0.000 Creating connection with server4:443 with v1 0.084 Setting up connection for downloading https://server4:443/heeywgmemp at 20:46.722 on ClientConnection[8fbe3d95cfff143e/7f242b59d62cf04a(V1) with server4/193.167.100.100:443] 0.085 Original destination connection id: 8fbe3d95cfff143e (scid: 7f242b59d62cf04a) >- CryptoStream[I|ClientHello] 0.262 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.462/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.257 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.462 loss detection timeout handler running Sending probe 0, because no ack since 0.257. Current RTT: 100/25. 0.464 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.466 (Probe is an initial retransmit) 0.469 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.869/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.469 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.504 <- (1) Packet I|3|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 0.531 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 0.931/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.531 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) 0.504 <- (1) Packet H|4|L|762|1 CryptoFrame[0,715] 0.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 0.959/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.559 -> Packet H|0|L|80|1 CryptoFrame[0,36] >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.565 Starting downloading https://server4:443/heeywgmemp at 20:47.219 on ClientConnection[8fbe3d95cfff143e/7f242b59d62cf04a(V1) with server4/193.167.100.100:443] 0.566 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 0.504 <- (1) Packet A|5|S0|7f242b59d62cf04a|267|2 CryptoFrame[0,89] Padding(147) -< CryptoStream[A|NewSessionTicket] 0.586 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 0.787/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.587 Discarding pn space Initial because first Handshake message is being sent 0.597 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 0.797/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.596 -> Packet A|0|S0|8843a98c0c84bb3e|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ15] 0.719 <- (2) Packet H|6|L|45|2 PingFrame[] Padding(1) 0.719 <- (2) Packet A|7|S0|7f242b59d62cf04a|120|1 CryptoFrame[0,89] 0.720 -> Packet H|2|L|48|1 AckFrame[6,4|Δ0] -< CryptoStream[A|NewSessionTicket] 0.743 -> Packet A|1|S0|8843a98c0c84bb3e|34|1 AckFrame[7,5|Δ19] 0.796 loss detection timeout handler running Sending probe 0, because no ack since 0.559. Current RTT: 100/25. 0.796 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.796 (Probe is a handshake retransmit) 0.797 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 1.197/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.797 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 0.828 <- (3) Packet A|8|S0|7f242b59d62cf04a|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e7c3231d91c5e5b9|5d1bb8185b865ff2ad73e6a76e082e88] 0.832 State is set to Confirmed reschedule loss detection timer for PTO over 213 millis, based on 1.046/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -11 millis, based on 0.821/App, because ackElicitingInFlight | RTT:100/25 0.833 loss detection timeout handler running 0.833 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 0.596. Current RTT: 100/25. 0.833 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 1.284/App, because ackElicitingInFlight | RTT:100/25 0.834 -> Packet PA|2|S0|8843a98c0c84bb3e|47|1 StreamFrame[0(CIB),0,17,fin] 0.853 -> Packet A|3|S0|8843a98c0c84bb3e|34|1 AckFrame[8-7,5|Δ19] 1.283 loss detection timeout handler running Sending probe 1, because no ack since 0.834. Current RTT: 100/25. 1.284 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 2.184/App, because ackElicitingInFlight | RTT:100/25 1.284 -> Packet PA|4|S0|8843a98c0c84bb3e|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 2.185/App, because ackElicitingInFlight | RTT:100/25 1.285 -> Packet PA|5|S0|8843a98c0c84bb3e|47|1 StreamFrame[0(CIB),0,17,fin] 1.317 <- (4) Packet A|9|S0|7f242b59d62cf04a|33|1 AckFrame[4-3|Δ1] 1.324 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 224 millis, based on 1.550/App, because ackElicitingInFlight | RTT:100/25 1.325 -> Packet A|6|S0|8843a98c0c84bb3e|47|1 StreamFrame[0(CIB),0,17,fin] 1.325 Cwnd(-): 6000; inflight: 94 reschedule loss detection timer for PTO over 223 millis, based on 1.550/App, because ackElicitingInFlight | RTT:100/25 1.323 <- (5) Packet A|10|S0|7f242b59d62cf04a|33|1 AckFrame[5-3|Δ2] reschedule loss detection timer for PTO over 114 millis, based on 1.446/App, because ackElicitingInFlight | RTT:32/16 1.324 <- (6) Packet A|11|S0|7f242b59d62cf04a|1055|1 StreamFrame[0(CIB),0,1024,fin] 1.334 Finished downloading https://server4:443/heeywgmemp at 20:47.988 on ClientConnection[8fbe3d95cfff143e/7f242b59d62cf04a(V1) with server4/193.167.100.100:443] 