inflight: 0 16.428 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 16.428 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 16.544/App, because ackElicitingInFlight | RTT:35/14 16.428 -> Packet A|4|S0|6bf980c3d6bd7644|47|1 StreamFrame[0(CIB),0,17,fin] 16.429 <- (4) Packet A|5|S0|d9c81a98308390da|1055|1 StreamFrame[0(CIB),0,1024,fin] 16.429 Finished downloading https://server4:443/baxevmnmfy at 38:43.850 on ClientConnection[f303e5420d6e13f1/d9c81a98308390da(V1) with server4/193.167.100.100:443] 16.429 Closing ClientConnection[f303e5420d6e13f1/d9c81a98308390da(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.430 -> Packet A|5|S0|6bf980c3d6bd7644|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 16.430 Creating connection with server4:443 with v1 16.431 Setting up connection for downloading https://server4:443/orzcmxuoqo at 38:43.851 on ClientConnection[931d2ad22ce077af/3a8f2c6420e23e90(V1) with server4/193.167.100.100:443] 16.431 Original destination connection id: 931d2ad22ce077af (scid: 3a8f2c6420e23e90) >- CryptoStream[I|ClientHello] 16.432 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.632/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.432 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.460 <- (5) Packet A|6|S0|d9c81a98308390da|33|1 AckFrame[4-1|Δ1] 16.460 -> Packet A|6|S0|6bf980c3d6bd7644|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 16.631 loss detection timeout handler running Sending probe 0, because no ack since 16.432. Current RTT: 100/25. 16.631 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.632 (Probe is an initial retransmit) 16.632 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.032/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.632 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.667 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 16.667 probe count not reset on ack because handshake not yet confirmed 16.667 Retransmitting CryptoFrame[0,257] on level Initial 16.667 Cwnd(-): 6000; inflight: 0 16.667 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.067/Initial, because peerAwaitingAddressValidation | RTT:100/25 16.668 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 16.872/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.668 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 16.667 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 16.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 16.874/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.670 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 16.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 16.876/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.672 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.672 Starting downloading https://server4:443/orzcmxuoqo at 38:44.093 on ClientConnection[931d2ad22ce077af/3a8f2c6420e23e90(V1) with server4/193.167.100.100:443] 16.667 <- (1) Packet A|2|S0|3a8f2c6420e23e90|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 16.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.775/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.673 Discarding pn space Initial because first Handshake message is being sent 16.672 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 16.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.775/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.673 -> Packet A|0|S0|a55a28e21b697546|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 16.701 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.703 <- (3) Packet A|6|S0|3a8f2c6420e23e90|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|7e87bb676f30cef1|a2ab56377f8359e783bf69cf5158e2cd] 16.703 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 16.774/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 96 millis, based on 16.800/App, because ackElicitingInFlight | RTT:34/17 16.704 Discarding pn space Handshake because HandshakeDone is received 16.723 -> Packet A|1|S0|a55a28e21b697546|34|1 AckFrame[6,2|Δ19] 16.800 loss detection timeout handler running Sending probe 0, because no ack since 16.673. Current RTT: 34/17. 16.800 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 17.054/App, because ackElicitingInFlight | RTT:34/17 16.800 -> Packet PA|2|S0|a55a28e21b697546|47|1 StreamFrame[0(CIB),0,17,fin] 16.934 <- (4) Packet A|8|S0|3a8f2c6420e23e90|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 16.954 -> Packet A|3|S0|a55a28e21b697546|36|1 AckFrame[8,6,2|Δ19] 17.053 loss detection timeout handler running Sending probe 1, because no ack since 16.800. Current RTT: 34/17. 17.053 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 17.561/App, because ackElicitingInFlight | RTT:34/17 17.053 -> Packet PA|4|S0|a55a28e21b697546|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 17.562/App, because ackElicitingInFlight | RTT:34/17 17.054 -> Packet PA|5|S0|a55a28e21b697546|47|1 StreamFrame[0(CIB),0,17,fin] 17.085 <- (5) Packet A|9|S0|3a8f2c6420e23e90|34|1 AckFrame[5-3,1|Δ0] 17.086 Cwnd(-): 3000; inflight: 0 17.086 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 17.086 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 114 millis, based on 17.201/App, because ackElicitingInFlight | RTT:34/14 17.086 -> Packet A|6|S0|a55a28e21b697546|47|1 StreamFrame[0(CIB),0,17,fin] 17.118 <- (6) Packet A|11|S0|3a8f2c6420e23e90|35|1 AckFrame[6-3,1|Δ1] 17.118 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.238 <- (7) Packet A|12|S0|3a8f2c6420e23e90|29|2 PingFrame[] Padding(1) 17.258 -> Packet A|7|S0|a55a28e21b697546|34|1 AckFrame[12-11,9|Δ19] 17.289 <- (8) Packet A|13|S0|3a8f2c6420e23e90|1055|1 StreamFrame[0(CIB),0,1024,fin] 17.290 Finished downloading https://server4:443/orzcmxuoqo at 38:44.711 on ClientConnection[931d2ad22ce077af/3a8f2c6420e23e90(V1) with server4/193.167.100.100:443] 17.290 Closing ClientConnection[931d2ad22ce077af/3a8f2c6420e23e90(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.290 -> Packet A|8|S0|a55a28e21b697546|37|2 ConnectionCloseFrame[0|0|] AckFrame[13-11,9|Δ0] 17.291 Creating connection with server4:443 with v1 17.291 Setting up connection for downloading https://server4:443/gghfbjvyui at 38:44.712 on ClientConnection[a3eabfb30b09ca32/a6f86add3b7a0554(V1) with server4/193.167.100.100:443] 17.291 Original destination connection id: a3eabfb30b09ca32 (scid: a6f86add3b7a0554) >- CryptoStream[I|ClientHello] 17.293 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.493/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.293 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.492 loss detection timeout handler running Sending probe 0, because no ack since 17.293. Current RTT: 100/25. 17.492 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.492 (Probe is an initial retransmit) 17.492 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.892/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.492 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.527 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 17.528 probe count not reset on ack because handshake not yet confirmed 17.528 Retransmitting CryptoFrame[0,257] on level Initial 17.528 Cwnd(-): 6000; inflight: 0 17.528 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.928/Initial, because peerAwaitingAddressValidation | RTT:100/25 17.528 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 17.732/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.528 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 17.530 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.527 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] reschedule loss detection timer for PTO over 203 millis, based on 17.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.530 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 17.532 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 17.736/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.532 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.533 Starting downloading https://server4:443/gghfbjvyui at 38:44.953 on ClientConnection[a3eabfb30b09ca32/a6f86add3b7a0554(V1) with server4/193.167.100.100:443] 17.533 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 17.527 <- (1) Packet A|2|S0|a6f86add3b7a0554|259|2 CryptoFrame[0,89] Padding(139) -< CryptoStream[A|NewSessionTicket] 17.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.635/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.533 Discarding pn space Initial because first Handshake message is being sent 17.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.635/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.533 -> Packet A|0|S0|baf553b72f389972|47|1 StreamFrame[0(CIB),0,17,fin] 17.552 -> Packet A|1|S0|baf553b72f389972|32|1 AckFrame[2|Δ19] 17.561 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 17.634 loss detection timeout handler running Sending probe 0, because no ack since 17.532. Current RTT: 34/17. 17.634 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.634 (Probe is a handshake retransmit) 17.635 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 17.839/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.635 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 17.838 loss detection timeout handler running Sending probe 1, because no ack since 17.533. Current RTT: 34/17. 17.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.838 (Probe is a handshake retransmit) 17.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 18.246/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.838 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 17.839 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 18.247/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.839 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 18.165 <- (3) Packet A|8|S0|a6f86add3b7a0554|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 18.185 -> Packet A|2|S0|baf553b72f389972|34|1 AckFrame[8,2|Δ19] 18.216 <- (4) Packet A|9|S0|a6f86add3b7a0554|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b6cd805f4d784d17|28971659362f7b59ff84b1376d3e3290] 18.216 State is set to Confirmed reschedule loss detection timer for PTO over -175 millis, based on 18.041/App, because ackElicitingInFlight | RTT:34/17 18.216 loss detection timeout handler running Sending probe 2, because no ack since 17.533. Current RTT: 34/17. reschedule loss detection timer for PTO over -556 millis, based on 17.660/App, because ackElicitingInFlight | RTT:34/17 18.216 (Probe is retransmit on level App) 18.216 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 253 millis, based on 18.470/App, because ackElicitingInFlight | RTT:34/17 18.216 -> Packet PA|3|S0|baf553b72f389972|47|1 StreamFrame[0(CIB),0,17,fin] 18.236 -> Packet A|4|S0|baf553b72f389972|34|1 AckFrame[9-8,2|Δ19] 18.249 <- (5) Packet A|11|S0|a6f86add3b7a0554|1055|1 StreamFrame[0(CIB),0,1024,fin] 18.250 Finished downloading https://server4:443/gghfbjvyui at 38:45.671 on ClientConnection[a3eabfb30b09ca32/a6f86add3b7a0554(V1) with server4/193.167.100.100:443] 18.250 Closing ClientConnection[a3eabfb30b09ca32/a6f86add3b7a0554(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.250 -> Packet A|5|S0|baf553b72f389972|39|2 ConnectionCloseFrame[0|0|] AckFrame[11,9-8,2|Δ0] 18.251 Creating connection with server4:443 with v1 18.251 Setting up connection for downloading https://server4:443/pcxhpantgs at 38:45.672 on ClientConnection[dc8ab5843efde774/713c0d142ee9f356(V1) with server4/193.167.100.100:443] 18.251 Original destination connection id: dc8ab5843efde774 (scid: 713c0d142ee9f356) >- CryptoStream[I|ClientHello] 18.253 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.453/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.252 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.452 loss detection timeout handler running Sending probe 0, because no ack since 18.252. Current RTT: 100/25. 18.452 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.452 (Probe is an initial retransmit) 18.452 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.852/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.452 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.485 <- (1) Packet I|3|L|176|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 18.486 probe count not reset on ack because handshake not yet confirmed 18.486 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.886/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.485 <- (1) Packet H|4|L|765|1 CryptoFrame[0,718] 18.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.682/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.488 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 18.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.685/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.491 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.491 Starting downloading https://server4:443/pcxhpantgs at 38:45.912 on ClientConnection[dc8ab5843efde774/713c0d142ee9f356(V1) with server4/193.167.100.100:443] 18.485 <- (1) Packet A|5|S0|713c0d142ee9f356|259|2 CryptoFrame[0,89] Padding(139) 18.491 -> Packet H|1|L|46|1 AckFrame[4|Δ0] -< CryptoStream[A|NewSessionTicket] 18.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.589/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.492 Discarding pn space Initial because first Handshake message is being sent 18.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.589/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.492 -> Packet A|0|S0|8ed08ad15ab05304|47|1 StreamFrame[0(CIB),0,17,fin] 18.511 -> Packet A|1|S0|8ed08ad15ab05304|32|1 AckFrame[5|Δ19] 18.523 <- (2) Packet A|6|S0|713c0d142ee9f356|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1143b4df74b85788|a9298e10880963504f5bbfcbad64d4ba] 18.523 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 18.588/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 18.614/App, because ackElicitingInFlight | RTT:33/16 18.523 Discarding pn space Handshake because HandshakeDone is received 18.524 <- (3) Packet A|7|S0|713c0d142ee9f356|33|1 AckFrame[0|Δ1] 18.524 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.525 <- (4) Packet A|8|S0|713c0d142ee9f356|1055|1 StreamFrame[0(CIB),0,1024,fin] 18.526 -> Packet A|2|S0|8ed08ad15ab05304|32|1 AckFrame[8-5|Δ2] 18.526 Finished downloading https://server4:443/pcxhpantgs at 38:45.946 on ClientConnection[dc8ab5843efde774/713c0d142ee9f356(V1) with server4/193.167.100.100:443] 18.526 Closing ClientConnection[dc8ab5843efde774/713c0d142ee9f356(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.526 -> Packet A|3|S0|8ed08ad15ab05304|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-5|Δ0] 18.526 Creating connection with server4:443 with v1 18.527 Setting up connection for downloading https://server4:443/qzgziirpfz at 38:45.947 on ClientConnection[cf3fa182b51ec6c2/4ee2c3fbc6c4178a(V1) with server4/193.167.100.100:443] 18.527 Original destination connection id: cf3fa182b51ec6c2 (scid: 4ee2c3fbc6c4178a) >- CryptoStream[I|ClientHello] 18.528 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.728/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.528 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.727 loss detection timeout handler running Sending probe 0, because no ack since 18.528. Current RTT: 100/25. 18.727 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.727 (Probe is an initial retransmit) 18.728 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.128/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.728 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.761 <- (1) Packet I|3|L|176|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 18.761 probe count not reset on ack because handshake not yet confirmed 18.762 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.162/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.764 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.761 <- (1) Packet H|4|L|766|1 CryptoFrame[0,719] reschedule loss detection timer for PTO over 193 millis, based on 18.958/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.764 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 18.767 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 193 millis, based on 18.961/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.767 Starting downloading https://server4:443/qzgziirpfz at 38:46.187 on ClientConnection[cf3fa182b51ec6c2/4ee2c3fbc6c4178a(V1) with server4/193.167.100.100:443] 18.766 -> Packet H|0|L|80|1 CryptoFrame[0,36] 18.761 <- (1) Packet A|5|S0|4ee2c3fbc6c4178a|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 18.767 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.767 -> Packet H|1|L|46|1 AckFrame[4|Δ0] reschedule loss detection timer for PTO over 96 millis, based on 18.864/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.767 Discarding pn space Initial because first Handshake message is being sent 18.767 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.864/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.767 -> Packet A|0|S0|4c3c3245e19d0e26|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 18.863 loss detection timeout handler running Sending probe 0, because no ack since 18.766. Current RTT: 33/16. 18.864 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.864 (Probe is a handshake retransmit) 18.864 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.058/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.864 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 18.895 <- (2) Packet A|6|S0|4ee2c3fbc6c4178a|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e033a4b63f501db5|6b467c267581b2e63c42288b9452529f] 18.895 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 19.011/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 18.889/App, because ackElicitingInFlight | RTT:33/16 18.896 loss detection timeout handler running 18.896 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 18.767. Current RTT: 33/16. 18.896 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 19.140/App, because ackElicitingInFlight | RTT:33/16 18.896 -> Packet PA|1|S0|4c3c3245e19d0e26|47|1 StreamFrame[0(CIB),0,17,fin] 18.915 -> Packet A|2|S0|4c3c3245e19d0e26|32|1 AckFrame[6-5|Δ19] 19.035 <- (3) Packet A|7|S0|4ee2c3fbc6c4178a|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 19.054 -> Packet A|3|S0|4c3c3245e19d0e26|32|1 AckFrame[7-5|Δ19] 19.139 loss detection timeout handler running Sending probe 1, because no ack since 18.896. Current RTT: 33/16. 19.139 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 19.627/App, because ackElicitingInFlight | RTT:33/16 19.139 -> Packet PA|4|S0|4c3c3245e19d0e26|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 19.628/App, because ackElicitingInFlight | RTT:33/16 19.140 -> Packet PA|5|S0|4c3c3245e19d0e26|47|1 StreamFrame[0(CIB),0,17,fin] 19.172 <- (4) Packet A|9|S0|4ee2c3fbc6c4178a|1055|1 StreamFrame[0(CIB),0,1024,fin] 19.173 Finished downloading https://server4:443/qzgziirpfz at 38:46.593 on ClientConnection[cf3fa182b51ec6c2/4ee2c3fbc6c4178a(V1) with server4/193.167.100.100:443] 19.173 Closing ClientConnection[cf3fa182b51ec6c2/4ee2c3fbc6c4178a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.173 -> Packet A|6|S0|4c3c3245e19d0e26|37|2 ConnectionCloseFrame[0|0|] AckFrame[9,7-5|Δ0] 19.173 Creating connection with server4:443 with v1 19.174 Setting up connection for downloading https://server4:443/nptbgvcuci at 38:46.594 on ClientConnection[8b7203998e52b723/5ac7ed55fdf82621(V1) with server4/193.167.100.100:443] 19.174 Original destination connection id: 8b7203998e52b723 (scid: 5ac7ed55fdf82621) >- CryptoStream[I|ClientHello] 19.175 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.375/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.175 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.374 loss detection timeout handler running Sending probe 0, because no ack since 19.175. Current RTT: 100/25. 19.374 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.374 (Probe is an initial retransmit) 19.374 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.774/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.374 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.774 loss detection timeout handler running Sending probe 1, because no ack since 19.374. Current RTT: 100/25. 19.774 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.774 (Probe is an initial retransmit) 19.774 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 20.574/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.774 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.775 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 20.575/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.775 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.412 <- (1) Packet I|9|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 20.412 <- (1) Packet H|10|L|764|1 CryptoFrame[0,717] 20.415 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 21.215/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.415 -> Packet I|4|L|1201|2 Token=[] AckFrame[9|Δ0] Padding(1153) >- CryptoStream[H|Finished] 20.417 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 21.217/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.417 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.417 Starting downloading https://server4:443/nptbgvcuci at 38:47.838 on ClientConnection[8b7203998e52b723/5ac7ed55fdf82621(V1) with server4/193.167.100.100:443] 20.417 -> Packet H|1|L|46|1 AckFrame[10|Δ0] 20.412 <- (1) Packet A|11|S0|5ac7ed55fdf82621|265|2 CryptoFrame[0,89] Padding(145) -< CryptoStream[A|NewSessionTicket] 20.418 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.618/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.418 Discarding pn space Initial because first Handshake message is being sent 20.418 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.618/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.418 -> Packet A|0|S0|4645ca39c66de8c1|47|1 StreamFrame[0(CIB),0,17,fin] 20.437 -> Packet A|1|S0|4645ca39c66de8c1|32|1 AckFrame[11|Δ19] 20.617 loss detection timeout handler running Sending probe 0, because no ack since 20.417. Current RTT: 100/25. 