1.336 Closing ClientConnection[8fbe3d95cfff143e/7f242b59d62cf04a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.338 Creating connection with server4:443 with v1 1.339 Setting up connection for downloading https://server4:443/pvalyvybuc at 20:47.993 on ClientConnection[14a4c52804b8f82b/832cea1a79132524(V1) with server4/193.167.100.100:443] 1.339 Original destination connection id: 14a4c52804b8f82b (scid: 832cea1a79132524) >- CryptoStream[I|ClientHello] 1.338 -> Packet A|7|S0|8843a98c0c84bb3e|36|2 ConnectionCloseFrame[0|0|] AckFrame[11-9|Δ5] 1.343 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.543/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.342 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.378 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 1.379 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.579/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.378 <- (1) Packet H|1|L|762|1 CryptoFrame[0,715] 1.387 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.490/Handshake, because peerAwaitingAddressValidation | RTT:35/17 1.386 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 1.390 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.493/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.389 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.378 <- (1) Packet A|2|S0|832cea1a79132524|261|2 CryptoFrame[0,89] Padding(141) -< CryptoStream[A|NewSessionTicket] 1.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.495/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.392 Discarding pn space Initial because first Handshake message is being sent 1.391 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 1.392 Starting downloading https://server4:443/pvalyvybuc at 20:48.047 on ClientConnection[14a4c52804b8f82b/832cea1a79132524(V1) with server4/193.167.100.100:443] 1.394 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.497/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.393 -> Packet A|0|S0|ba88615f17c33b34|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ1] 1.425 <- (2) Packet A|4|S0|832cea1a79132524|33|1 AckFrame[0|Δ1] 1.426 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.529/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.427 <- (3) Packet A|5|S0|832cea1a79132524|1055|1 StreamFrame[0(CIB),0,1024,fin] 1.428 Finished downloading https://server4:443/pvalyvybuc at 20:48.083 on ClientConnection[14a4c52804b8f82b/832cea1a79132524(V1) with server4/193.167.100.100:443] 1.428 Closing ClientConnection[14a4c52804b8f82b/832cea1a79132524(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.429 -> Packet A|1|S0|ba88615f17c33b34|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ1] 1.429 Creating connection with server4:443 with v1 1.430 Setting up connection for downloading https://server4:443/qquaxhoezu at 20:48.085 on ClientConnection[5b7175e26cff5251/b4526e1a58210ef4(V1) with server4/193.167.100.100:443] 1.430 Original destination connection id: 5b7175e26cff5251 (scid: b4526e1a58210ef4) >- CryptoStream[I|ClientHello] 1.433 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.633/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.433 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.468 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 1.469 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.669/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.468 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 1.473 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.576/Handshake, because peerAwaitingAddressValidation | RTT:35/17 1.473 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 1.477 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.580/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.477 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.468 <- (1) Packet A|2|S0|b4526e1a58210ef4|259|2 CryptoFrame[0,89] Padding(139) -< CryptoStream[A|NewSessionTicket] 1.479 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.582/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.479 Discarding pn space Initial because first Handshake message is being sent 1.480 Starting downloading https://server4:443/qquaxhoezu at 20:48.134 on ClientConnection[5b7175e26cff5251/b4526e1a58210ef4(V1) with server4/193.167.100.100:443] 1.481 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.584/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.481 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|08e2813ceb4806af|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ1]] 1.583 loss detection timeout handler running Sending probe 0, because no ack since 1.477. Current RTT: 35/17. 