20.617 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.617 (Probe is a handshake retransmit) 20.617 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 21.017/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.617 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 20.648 <- (2) Packet A|14|S0|5ac7ed55fdf82621|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|faf7df555425fb62|71472b3e0214a49ba536359f553be34d] 20.649 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 20.868/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -6 millis, based on 20.643/App, because ackElicitingInFlight | RTT:100/25 20.649 loss detection timeout handler running 20.649 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 20.418. Current RTT: 100/25. 20.649 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 21.099/App, because ackElicitingInFlight | RTT:100/25 20.649 -> Packet PA|2|S0|4645ca39c66de8c1|47|1 StreamFrame[0(CIB),0,17,fin] 20.668 -> Packet A|3|S0|4645ca39c66de8c1|34|1 AckFrame[14,11|Δ19] 20.681 <- (3) Packet A|15|S0|5ac7ed55fdf82621|33|1 AckFrame[2|Δ1] 20.681 Cwnd(-): 6000; inflight: 0 20.681 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 20.681 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 20.797/App, because ackElicitingInFlight | RTT:31/15 20.681 -> Packet A|4|S0|4645ca39c66de8c1|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[14,11|Δ0] 20.682 <- (4) Packet A|16|S0|5ac7ed55fdf82621|1055|1 StreamFrame[0(CIB),0,1024,fin] 20.683 Finished downloading https://server4:443/nptbgvcuci at 38:48.103 on ClientConnection[8b7203998e52b723/5ac7ed55fdf82621(V1) with server4/193.167.100.100:443] 20.683 Closing ClientConnection[8b7203998e52b723/5ac7ed55fdf82621(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.683 -> Packet A|5|S0|4645ca39c66de8c1|37|2 ConnectionCloseFrame[0|0|] AckFrame[16-14,11|Δ0] 20.683 Creating connection with server4:443 with v1 20.684 Setting up connection for downloading https://server4:443/npmovjjjev at 38:48.104 on ClientConnection[0fdffbfa8188b975/bc70e91e63d1e750(V1) with server4/193.167.100.100:443] 20.684 Original destination connection id: 0fdffbfa8188b975 (scid: bc70e91e63d1e750) >- CryptoStream[I|ClientHello] 20.685 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.885/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.685 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.799 <- (5) Packet A|17|S0|5ac7ed55fdf82621|121|2 PingFrame[] CryptoFrame[0,89] 20.799 -> Packet A|6|S0|4645ca39c66de8c1|37|2 ConnectionCloseFrame[0|0|] AckFrame[16-14,11|Δ0] 20.884 loss detection timeout handler running Sending probe 0, because no ack since 20.685. Current RTT: 100/25. 20.884 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.884 (Probe is an initial retransmit) 20.884 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.285/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.884 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.917 <- (1) Packet I|3|L|176|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 20.918 probe count not reset on ack because handshake not yet confirmed 20.918 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.318/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.920 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.917 <- (1) Packet H|4|L|766|1 CryptoFrame[0,719] reschedule loss detection timer for PTO over 193 millis, based on 21.114/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.920 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 20.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.116/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.922 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.923 Starting downloading https://server4:443/npmovjjjev at 38:48.343 on ClientConnection[0fdffbfa8188b975/bc70e91e63d1e750(V1) with server4/193.167.100.100:443] 20.917 <- (1) Packet A|5|S0|bc70e91e63d1e750|258|2 CryptoFrame[0,89] Padding(138) 20.923 -> Packet H|1|L|46|1 AckFrame[4|Δ0] -< CryptoStream[A|NewSessionTicket] 20.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.020/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.923 Discarding pn space Initial because first Handshake message is being sent 20.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.020/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.923 -> Packet A|0|S0|b96de94080e5243a|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 20.954 <- (2) Packet A|6|S0|bc70e91e63d1e750|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|36778097b14c26c9|3079af8900d9e18141c46eee95761261] 20.954 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 21.019/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 21.045/App, because ackElicitingInFlight | RTT:33/16 20.954 Discarding pn space Handshake because HandshakeDone is received 20.973 -> Packet A|1|S0|b96de94080e5243a|32|1 AckFrame[6-5|Δ19] 21.045 loss detection timeout handler running Sending probe 0, because no ack since 20.923. Current RTT: 33/16. 21.045 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 21.290/App, because ackElicitingInFlight | RTT:33/16 21.046 -> Packet PA|2|S0|b96de94080e5243a|47|1 StreamFrame[0(CIB),0,17,fin] 21.086 <- (3) Packet A|7|S0|bc70e91e63d1e750|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 21.105 -> Packet A|3|S0|b96de94080e5243a|32|1 AckFrame[7-5|Δ19] 21.289 loss detection timeout handler running Sending probe 1, because no ack since 21.046. Current RTT: 33/16. 21.289 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 21.777/App, because ackElicitingInFlight | RTT:33/16 21.289 -> Packet PA|4|S0|b96de94080e5243a|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 21.778/App, because ackElicitingInFlight | RTT:33/16 21.290 -> Packet PA|5|S0|b96de94080e5243a|47|1 StreamFrame[0(CIB),0,17,fin] 21.321 <- (4) Packet A|8|S0|bc70e91e63d1e750|32|1 AckFrame[5-3|Δ0] 21.321 Cwnd(-): 6000; inflight: 0 21.321 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 21.321 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 21.431/App, because ackElicitingInFlight | RTT:33/13 21.321 -> Packet A|6|S0|b96de94080e5243a|47|1 StreamFrame[0(CIB),0,17,fin] 21.431 loss detection timeout handler running Sending probe 0, because no ack since 21.321. Current RTT: 33/13. 21.431 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 21.651/App, because ackElicitingInFlight | RTT:33/13 21.431 -> Packet PA|7|S0|b96de94080e5243a|47|1 StreamFrame[0(CIB),0,17,fin] 21.650 loss detection timeout handler running Sending probe 1, because no ack since 21.431. Current RTT: 33/13. 21.650 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 439 millis, based on 22.090/App, because ackElicitingInFlight | RTT:33/13 21.650 -> Packet PA|8|S0|b96de94080e5243a|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 439 millis, based on 22.091/App, because ackElicitingInFlight | RTT:33/13 21.651 -> Packet PA|9|S0|b96de94080e5243a|47|1 StreamFrame[0(CIB),0,17,fin] 21.682 <- (5) Packet A|12|S0|bc70e91e63d1e750|34|1 AckFrame[9-7,5-3|Δ0] 21.683 Cwnd(-): 3000; inflight: 0 21.683 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 21.683 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 101 millis, based on 21.785/App, because ackElicitingInFlight | RTT:33/11 21.683 -> Packet A|10|S0|b96de94080e5243a|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8|Δ0] 21.714 <- (6) Packet A|13|S0|bc70e91e63d1e750|29|2 PingFrame[] Padding(1) 21.733 -> Packet A|11|S0|b96de94080e5243a|34|1 AckFrame[13-12,8|Δ19] 21.765 <- (7) Packet A|15|S0|bc70e91e63d1e750|1055|1 StreamFrame[0(CIB),0,1024,fin] 21.766 Finished downloading https://server4:443/npmovjjjev at 38:49.186 on ClientConnection[0fdffbfa8188b975/bc70e91e63d1e750(V1) with server4/193.167.100.100:443] 21.766 Closing ClientConnection[0fdffbfa8188b975/bc70e91e63d1e750(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.766 -> Packet A|12|S0|b96de94080e5243a|39|2 ConnectionCloseFrame[0|0|] AckFrame[15,13-12,8|Δ0] 21.766 Creating connection with server4:443 with v1 21.767 Setting up connection for downloading https://server4:443/wcvbinmeha at 38:49.188 on ClientConnection[439f08ee3f8cb902/c17d73b9c7b2d442(V1) with server4/193.167.100.100:443] 21.767 Original destination connection id: 439f08ee3f8cb902 (scid: c17d73b9c7b2d442) >- CryptoStream[I|ClientHello] 21.768 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.968/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.768 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.967 loss detection timeout handler running Sending probe 0, because no ack since 21.768. Current RTT: 100/25. 21.967 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.967 (Probe is an initial retransmit) 21.968 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.368/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.968 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.001 <- (1) Packet I|3|L|176|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 22.001 probe count not reset on ack because handshake not yet confirmed 22.001 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.401/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.001 <- (1) Packet H|4|L|765|1 CryptoFrame[0,718] 22.003 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.197/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.003 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 22.005 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.199/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.005 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.005 Starting downloading https://server4:443/wcvbinmeha at 38:49.426 on ClientConnection[439f08ee3f8cb902/c17d73b9c7b2d442(V1) with server4/193.167.100.100:443] 22.001 <- (1) Packet A|5|S0|c17d73b9c7b2d442|259|2 CryptoFrame[0,89] Padding(139) 22.006 -> Packet H|1|L|46|1 AckFrame[4|Δ0] -< CryptoStream[A|NewSessionTicket] 22.006 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.103/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.006 Discarding pn space Initial because first Handshake message is being sent 22.006 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.103/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.006 -> Packet A|0|S0|9fbc34558c0e4da3|47|1 StreamFrame[0(CIB),0,17,fin] 22.025 -> Packet A|1|S0|9fbc34558c0e4da3|32|1 AckFrame[5|Δ19] 22.102 loss detection timeout handler running Sending probe 0, because no ack since 22.005. Current RTT: 33/16. 22.102 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.102 (Probe is a handshake retransmit) 22.102 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.296/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.102 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 22.235 <- (2) Packet A|9|S0|c17d73b9c7b2d442|29|2 PingFrame[] Padding(1) 22.254 -> Packet A|2|S0|9fbc34558c0e4da3|34|1 AckFrame[9,5|Δ19] 22.286 <- (3) Packet A|10|S0|c17d73b9c7b2d442|1084|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f8427090bd839d44|6d951cfb3a02388187f487aa33b8815e] StreamFrame[0(CIB),0,1024,fin] 22.286 State is set to Confirmed reschedule loss detection timer for PTO over -36 millis, based on 22.250/App, because ackElicitingInFlight | RTT:33/16 22.286 loss detection timeout handler running Sending probe 1, because no ack since 22.006. Current RTT: 33/16. reschedule loss detection timer for PTO over -158 millis, based on 22.128/App, because ackElicitingInFlight | RTT:33/16 22.286 Discarding pn space Handshake because HandshakeDone is received 22.286 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 22.531/App, because ackElicitingInFlight | RTT:33/16 22.287 -> Packet PA|3|S0|9fbc34558c0e4da3|47|1 StreamFrame[0(CIB),0,17,fin] 22.287 Finished downloading https://server4:443/wcvbinmeha at 38:49.707 on ClientConnection[439f08ee3f8cb902/c17d73b9c7b2d442(V1) with server4/193.167.100.100:443] 22.287 Closing ClientConnection[439f08ee3f8cb902/c17d73b9c7b2d442(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.287 Creating connection with server4:443 with v1 22.287 -> Packet A|4|S0|9fbc34558c0e4da3|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,5|Δ0] 22.288 Setting up connection for downloading https://server4:443/mcxmnguvjj at 38:49.708 on ClientConnection[662238b7c5588369/eb7bfda6f398a176(V1) with server4/193.167.100.100:443] 22.288 Original destination connection id: 662238b7c5588369 (scid: eb7bfda6f398a176) >- CryptoStream[I|ClientHello] 22.289 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.489/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.289 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.451 <- (4) Packet A|11|S0|c17d73b9c7b2d442|29|2 PingFrame[] Padding(1) 22.451 -> Packet A|5|S0|9fbc34558c0e4da3|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,5|Δ0] 22.489 loss detection timeout handler running Sending probe 0, because no ack since 22.289. Current RTT: 100/25. 22.489 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.489 (Probe is an initial retransmit) 22.489 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.889/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.489 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.888 loss detection timeout handler running Sending probe 1, because no ack since 22.489. Current RTT: 100/25. 22.888 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.888 (Probe is an initial retransmit) 22.888 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.688/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.888 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.890 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.690/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.889 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.924 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ2] CryptoFrame[0,123] 22.924 probe count not reset on ack because handshake not yet confirmed 22.924 Retransmitting CryptoFrame[0,257] on level Initial 22.924 Cwnd(-): 6000; inflight: 1200 22.924 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.724/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.924 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 411 millis, based on 23.336/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.924 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 22.924 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 22.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 23.339/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.927 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 22.929 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 23.341/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.929 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.929 Starting downloading https://server4:443/mcxmnguvjj at 38:50.350 on ClientConnection[662238b7c5588369/eb7bfda6f398a176(V1) with server4/193.167.100.100:443] 22.924 <- (1) Packet A|2|S0|eb7bfda6f398a176|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 22.930 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.033/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.930 Discarding pn space Initial because first Handshake message is being sent 22.930 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.033/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.930 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|90050238f79fbdaf|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0]] 22.956 Discarding packet (49 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 22.960 <- (3) Packet A|7|S0|eb7bfda6f398a176|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|bfc2076e4c39c44b|dfc8798e7b22ab45a12c5a3a63ce15d0] 22.960 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 23.032/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 97 millis, based on 23.058/App, because ackElicitingInFlight | RTT:35/17 22.961 Discarding pn space Handshake because HandshakeDone is received 22.963 <- (4) Packet A|9|S0|eb7bfda6f398a176|1055|1 StreamFrame[0(CIB),0,1024,fin] 22.963 -> Packet A|1|S0|90050238f79fbdaf|36|1 AckFrame[9,7,2|Δ2] 22.963 Finished downloading https://server4:443/mcxmnguvjj at 38:50.384 on ClientConnection[662238b7c5588369/eb7bfda6f398a176(V1) with server4/193.167.100.100:443] 22.963 Closing ClientConnection[662238b7c5588369/eb7bfda6f398a176(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.964 -> Packet A|2|S0|90050238f79fbdaf|39|2 ConnectionCloseFrame[0|0|] AckFrame[9,7,2|Δ0] 22.964 Creating connection with server4:443 with v1 22.964 Setting up connection for downloading https://server4:443/vhvxdcqgjz at 38:50.385 on ClientConnection[5641eeccdcab1150/612a675b3aa8b72d(V1) with server4/193.167.100.100:443] 22.964 Original destination connection id: 5641eeccdcab1150 (scid: 612a675b3aa8b72d) >- CryptoStream[I|ClientHello] 22.966 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.166/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.966 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.994 <- (5) Packet A|10|S0|eb7bfda6f398a176|120|1 CryptoFrame[0,89] 22.995 -> Packet A|3|S0|90050238f79fbdaf|39|2 ConnectionCloseFrame[0|0|] AckFrame[9,7,2|Δ0] 23.001 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 23.002 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.202/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.001 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 23.004 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.107/Handshake, because peerAwaitingAddressValidation | RTT:35/17 23.004 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 23.006 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.109/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.006 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.006 Starting downloading https://server4:443/vhvxdcqgjz at 38:50.427 on ClientConnection[5641eeccdcab1150/612a675b3aa8b72d(V1) with server4/193.167.100.100:443] 23.001 <- (1) Packet A|2|S0|612a675b3aa8b72d|259|2 CryptoFrame[0,89] Padding(139) 23.006 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 23.006 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.109/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.006 Discarding pn space Initial because first Handshake message is being sent 23.007 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.110/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.007 -> Packet A|0|S0|9994a8aae8977a9f|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 23.037 <- (2) Packet A|3|S0|612a675b3aa8b72d|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|ab2850145d706df3|de3e0216efbc808482dc86a5a3d0b329] 23.037 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 23.109/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 97 millis, based on 23.135/App, because ackElicitingInFlight | RTT:35/17 23.038 Discarding pn space Handshake because HandshakeDone is received 23.039 <- (3) Packet A|4|S0|612a675b3aa8b72d|33|1 AckFrame[0|Δ1] 23.039 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 23.040 <- (4) Packet A|5|S0|612a675b3aa8b72d|1055|1 StreamFrame[0(CIB),0,1024,fin] 23.040 -> Packet A|1|S0|9994a8aae8977a9f|32|1 AckFrame[5-3|Δ2] 23.040 Finished downloading https://server4:443/vhvxdcqgjz at 38:50.461 on ClientConnection[5641eeccdcab1150/612a675b3aa8b72d(V1) with server4/193.167.100.100:443] 23.040 Closing ClientConnection[5641eeccdcab1150/612a675b3aa8b72d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.040 -> Packet A|2|S0|9994a8aae8977a9f|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 23.041 Creating connection with server4:443 with v1 23.041 Setting up connection for downloading https://server4:443/sxijchssla at 38:50.462 on ClientConnection[be7f4df6c677eb1c/fd2b8f864d6bbbcf(V1) with server4/193.167.100.100:443] 23.041 Original destination connection id: be7f4df6c677eb1c (scid: fd2b8f864d6bbbcf) >- CryptoStream[I|ClientHello] 23.044 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.244/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.044 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.243 loss detection timeout handler running Sending probe 0, because no ack since 23.044. Current RTT: 100/25. 23.243 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.243 (Probe is an initial retransmit) 23.244 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.644/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.244 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.643 loss detection timeout handler running Sending probe 1, because no ack since 23.244. Current RTT: 100/25. 23.643 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.643 (Probe is an initial retransmit) 23.643 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.443/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.643 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.644 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.444/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.644 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.678 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ2] CryptoFrame[0,123] 23.679 probe count not reset on ack because handshake not yet confirmed 23.679 Retransmitting CryptoFrame[0,257] on level Initial 23.679 Cwnd(-): 6000; inflight: 1200 23.679 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.479/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.679 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 411 millis, based on 24.091/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.679 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 23.678 <- (1) Packet H|1|L|766|1 CryptoFrame[0,719] 23.682 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 24.094/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.682 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 23.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 24.097/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.685 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.685 Starting downloading https://server4:443/sxijchssla at 38:51.105 on ClientConnection[be7f4df6c677eb1c/fd2b8f864d6bbbcf(V1) with server4/193.167.100.100:443] 23.685 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 23.678 <- (1) Packet A|2|S0|fd2b8f864d6bbbcf|257|2 CryptoFrame[0,89] Padding(137) -< CryptoStream[A|NewSessionTicket] 23.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.788/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.685 Discarding pn space Initial because first Handshake message is being sent 23.685 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 23.