1.583 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.584 (Probe is a handshake retransmit) 1.584 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 1.790/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.584 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 1.597 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 1.597 <- (2) Packet A|4|S0|b4526e1a58210ef4|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 1.598 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] 1.617 -> Packet A|1|S0|08e2813ceb4806af|34|1 AckFrame[4,2|Δ19] 1.790 loss detection timeout handler running Sending probe 1, because no ack since 1.481. Current RTT: 35/17. 1.790 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.790 (Probe is a handshake retransmit) 1.790 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 2.202/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.790 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 1.791 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 2.203/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.791 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 1.936 <- (3) Packet A|8|S0|b4526e1a58210ef4|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 1.956 -> Packet A|2|S0|08e2813ceb4806af|36|1 AckFrame[8,4,2|Δ19] 2.203 loss detection timeout handler running Sending probe 2, because no ack since 1.481. Current RTT: 35/17. 2.203 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.203 (Probe is a handshake retransmit) 2.203 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 823 millis, based on 3.027/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.203 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 2.204 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 823 millis, based on 3.028/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.204 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 2.349 <- (4) Packet A|11|S0|b4526e1a58210ef4|29|2 PingFrame[] Padding(1) 2.369 -> Packet A|3|S0|08e2813ceb4806af|38|1 AckFrame[11,8,4,2|Δ19] 2.401 <- (5) Packet A|12|S0|b4526e1a58210ef4|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a87cad31f98481b0|0918fe83b9e8858acffe262497c26398] 2.401 State is set to Confirmed reschedule loss detection timer for PTO over 102 millis, based on 2.505/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -793 millis, based on 1.609/App, because ackElicitingInFlight | RTT:35/17 2.402 loss detection timeout handler running 2.402 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 1.481. Current RTT: 35/17. 2.402 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 2.658/App, because ackElicitingInFlight | RTT:35/17 2.402 -> Packet PA|4|S0|08e2813ceb4806af|47|1 StreamFrame[0(CIB),0,17,fin] 2.422 -> Packet A|5|S0|08e2813ceb4806af|38|1 AckFrame[12-11,8,4,2|Δ19] 2.435 <- (6) Packet A|14|S0|b4526e1a58210ef4|1055|1 StreamFrame[0(CIB),0,1024,fin] 2.436 Finished downloading https://server4:443/qquaxhoezu at 20:49.091 on ClientConnection[5b7175e26cff5251/b4526e1a58210ef4(V1) with server4/193.167.100.100:443] 2.436 Closing ClientConnection[5b7175e26cff5251/b4526e1a58210ef4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.437 -> Packet A|6|S0|08e2813ceb4806af|43|2 ConnectionCloseFrame[0|0|] AckFrame[14,12-11,8,4,2|Δ0] 2.438 Creating connection with server4:443 with v1 2.438 Setting up connection for downloading https://server4:443/odkquqexca at 20:49.093 on ClientConnection[1e3734191c031bc4/5675165c33cdd59f(V1) with server4/193.167.100.100:443] 2.438 Original destination connection id: 1e3734191c031bc4 (scid: 5675165c33cdd59f) >- CryptoStream[I|ClientHello] 2.441 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.641/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.440 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.475 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 2.476 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.676/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.475 <- (1) Packet H|1|L|762|1 CryptoFrame[0,715] 2.480 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.583/Handshake, because peerAwaitingAddressValidation | RTT:35/17 2.480 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 2.483 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.586/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.483 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.484 Starting downloading https://server4:443/odkquqexca at 20:49.138 on ClientConnection[1e3734191c031bc4/5675165c33cdd59f(V1) with server4/193.167.100.100:443] 2.475 <- (1) Packet A|2|S0|5675165c33cdd59f|261|2 CryptoFrame[0,89] Padding(141) -< CryptoStream[A|NewSessionTicket] 2.485 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.485 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.588/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 102 millis, based on 2.588/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.485 Discarding pn space Initial because first Handshake message is being sent 2.485 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|4e5fc71f44f6f3a5|47|1 StreamFrame[0(CIB),0,17,fin]] 2.504 -> Packet A|1|S0|4e5fc71f44f6f3a5|32|1 AckFrame[2|Δ19] 2.515 <- (2) Packet A|3|S0|5675165c33cdd59f|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e072a1ac8c8167d3|3153187b8762d21decd41e8c325c5857] 2.515 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 2.586/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 96 millis, based on 2.613/App, because ackElicitingInFlight | RTT:35/17 2.516 Discarding pn space Handshake because HandshakeDone is received 2.535 -> Packet A|2|S0|4e5fc71f44f6f3a5|32|1 AckFrame[3-2|Δ19] 2.612 loss detection timeout handler running Sending probe 0, because no ack since 2.485. Current RTT: 35/17. 