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.788/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.685 -> Packet A|0|S0|c92f84767bee0948|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 23.717 <- (3) Packet A|7|S0|fd2b8f864d6bbbcf|33|1 AckFrame[0|Δ1] 23.718 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.821/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.820 loss detection timeout handler running Sending probe 0, because no ack since 23.685. Current RTT: 35/14. 23.820 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.820 (Probe is a handshake retransmit) 23.820 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 24.002/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/14 23.820 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 24.001 loss detection timeout handler running Sending probe 1, because no ack since 23.685. Current RTT: 35/14. 24.001 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.001 (Probe is a handshake retransmit) 24.002 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 24.366/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/14 24.002 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 24.003 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 24.367/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/14 24.003 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 24.366 loss detection timeout handler running Sending probe 2, because no ack since 23.685. Current RTT: 35/14. 24.366 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.366 (Probe is a handshake retransmit) 24.366 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 727 millis, based on 25.094/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/14 24.366 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 24.367 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 727 millis, based on 25.095/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/14 24.367 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 25.094 loss detection timeout handler running Sending probe 3, because no ack since 23.685. Current RTT: 35/14. 25.094 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.094 (Probe is a handshake retransmit) 25.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1455 millis, based on 26.551/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/14 25.094 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 25.096 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1455 millis, based on 26.552/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/14 25.096 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 25.123 <- (4) Packet A|11|S0|fd2b8f864d6bbbcf|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 25.143 -> Packet A|1|S0|c92f84767bee0948|34|1 AckFrame[11,7|Δ19] 25.175 <- (5) Packet A|12|S0|fd2b8f864d6bbbcf|1084|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0f6904ad44ba104f|9427682c1136a26226bcb727b5ea258c] StreamFrame[0(CIB),0,1024,fin] 25.175 State is set to Confirmed reschedule loss detection timer for PTO over 1376 millis, based on 26.552/Handshake, because ackElicitingInFlight | RTT:35/14 25.175 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 25.175 Discarding pn space Handshake because HandshakeDone is received 25.176 Finished downloading https://server4:443/sxijchssla at 38:52.596 on ClientConnection[be7f4df6c677eb1c/fd2b8f864d6bbbcf(V1) with server4/193.167.100.100:443] 25.176 Closing ClientConnection[be7f4df6c677eb1c/fd2b8f864d6bbbcf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.176 -> Packet A|2|S0|c92f84767bee0948|37|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,7|Δ0] 25.177 Creating connection with server4:443 with v1 25.177 Setting up connection for downloading https://server4:443/cbzgfhaats at 38:52.598 on ClientConnection[fe4c4c185112d10f/a2f54e2b8e416710(V1) with server4/193.167.100.100:443] 25.177 Original destination connection id: fe4c4c185112d10f (scid: a2f54e2b8e416710) >- CryptoStream[I|ClientHello] 25.179 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.379/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.179 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.213 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 25.214 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.414/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 25.213 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 25.216 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 25.318/Handshake, because peerAwaitingAddressValidation | RTT:34/17 25.216 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 25.219 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 25.321/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 25.219 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.219 Starting downloading https://server4:443/cbzgfhaats at 38:52.639 on ClientConnection[fe4c4c185112d10f/a2f54e2b8e416710(V1) with server4/193.167.100.100:443] 25.213 <- (1) Packet A|2|S0|a2f54e2b8e416710|258|2 CryptoFrame[0,89] Padding(138) 25.219 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 25.219 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 25.321/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 25.219 Discarding pn space Initial because first Handshake message is being sent 25.219 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 25.321/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 25.219 -> Packet A|0|S0|94b640c28ae5ff56|47|1 StreamFrame[0(CIB),0,17,fin] 25.238 -> Packet A|1|S0|94b640c28ae5ff56|32|1 AckFrame[2|Δ19] 25.320 loss detection timeout handler running Sending probe 0, because no ack since 25.219. Current RTT: 34/17. 25.320 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.320 (Probe is a handshake retransmit) 25.321 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 25.525/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 25.321 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 25.351 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 25.351 <- (2) Packet A|4|S0|a2f54e2b8e416710|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 25.352 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] 25.371 -> Packet A|2|S0|94b640c28ae5ff56|34|1 AckFrame[4,2|Δ19] 25.471 <- (3) Packet H|5|L|45|2 PingFrame[] Padding(1) 25.471 <- (3) Packet A|6|S0|a2f54e2b8e416710|120|1 CryptoFrame[0,89] 25.471 -> Packet H|4|L|50|1 AckFrame[5,3,1|Δ0] -< CryptoStream[A|NewSessionTicket] 25.490 -> Packet A|3|S0|94b640c28ae5ff56|36|1 AckFrame[6,4,2|Δ19] 25.524 loss detection timeout handler running Sending probe 1, because no ack since 25.219. Current RTT: 34/17. 25.524 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.524 (Probe is a handshake retransmit) 25.524 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 25.932/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 25.524 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 25.525 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 25.933/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 25.525 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 25.555 <- (4) Packet A|7|S0|a2f54e2b8e416710|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|061b4a944158db87|cc1253251fefa2e4149b6210323fd129] 25.556 State is set to Confirmed reschedule loss detection timer for PTO over 171 millis, based on 25.727/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -209 millis, based on 25.346/App, because ackElicitingInFlight | RTT:34/17 25.556 Discarding pn space Handshake because HandshakeDone is received 25.556 loss detection timeout handler running Sending probe 0, because no ack since 25.219. Current RTT: 34/17. 25.556 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 25.810/App, because ackElicitingInFlight | RTT:34/17 25.556 -> Packet PA|4|S0|94b640c28ae5ff56|47|1 StreamFrame[0(CIB),0,17,fin] 25.575 -> Packet A|5|S0|94b640c28ae5ff56|36|1 AckFrame[7-6,4,2|Δ19] 25.809 loss detection timeout handler running Sending probe 1, because no ack since 25.556. Current RTT: 34/17. 25.809 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 26.317/App, because ackElicitingInFlight | RTT:34/17 25.809 -> Packet PA|6|S0|94b640c28ae5ff56|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 26.318/App, because ackElicitingInFlight | RTT:34/17 25.810 -> Packet PA|7|S0|94b640c28ae5ff56|47|1 StreamFrame[0(CIB),0,17,fin] 26.318 loss detection timeout handler running Sending probe 2, because no ack since 25.810. Current RTT: 34/17. 26.318 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1015 millis, based on 27.334/App, because ackElicitingInFlight | RTT:34/17 26.318 -> Packet PA|8|S0|94b640c28ae5ff56|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1015 millis, based on 27.335/App, because ackElicitingInFlight | RTT:34/17 26.319 -> Packet PA|9|S0|94b640c28ae5ff56|47|1 StreamFrame[0(CIB),0,17,fin] 26.351 <- (5) Packet A|8|S0|a2f54e2b8e416710|36|2 AckFrame[9,5|Δ1] PingFrame[] 26.351 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 26.351 Cwnd(-): 6000; inflight: 47 26.351 -> Packet A|10|S0|94b640c28ae5ff56|47|1 StreamFrame[0(CIB),0,17,fin] 26.352 <- (6) Packet A|9|S0|a2f54e2b8e416710|1055|1 StreamFrame[0(CIB),0,1024,fin] 26.352 -> Packet A|11|S0|94b640c28ae5ff56|32|1 AckFrame[9-8|Δ1] 26.353 Finished downloading https://server4:443/cbzgfhaats at 38:53.773 on ClientConnection[fe4c4c185112d10f/a2f54e2b8e416710(V1) with server4/193.167.100.100:443] 26.353 Closing ClientConnection[fe4c4c185112d10f/a2f54e2b8e416710(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.353 -> Packet A|12|S0|94b640c28ae5ff56|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 26.353 Creating connection with server4:443 with v1 26.354 Setting up connection for downloading https://server4:443/lzrkogcxty at 38:53.774 on ClientConnection[16187067fa40418c/3957df9af7c3dba0(V1) with server4/193.167.100.100:443] 26.354 Original destination connection id: 16187067fa40418c (scid: 3957df9af7c3dba0) >- CryptoStream[I|ClientHello] 26.355 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.555/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.355 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.383 <- (7) Packet A|10|S0|a2f54e2b8e416710|32|1 AckFrame[11-10|Δ0] 26.384 -> Packet A|13|S0|94b640c28ae5ff56|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 26.390 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 26.390 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.590/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 26.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.494/Handshake, because peerAwaitingAddressValidation | RTT:34/17 26.390 <- (1) Packet H|1|L|766|1 CryptoFrame[0,719] 26.392 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 26.395 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.497/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.395 -> Packet H|0|L|80|1 CryptoFrame[0,36] 26.395 Starting downloading https://server4:443/lzrkogcxty at 38:53.816 on ClientConnection[16187067fa40418c/3957df9af7c3dba0(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.396 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.498/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.396 -> Packet A|0|S0|58eb065ff5afa787|47|1 StreamFrame[0(CIB),0,17,fin] 26.390 <- (1) Packet A|2|S0|3957df9af7c3dba0|257|2 CryptoFrame[0,89] Padding(137) -< CryptoStream[A|NewSessionTicket] 26.396 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 26.396 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.498/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.396 Discarding pn space Initial because first Handshake message is being sent 26.415 -> Packet A|1|S0|58eb065ff5afa787|32|1 AckFrame[2|Δ19] 26.497 loss detection timeout handler running Sending probe 0, because no ack since 26.395. Current RTT: 34/17. 26.497 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.497 (Probe is a handshake retransmit) 26.497 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 26.701/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.497 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 26.528 <- (2) Packet A|3|S0|3957df9af7c3dba0|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|bf0f74352b16ad58|f0185b0391a20f83a8c3e3e889de1a9c] 26.529 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 26.650/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 26.523/App, because ackElicitingInFlight | RTT:34/17 26.529 loss detection timeout handler running 26.529 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 26.396. Current RTT: 34/17. 26.529 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 26.783/App, because ackElicitingInFlight | RTT:34/17 26.529 -> Packet PA|2|S0|58eb065ff5afa787|47|1 StreamFrame[0(CIB),0,17,fin] 26.548 -> Packet A|3|S0|58eb065ff5afa787|32|1 AckFrame[3-2|Δ19] 26.782 loss detection timeout handler running Sending probe 1, because no ack since 26.529. Current RTT: 34/17. 26.782 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 27.290/App, because ackElicitingInFlight | RTT:34/17 26.782 -> Packet PA|4|S0|58eb065ff5afa787|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 27.291/App, because ackElicitingInFlight | RTT:34/17 26.783 -> Packet PA|5|S0|58eb065ff5afa787|47|1 StreamFrame[0(CIB),0,17,fin] 26.815 <- (3) Packet A|4|S0|3957df9af7c3dba0|35|1 AckFrame[5,3|Δ1] 26.816 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 26.816 Cwnd(-): 6000; inflight: 47 26.816 -> Packet A|6|S0|58eb065ff5afa787|47|1 StreamFrame[0(CIB),0,17,fin] 26.816 <- (4) Packet A|5|S0|3957df9af7c3dba0|1055|1 StreamFrame[0(CIB),0,1024,fin] 26.817 Finished downloading https://server4:443/lzrkogcxty at 38:54.237 on ClientConnection[16187067fa40418c/3957df9af7c3dba0(V1) with server4/193.167.100.100:443] 26.817 Closing ClientConnection[16187067fa40418c/3957df9af7c3dba0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.817 -> Packet A|7|S0|58eb065ff5afa787|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 26.817 Creating connection with server4:443 with v1 26.818 Setting up connection for downloading https://server4:443/xxlsodcmpd at 38:54.238 on ClientConnection[836e72d710736154/38b049b6f84ae840(V1) with server4/193.167.100.100:443] 26.818 Original destination connection id: 836e72d710736154 (scid: 38b049b6f84ae840) >- CryptoStream[I|ClientHello] 26.819 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.019/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.819 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.018 loss detection timeout handler running Sending probe 0, because no ack since 26.819. Current RTT: 100/25. 27.018 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.018 (Probe is an initial retransmit) 27.019 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.419/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.019 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.252 <- (1) Packet I|6|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 27.252 <- (1) Packet H|7|L|766|1 CryptoFrame[0,719] 27.255 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 27.655/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.255 -> Packet I|2|L|1201|2 Token=[] AckFrame[6|Δ0] Padding(1153) >- CryptoStream[H|Finished] 27.258 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 27.658/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.258 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.258 Starting downloading https://server4:443/xxlsodcmpd at 38:54.679 on ClientConnection[836e72d710736154/38b049b6f84ae840(V1) with server4/193.167.100.100:443] 27.252 <- (1) Packet A|8|S0|38b049b6f84ae840|263|2 CryptoFrame[0,89] Padding(143) 27.258 -> Packet H|1|L|46|1 AckFrame[7|Δ0] -< CryptoStream[A|NewSessionTicket] 27.258 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 27.458/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.258 Discarding pn space Initial because first Handshake message is being sent 27.258 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 27.458/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.258 -> Packet A|0|S0|6d6790a9ef01f337|47|1 StreamFrame[0(CIB),0,17,fin] 27.278 -> Packet A|1|S0|6d6790a9ef01f337|32|1 AckFrame[8|Δ19] 27.406 <- (2) Packet A|10|S0|38b049b6f84ae840|29|2 PingFrame[] Padding(1) 27.426 -> Packet A|2|S0|6d6790a9ef01f337|34|1 AckFrame[10,8|Δ19] 27.457 loss detection timeout handler running Sending probe 0, because no ack since 27.258. Current RTT: 100/25. 27.458 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.458 (Probe is a handshake retransmit) 27.458 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 27.858/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.458 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 27.639 <- (3) Packet A|11|S0|38b049b6f84ae840|29|2 PingFrame[] Padding(1) 27.658 -> Packet A|3|S0|6d6790a9ef01f337|34|1 AckFrame[11-10,8|Δ19] 27.690 <- (4) Packet A|12|S0|38b049b6f84ae840|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|83ffb37756b413b0|a7909bc5308fd7b710b124c9d8838c0b] 27.690 State is set to Confirmed reschedule loss detection timer for PTO over 18 millis, based on 27.708/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -206 millis, based on 27.483/App, because ackElicitingInFlight | RTT:100/25 27.690 loss detection timeout handler running 27.690 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 27.258. Current RTT: 100/25. 27.690 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 28.140/App, because ackElicitingInFlight | RTT:100/25 27.690 -> Packet PA|4|S0|6d6790a9ef01f337|47|1 StreamFrame[0(CIB),0,17,fin] 27.710 -> Packet A|5|S0|6d6790a9ef01f337|34|1 AckFrame[12-10,8|Δ19] 27.722 <- (5) Packet A|13|S0|38b049b6f84ae840|35|1 AckFrame[4-3,1|Δ1] 27.723 Cwnd(-): 6000; inflight: 0 27.723 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 27.723 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 27.839/App, because ackElicitingInFlight | RTT:31/15 27.723 -> Packet A|6|S0|6d6790a9ef01f337|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[12|Δ0] 27.723 <- (6) Packet A|14|S0|38b049b6f84ae840|1055|1 StreamFrame[0(CIB),0,1024,fin] 27.724 Finished downloading https://server4:443/xxlsodcmpd at 38:55.144 on ClientConnection[836e72d710736154/38b049b6f84ae840(V1) with server4/193.167.100.100:443] 27.724 Closing ClientConnection[836e72d710736154/38b049b6f84ae840(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.724 -> Packet A|7|S0|6d6790a9ef01f337|35|2 ConnectionCloseFrame[0|0|] AckFrame[14-12|Δ0] 27.724 Creating connection with server4:443 with v1 27.725 Setting up connection for downloading https://server4:443/boelhoajnv at 38:55.145 on ClientConnection[3889dacc049d9b69/e1be8cebf37f25c8(V1) with server4/193.167.100.100:443] 27.725 Original destination connection id: 3889dacc049d9b69 (scid: e1be8cebf37f25c8) >- CryptoStream[I|ClientHello] 27.726 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.926/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.726 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.846 <- (7) Packet A|15|S0|38b049b6f84ae840|29|2 PingFrame[] Padding(1) 27.846 -> Packet A|8|S0|6d6790a9ef01f337|35|2 ConnectionCloseFrame[0|0|] AckFrame[14-12|Δ0] 27.925 loss detection timeout handler running Sending probe 0, because no ack since 27.726. Current RTT: 100/25. 27.925 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.925 (Probe is an initial retransmit) 27.925 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.325/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.925 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.159 <- (1) Packet I|6|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 28.159 <- (1) Packet H|7|L|765|1 CryptoFrame[0,718] 28.162 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 28.562/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.162 -> Packet I|2|L|1201|2 Token=[] AckFrame[6|Δ0] Padding(1153) >- CryptoStream[H|Finished] 28.164 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 28.564/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.164 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.164 Starting downloading https://server4:443/boelhoajnv at 38:55.585 on ClientConnection[3889dacc049d9b69/e1be8cebf37f25c8(V1) with server4/193.167.100.100:443] 28.159 <- (1) Packet A|8|S0|e1be8cebf37f25c8|264|2 CryptoFrame[0,89] Padding(144) 28.164 -> Packet H|1|L|46|1 AckFrame[7|Δ0] -< CryptoStream[A|NewSessionTicket] 28.164 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 28.364/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.164 Discarding pn space Initial because first Handshake message is being sent 28.165 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 28.365/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.165 -> Packet A|0|S0|0f82b2c48e2ab704|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8|Δ0] 28.195 <- (2) Packet A|9|S0|e1be8cebf37f25c8|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4273c87ea9534f68|e6876d2860d30bf411df42981a6d9ffc] 28.195 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 28.364/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 28.390/App, because ackElicitingInFlight | RTT:100/25 28.195 Discarding pn space Handshake because HandshakeDone is received 28.215 -> Packet A|1|S0|0f82b2c48e2ab704|32|1 AckFrame[9-8|Δ19] 28.390 loss detection timeout handler running Sending probe 0, because no ack since 28.165. Current RTT: 100/25. 28.390 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 28.840/App, because ackElicitingInFlight | RTT:100/25 28.390 -> Packet PA|2|S0|0f82b2c48e2ab704|47|1 StreamFrame[0(CIB),0,17,fin] 28.839 loss detection timeout handler running Sending probe 1, because no ack since 28.390. Current RTT: 100/25. 28.839 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 29.739/App, because ackElicitingInFlight | RTT:100/25 28.839 -> Packet PA|3|S0|0f82b2c48e2ab704|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 29.740/App, because ackElicitingInFlight | RTT:100/25 28.840 -> Packet PA|4|S0|0f82b2c48e2ab704|47|1 StreamFrame[0(CIB),0,17,fin] 28.871 <- (3) Packet A|10|S0|e1be8cebf37f25c8|35|1 AckFrame[3,1|Δ1] 28.872 Cwnd(-): 6000; inflight: 47 28.872 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 193 millis, based on 29.065/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 115 millis, based on 28.988/App, because ackElicitingInFlight | RTT:31/15 28.872 -> Packet A|5|S0|0f82b2c48e2ab704|47|1 StreamFrame[0(CIB),0,17,fin] 28.987 loss detection timeout handler running Sending probe 0, because no ack since 28.872. Current RTT: 31/15. 