2.612 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 2.869/App, because ackElicitingInFlight | RTT:35/17 2.613 -> Packet PA|3|S0|4e5fc71f44f6f3a5|47|1 StreamFrame[0(CIB),0,17,fin] 2.640 <- (3) Packet A|4|S0|5675165c33cdd59f|29|2 PingFrame[] Padding(1) 2.660 -> Packet A|4|S0|4e5fc71f44f6f3a5|32|1 AckFrame[4-2|Δ19] 2.868 loss detection timeout handler running Sending probe 1, because no ack since 2.613. Current RTT: 35/17. 2.869 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 511 millis, based on 3.381/App, because ackElicitingInFlight | RTT:35/17 2.869 -> Packet PA|5|S0|4e5fc71f44f6f3a5|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 511 millis, based on 3.382/App, because ackElicitingInFlight | RTT:35/17 2.870 -> Packet PA|6|S0|4e5fc71f44f6f3a5|47|1 StreamFrame[0(CIB),0,17,fin] 2.901 <- (4) Packet A|5|S0|5675165c33cdd59f|35|1 AckFrame[5-4,1|Δ1] 2.902 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 2.902 Cwnd(-): 6000; inflight: 47 reschedule loss detection timer for PTO over 95 millis, based on 2.998/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 127 millis, based on 3.031/App, because ackElicitingInFlight | RTT:35/17 2.903 -> Packet A|7|S0|4e5fc71f44f6f3a5|47|1 StreamFrame[0(CIB),0,17,fin] 2.903 <- (5) Packet A|6|S0|5675165c33cdd59f|1055|1 StreamFrame[0(CIB),0,1024,fin] 2.904 Finished downloading https://server4:443/odkquqexca at 20:49.558 on ClientConnection[1e3734191c031bc4/5675165c33cdd59f(V1) with server4/193.167.100.100:443] 2.904 Closing ClientConnection[1e3734191c031bc4/5675165c33cdd59f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.905 -> Packet A|8|S0|4e5fc71f44f6f3a5|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 2.905 Creating connection with server4:443 with v1 2.905 Setting up connection for downloading https://server4:443/xcvlvuegrs at 20:49.560 on ClientConnection[9586d9126a2892e4/f67829d7c9944f7a(V1) with server4/193.167.100.100:443] 2.906 Original destination connection id: 9586d9126a2892e4 (scid: f67829d7c9944f7a) >- CryptoStream[I|ClientHello] 2.907 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.107/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.907 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.935 <- (6) Packet A|7|S0|5675165c33cdd59f|37|1 AckFrame[7,5-4,1|Δ1] 2.937 -> Packet A|9|S0|4e5fc71f44f6f3a5|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 3.107 loss detection timeout handler running Sending probe 0, because no ack since 2.907. Current RTT: 100/25. 3.107 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.107 (Probe is an initial retransmit) 3.108 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.508/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.108 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.507 loss detection timeout handler running Sending probe 1, because no ack since 3.108. Current RTT: 100/25. 3.507 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.507 (Probe is an initial retransmit) 3.508 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.308/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.508 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.509 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.309/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.509 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.541 <- (1) Packet I|9|L|49|1 Token=[] AckFrame[2-0|Δ0] 3.541 probe count not reset on ack because handshake not yet confirmed 3.541 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.342/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.744 <- (2) Packet I|10|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 3.744 <- (2) Packet H|11|L|763|1 CryptoFrame[0,716] 3.748 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 4.132/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.747 -> Packet I|4|L|1201|2 Token=[] AckFrame[10-9|Δ0] Padding(1153) >- CryptoStream[H|Finished] 3.750 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 4.134/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.750 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.751 Starting downloading https://server4:443/xcvlvuegrs at 20:50.406 on ClientConnection[9586d9126a2892e4/f67829d7c9944f7a(V1) with server4/193.167.100.100:443] 3.751 -> Packet H|1|L|46|1 