28.987 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 29.219/App, because ackElicitingInFlight | RTT:31/15 28.987 -> Packet PA|6|S0|0f82b2c48e2ab704|47|1 StreamFrame[0(CIB),0,17,fin] 29.003 <- (4) Packet A|13|S0|e1be8cebf37f25c8|29|2 PingFrame[] Padding(1) 29.019 <- (5) Packet A|14|S0|e1be8cebf37f25c8|37|1 AckFrame[6-5,3,1|Δ1] 29.020 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.023 -> Packet A|7|S0|0f82b2c48e2ab704|34|1 AckFrame[14-13,10|Δ19] 29.055 <- (6) Packet A|15|S0|e1be8cebf37f25c8|1055|1 StreamFrame[0(CIB),0,1024,fin] 29.055 Finished downloading https://server4:443/boelhoajnv at 38:56.476 on ClientConnection[3889dacc049d9b69/e1be8cebf37f25c8(V1) with server4/193.167.100.100:443] 29.055 Closing ClientConnection[3889dacc049d9b69/e1be8cebf37f25c8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.056 -> Packet A|8|S0|0f82b2c48e2ab704|37|2 ConnectionCloseFrame[0|0|] AckFrame[15-13,10|Δ0] 29.056 Creating connection with server4:443 with v1 29.056 Setting up connection for downloading https://server4:443/cpebvcxqdt at 38:56.477 on ClientConnection[85c812b0a85e12df/9c2bbad9727ad3da(V1) with server4/193.167.100.100:443] 29.056 Original destination connection id: 85c812b0a85e12df (scid: 9c2bbad9727ad3da) >- CryptoStream[I|ClientHello] 29.057 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.257/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.057 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.092 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 29.093 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.293/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 29.092 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 29.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.197/Handshake, because peerAwaitingAddressValidation | RTT:34/17 29.094 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 29.096 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.199/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.096 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.097 Starting downloading https://server4:443/cpebvcxqdt at 38:56.517 on ClientConnection[85c812b0a85e12df/9c2bbad9727ad3da(V1) with server4/193.167.100.100:443] 29.092 <- (1) Packet A|2|S0|9c2bbad9727ad3da|258|2 CryptoFrame[0,89] Padding(138) 29.097 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 29.097 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.199/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.097 Discarding pn space Initial because first Handshake message is being sent 29.097 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.199/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.097 -> Packet A|0|S0|356b17d27d55ea8f|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 29.167 <- (7) Packet A|16|S0|e1be8cebf37f25c8|29|2 PingFrame[] Padding(1) 29.168 -> Packet A|9|S0|0f82b2c48e2ab704|37|2 ConnectionCloseFrame[0|0|] AckFrame[15-13,10|Δ0] 29.198 loss detection timeout handler running Sending probe 0, because no ack since 29.096. Current RTT: 34/17. 29.198 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.198 (Probe is a handshake retransmit) 29.199 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 29.403/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.198 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 29.206 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 29.206 <- (2) Packet A|4|S0|9c2bbad9727ad3da|120|1 CryptoFrame[0,89] 29.207 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] -< CryptoStream[A|NewSessionTicket] 29.226 -> Packet A|1|S0|356b17d27d55ea8f|34|1 AckFrame[4,2|Δ19] 29.349 <- (3) Packet A|6|S0|9c2bbad9727ad3da|29|2 PingFrame[] Padding(1) 29.369 -> Packet A|2|S0|356b17d27d55ea8f|36|1 AckFrame[6,4,2|Δ19] 29.402 loss detection timeout handler running Sending probe 1, because no ack since 29.097. Current RTT: 34/17. 29.402 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.402 (Probe is a handshake retransmit) 29.402 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 29.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.402 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 29.403 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 29.811/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.403 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 29.586 <- (4) Packet A|7|S0|9c2bbad9727ad3da|29|2 PingFrame[] Padding(1) 29.606 -> Packet A|3|S0|356b17d27d55ea8f|36|1 AckFrame[7-6,4,2|Δ19] 29.637 <- (5) Packet A|8|S0|9c2bbad9727ad3da|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c589a3e1938e6882|595c372b6f23ef3b67f88013fb6bdfe9] 29.637 State is set to Confirmed reschedule loss detection timer for PTO over -31 millis, based on 29.605/App, because ackElicitingInFlight | RTT:34/17 29.637 loss detection timeout handler running Sending probe 2, because no ack since 29.097. Current RTT: 34/17. reschedule loss detection timer for PTO over -413 millis, based on 29.224/App, because ackElicitingInFlight | RTT:34/17 29.637 Discarding pn space Handshake because HandshakeDone is received 29.637 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 29.891/App, because ackElicitingInFlight | RTT:34/17 29.637 -> Packet PA|4|S0|356b17d27d55ea8f|47|1 StreamFrame[0(CIB),0,17,fin] 29.656 -> Packet A|5|S0|356b17d27d55ea8f|36|1 AckFrame[8-6,4,2|Δ19] 29.669 <- (6) Packet A|9|S0|9c2bbad9727ad3da|35|1 AckFrame[4-3,1|Δ1] 29.669 Cwnd(-): 6000; inflight: 0 29.669 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 29.670 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 114 millis, based on 29.785/App, because ackElicitingInFlight | RTT:34/14 29.670 -> Packet A|6|S0|356b17d27d55ea8f|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8|Δ0] 29.670 <- (7) Packet A|10|S0|9c2bbad9727ad3da|1055|1 StreamFrame[0(CIB),0,1024,fin] 29.671 Finished downloading https://server4:443/cpebvcxqdt at 38:57.091 on ClientConnection[85c812b0a85e12df/9c2bbad9727ad3da(V1) with server4/193.167.100.100:443] 29.671 Closing ClientConnection[85c812b0a85e12df/9c2bbad9727ad3da(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.671 -> Packet A|7|S0|356b17d27d55ea8f|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-8|Δ0] 29.671 Creating connection with server4:443 with v1 29.672 Setting up connection for downloading https://server4:443/vqezpcsodw at 38:57.092 on ClientConnection[5cbd77d3d46dd941/f798d651310cbd5e(V1) with server4/193.167.100.100:443] 29.672 Original destination connection id: 5cbd77d3d46dd941 (scid: f798d651310cbd5e) >- CryptoStream[I|ClientHello] 29.673 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.873/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.673 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.708 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 29.708 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.908/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 29.708 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 29.710 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.812/Handshake, because peerAwaitingAddressValidation | RTT:34/17 29.710 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 29.712 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.814/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.712 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.712 Starting downloading https://server4:443/vqezpcsodw at 38:57.132 on ClientConnection[5cbd77d3d46dd941/f798d651310cbd5e(V1) with server4/193.167.100.100:443] 29.708 <- (1) Packet A|2|S0|f798d651310cbd5e|258|2 CryptoFrame[0,89] Padding(138) 29.712 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 29.712 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.814/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.712 Discarding pn space Initial because first Handshake message is being sent 29.712 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.814/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.712 -> Packet A|0|S0|a1699b6fa4c5d19e|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 29.743 <- (2) Packet A|3|S0|f798d651310cbd5e|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|7c227bae621d64be|65b5dfbcf402597fe33b5c6f6f749896] 29.743 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 29.814/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 29.839/App, because ackElicitingInFlight | RTT:34/17 29.743 Discarding pn space Handshake because HandshakeDone is received 29.744 <- (3) Packet A|4|S0|f798d651310cbd5e|33|1 AckFrame[0|Δ1] 29.745 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.746 <- (4) Packet A|5|S0|f798d651310cbd5e|1055|1 StreamFrame[0(CIB),0,1024,fin] 29.746 -> Packet A|1|S0|a1699b6fa4c5d19e|32|1 AckFrame[5-3|Δ2] 29.746 Finished downloading https://server4:443/vqezpcsodw at 38:57.167 on ClientConnection[5cbd77d3d46dd941/f798d651310cbd5e(V1) with server4/193.167.100.100:443] 29.746 Closing ClientConnection[5cbd77d3d46dd941/f798d651310cbd5e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.746 -> Packet A|2|S0|a1699b6fa4c5d19e|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 29.746 Creating connection with server4:443 with v1 29.747 Setting up connection for downloading https://server4:443/hxlmlbdujb at 38:57.167 on ClientConnection[ba962a9bf47ff4f2/583744ce16228641(V1) with server4/193.167.100.100:443] 29.747 Original destination connection id: ba962a9bf47ff4f2 (scid: 583744ce16228641) >- CryptoStream[I|ClientHello] 29.748 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.948/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.748 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.782 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 29.782 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.982/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 29.782 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 29.784 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.886/Handshake, because peerAwaitingAddressValidation | RTT:34/17 29.784 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 29.786 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.888/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.786 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.786 Starting downloading https://server4:443/hxlmlbdujb at 38:57.207 on ClientConnection[ba962a9bf47ff4f2/583744ce16228641(V1) with server4/193.167.100.100:443] 29.782 <- (1) Packet A|2|S0|583744ce16228641|259|2 CryptoFrame[0,89] Padding(139) 29.786 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 29.787 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.787 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.889/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 101 millis, based on 29.889/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.787 Discarding pn space Initial because first Handshake message is being sent 29.786 -> Packet A|0|S0|e130a701d57cee38|47|1 StreamFrame[0(CIB),0,17,fin] 29.806 -> Packet A|1|S0|e130a701d57cee38|32|1 AckFrame[2|Δ19] 29.820 <- (2) Packet A|5|S0|583744ce16228641|1055|1 StreamFrame[0(CIB),0,1024,fin] 29.820 Finished downloading https://server4:443/hxlmlbdujb at 38:57.241 on ClientConnection[ba962a9bf47ff4f2/583744ce16228641(V1) with server4/193.167.100.100:443] 29.820 Closing ClientConnection[ba962a9bf47ff4f2/583744ce16228641(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.820 -> Packet A|2|S0|e130a701d57cee38|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 29.820 Creating connection with server4:443 with v1 29.821 Setting up connection for downloading https://server4:443/fkjddopanl at 38:57.241 on ClientConnection[e8dca191432dae89/aec5499a8a785890(V1) with server4/193.167.100.100:443] 29.821 Original destination connection id: e8dca191432dae89 (scid: aec5499a8a785890) >- CryptoStream[I|ClientHello] 29.822 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.022/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.822 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.856 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 29.857 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.057/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 29.856 <- (1) Packet H|1|L|765|1 CryptoFrame[0,718] 29.