AckFrame[11|Δ0] 3.744 <- (2) Packet A|12|S0|f67829d7c9944f7a|266|2 CryptoFrame[0,89] Padding(146) -< CryptoStream[A|NewSessionTicket] 3.752 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 3.848/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.752 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.752 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 95 millis, based on 3.848/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.752 -> Packet A|0|S0|ce388d53e41306f0|47|1 StreamFrame[0(CIB),0,17,fin] 3.772 -> Packet A|1|S0|ce388d53e41306f0|32|1 AckFrame[12|Δ19] 3.782 <- (3) Packet A|13|S0|f67829d7c9944f7a|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|bacb3e7d002b547d|aa2717cfbde0ce195bdb5684e13dcdb9] 3.782 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 3.846/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 3.873/App, because ackElicitingInFlight | RTT:32/16 3.783 Discarding pn space Handshake because HandshakeDone is received 3.784 <- (4) Packet A|14|S0|f67829d7c9944f7a|33|1 AckFrame[0|Δ1] 3.784 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.785 <- (5) Packet A|15|S0|f67829d7c9944f7a|1055|1 StreamFrame[0(CIB),0,1024,fin] 3.786 -> Packet A|2|S0|ce388d53e41306f0|32|1 AckFrame[15-12|Δ2] 3.786 Finished downloading https://server4:443/xcvlvuegrs at 20:50.440 on ClientConnection[9586d9126a2892e4/f67829d7c9944f7a(V1) with server4/193.167.100.100:443] 3.786 Closing ClientConnection[9586d9126a2892e4/f67829d7c9944f7a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.787 Creating connection with server4:443 with v1 3.787 -> Packet A|3|S0|ce388d53e41306f0|35|2 ConnectionCloseFrame[0|0|] AckFrame[15-12|Δ0] 3.787 Setting up connection for downloading https://server4:443/xqesdujmax at 20:50.442 on ClientConnection[6884d5e6c92229f8/1ed9caede938e990(V1) with server4/193.167.100.100:443] 3.788 Original destination connection id: 6884d5e6c92229f8 (scid: 1ed9caede938e990) >- CryptoStream[I|ClientHello] 3.789 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.989/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.789 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.989 loss detection timeout handler running Sending probe 0, because no ack since 3.789. Current RTT: 100/25. 3.989 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.989 (Probe is an initial retransmit) 3.990 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.390/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.990 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.389 loss detection timeout handler running Sending probe 1, because no ack since 3.990. Current RTT: 100/25. 4.389 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.390 (Probe is an initial retransmit) 4.390 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.190/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.390 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.391 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.191/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.391 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.426 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ2] CryptoFrame[0,123] 4.426 probe count not reset on ack because handshake not yet confirmed 4.427 Retransmitting CryptoFrame[0,257] on level Initial 4.427 Cwnd(-): 6000; inflight: 1200 4.427 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.227/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.428 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.228/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 4.427 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 4.432 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.426 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] reschedule loss detection timer for PTO over 411 millis, based on 4.844/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 4.432 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 4.435 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 4.847/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 4.435 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.436 Starting downloading https://server4:443/xqesdujmax at 20:51.091 on ClientConnection[6884d5e6c92229f8/1ed9caede938e990(V1) with server4/193.167.100.100:443] 4.426 <- (1) Packet A|2|S0|1ed9caede938e990|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 4.437 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 4.540/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 4.437 Discarding pn space Initial because first Handshake message is being sent 4.437 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 4.540/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 4.437 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|6597c1b516dcf360|47|1 StreamFrame[0(CIB),0,17,fin]] 4.457 -> Packet A|1|S0|6597c1b516dcf360|32|1 AckFrame[2|Δ19] 4.539 loss detection timeout handler running Sending probe 0, because no ack since 4.435. Current RTT: 35/17. 