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.961/Handshake, because peerAwaitingAddressValidation | RTT:34/17 29.859 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 29.861 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.860 -> Packet H|0|L|80|1 CryptoFrame[0,36] 29.861 Starting downloading https://server4:443/fkjddopanl at 38:57.281 on ClientConnection[e8dca191432dae89/aec5499a8a785890(V1) with server4/193.167.100.100:443] 29.861 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 29.856 <- (1) Packet A|2|S0|aec5499a8a785890|258|2 CryptoFrame[0,89] Padding(138) -< CryptoStream[A|NewSessionTicket] 29.861 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.861 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 101 millis, based on 29.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.861 Discarding pn space Initial because first Handshake message is being sent 29.861 -> Packet A|0|S0|845905044ea7cb0b|47|1 StreamFrame[0(CIB),0,17,fin] 29.880 -> Packet A|1|S0|845905044ea7cb0b|32|1 AckFrame[2|Δ19] 29.933 <- (3) Packet A|6|S0|583744ce16228641|29|2 PingFrame[] Padding(1) 29.934 -> Packet A|3|S0|e130a701d57cee38|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 29.962 loss detection timeout handler running Sending probe 0, because no ack since 29.860. Current RTT: 34/17. 29.962 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.962 (Probe is a handshake retransmit) 29.962 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 30.166/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.962 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 30.165 loss detection timeout handler running Sending probe 1, because no ack since 29.861. Current RTT: 34/17. 30.165 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.166 (Probe is a handshake retransmit) 30.166 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 30.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 30.166 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 30.167 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 30.575/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 30.167 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 30.574 loss detection timeout handler running Sending probe 2, because no ack since 29.861. Current RTT: 34/17. 30.574 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.574 (Probe is a handshake retransmit) 30.574 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 31.390/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 30.574 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 30.575 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 31.391/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 30.575 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 30.805 <- (2) Packet A|6|S0|aec5499a8a785890|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 30.825 -> Packet A|2|S0|845905044ea7cb0b|34|1 AckFrame[6,2|Δ19] 30.856 <- (3) Packet A|7|S0|aec5499a8a785890|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|d0fd2b6371cd05cf|b0b816b692935c8be3c08d057da2e702] 30.856 State is set to Confirmed reschedule loss detection timer for PTO over 20 millis, based on 30.877/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -868 millis, based on 29.988/App, because ackElicitingInFlight | RTT:34/17 30.856 loss detection timeout handler running Sending probe 0, because no ack since 29.861. Current RTT: 34/17. 30.856 Discarding pn space Handshake because HandshakeDone is received 30.856 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 31.110/App, because ackElicitingInFlight | RTT:34/17 30.856 -> Packet PA|3|S0|845905044ea7cb0b|47|1 StreamFrame[0(CIB),0,17,fin] 30.876 -> Packet A|4|S0|845905044ea7cb0b|34|1 AckFrame[7-6,2|Δ19] 30.987 <- (4) Packet A|8|S0|aec5499a8a785890|29|2 PingFrame[] Padding(1) 31.007 -> Packet A|5|S0|845905044ea7cb0b|34|1 AckFrame[8-6,2|Δ19] 31.110 loss detection timeout handler running Sending probe 1, because no ack since 30.856. Current RTT: 34/17. 31.110 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 31.618/App, because ackElicitingInFlight | RTT:34/17 31.110 -> Packet PA|6|S0|845905044ea7cb0b|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 31.619/App, because ackElicitingInFlight | RTT:34/17 31.111 -> Packet PA|7|S0|845905044ea7cb0b|47|1 StreamFrame[0(CIB),0,17,fin] 31.618 loss detection timeout handler running Sending probe 2, because no ack since 31.111. Current RTT: 34/17. 31.618 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1015 millis, based on 32.634/App, because ackElicitingInFlight | RTT:34/17 31.618 -> Packet PA|8|S0|845905044ea7cb0b|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1015 millis, based on 32.635/App, because ackElicitingInFlight | RTT:34/17 31.619 -> Packet PA|9|S0|845905044ea7cb0b|47|1 StreamFrame[0(CIB),0,17,fin] 31.782 <- (5) Packet A|11|S0|aec5499a8a785890|29|2 PingFrame[] Padding(1) 31.801 -> Packet A|10|S0|845905044ea7cb0b|36|1 AckFrame[11,8-6,2|Δ19] 32.043 <- (6) Packet A|12|S0|aec5499a8a785890|29|2 PingFrame[] Padding(1) 32.063 -> Packet A|11|S0|845905044ea7cb0b|36|1 AckFrame[12-11,8-6,2|Δ19] 32.095 <- (7) Packet A|13|S0|aec5499a8a785890|1055|1 StreamFrame[0(CIB),0,1024,fin] 32.095 Finished downloading https://server4:443/fkjddopanl at 38:59.516 on ClientConnection[e8dca191432dae89/aec5499a8a785890(V1) with server4/193.167.100.100:443] 32.095 Closing ClientConnection[e8dca191432dae89/aec5499a8a785890(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.096 -> Packet A|12|S0|845905044ea7cb0b|39|2 ConnectionCloseFrame[0|0|] AckFrame[13-11,8-6,2|Δ0] 32.096 Creating connection with server4:443 with v1 32.096 Setting up connection for downloading https://server4:443/cwjqxmwxyf at 38:59.517 on ClientConnection[a8d6b7e6f4956a2f/3936ca614bc06ceb(V1) with server4/193.167.100.100:443] 32.096 Original destination connection id: a8d6b7e6f4956a2f (scid: 3936ca614bc06ceb) >- CryptoStream[I|ClientHello] 32.098 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.298/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.097 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.297 loss detection timeout handler running Sending probe 0, because no ack since 32.097. Current RTT: 100/25. 32.297 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.297 (Probe is an initial retransmit) 32.297 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.697/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.297 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.332 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 32.332 probe count not reset on ack because handshake not yet confirmed 32.333 Retransmitting CryptoFrame[0,257] on level Initial 32.333 Cwnd(-): 6000; inflight: 0 32.333 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.733/Initial, because peerAwaitingAddressValidation | RTT:100/25 32.333 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 32.537/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.333 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 32.332 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 32.335 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 32.539/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.335 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 32.337 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 32.541/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.337 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.337 Starting downloading https://server4:443/cwjqxmwxyf at 38:59.758 on ClientConnection[a8d6b7e6f4956a2f/3936ca614bc06ceb(V1) with server4/193.167.100.100:443] 32.332 <- (1) Packet A|2|S0|3936ca614bc06ceb|259|2 CryptoFrame[0,89] Padding(139) -< CryptoStream[A|NewSessionTicket] 32.337 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 32.439/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.337 Discarding pn space Initial because first Handshake message is being sent 32.338 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 32.440/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.338 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|c068788b60a501c5|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0]] 32.368 <- (2) Packet A|6|S0|3936ca614bc06ceb|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|cfa1ec3330b45328|6f79cadc0e430b0b95efdb338666b1b3] 32.368 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 32.439/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 96 millis, based on 32.465/App, because ackElicitingInFlight | RTT:34/17 32.369 Discarding pn space Handshake because HandshakeDone is received 32.388 -> Packet A|1|S0|c068788b60a501c5|34|1 AckFrame[6,2|Δ19] 32.422 <- (3) Packet A|7|S0|3936ca614bc06ceb|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 32.442 -> Packet A|2|S0|c068788b60a501c5|34|1 AckFrame[7-6,2|Δ19] 32.465 loss detection timeout handler running Sending probe 0, because no ack since 32.338. Current RTT: 34/17. 32.465 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 32.719/App, because ackElicitingInFlight | RTT:34/17 32.465 -> Packet PA|3|S0|c068788b60a501c5|47|1 StreamFrame[0(CIB),0,17,fin] 32.718 loss detection timeout handler running Sending probe 1, because no ack since 32.465. Current RTT: 34/17. 32.718 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 33.226/App, because ackElicitingInFlight | RTT:34/17 32.718 -> Packet PA|4|S0|c068788b60a501c5|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 33.227/App, because ackElicitingInFlight | RTT:34/17 32.719 -> Packet PA|5|S0|c068788b60a501c5|47|1 StreamFrame[0(CIB),0,17,fin] 32.752 <- (4) Packet A|9|S0|3936ca614bc06ceb|1055|1 StreamFrame[0(CIB),0,1024,fin] 32.752 Finished downloading https://server4:443/cwjqxmwxyf at 39:00.173 on ClientConnection[a8d6b7e6f4956a2f/3936ca614bc06ceb(V1) with server4/193.167.100.100:443] 32.752 Closing ClientConnection[a8d6b7e6f4956a2f/3936ca614bc06ceb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.753 -> Packet A|6|S0|c068788b60a501c5|39|2 ConnectionCloseFrame[0|0|] AckFrame[9,7-6,2|Δ0]