4.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.540 (Probe is a handshake retransmit) 4.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 4.746/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 4.540 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 4.683 <- (2) Packet A|4|S0|1ed9caede938e990|29|2 PingFrame[] Padding(1) 4.703 -> Packet A|2|S0|6597c1b516dcf360|34|1 AckFrame[4,2|Δ19] 4.745 loss detection timeout handler running Sending probe 1, because no ack since 4.437. Current RTT: 35/17. 4.746 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.746 (Probe is a handshake retransmit) 4.746 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 5.158/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 4.746 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 4.747 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 5.159/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 4.747 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 5.158 loss detection timeout handler running Sending probe 2, because no ack since 4.437. Current RTT: 35/17. 5.159 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.159 (Probe is a handshake retransmit) 5.159 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 823 millis, based on 5.983/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 5.159 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 5.160 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 823 millis, based on 5.984/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 5.160 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 5.972 <- (3) Packet A|6|S0|1ed9caede938e990|29|2 PingFrame[] Padding(1) 5.983 loss detection timeout handler running Sending probe 3, because no ack since 4.437. Current RTT: 35/17. 5.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.984 (Probe is a handshake retransmit) 5.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1647 millis, based on 7.632/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 5.984 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 5.985 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1647 millis, based on 7.633/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 5.985 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 5.992 -> Packet A|3|S0|6597c1b516dcf360|36|1 AckFrame[6,4,2|Δ20] 6.023 <- (4) Packet A|7|S0|1ed9caede938e990|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|253c2857edad1893|2c3a3fcadd6e8eff92953aa9c02bcbf7] 6.024 State is set to Confirmed reschedule loss detection timer for PTO over 461 millis, based on 6.485/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -1459 millis, based on 4.565/App, because ackElicitingInFlight | RTT:35/17 6.024 loss detection timeout handler running 6.024 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 4.437. Current RTT: 35/17. 6.024 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 6.281/App, because ackElicitingInFlight | RTT:35/17 6.025 -> Packet PA|4|S0|6597c1b516dcf360|47|1 StreamFrame[0(CIB),0,17,fin] 6.044 -> Packet A|5|S0|6597c1b516dcf360|36|1 AckFrame[7-6,4,2|Δ19] 6.058 <- (5) Packet A|9|S0|1ed9caede938e990|1055|1 StreamFrame[0(CIB),0,1024,fin] 6.059 Finished downloading https://server4:443/xqesdujmax at 20:52.713 on ClientConnection[6884d5e6c92229f8/1ed9caede938e990(V1) with server4/193.167.100.100:443] 6.059 Closing ClientConnection[6884d5e6c92229f8/1ed9caede938e990(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.060 Creating connection with server4:443 with v1 6.059 -> Packet A|6|S0|6597c1b516dcf360|41|2 ConnectionCloseFrame[0|0|] AckFrame[9,7-6,4,2|Δ0] 6.060 Setting up connection for downloading https://server4:443/byrnnwewrs at 20:52.715 on ClientConnection[f71ea9873e5bc569/782efb7d96243f4c(V1) with server4/193.167.100.100:443] 6.061 Original destination connection id: f71ea9873e5bc569 (scid: 782efb7d96243f4c) >- CryptoStream[I|ClientHello] 6.063 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.263/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.063 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.098 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 6.099 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.299/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.098 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 6.104 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 6.207/Handshake, because peerAwaitingAddressValidation | RTT:35/17 6.103 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 6.107 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 6.210/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 6.107 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.108 Starting downloading https://server4:443/byrnnwewrs at 20:52.762 on ClientConnection[f71ea9873e5bc569/782efb7d96243f4c(V1) with server4/193.167.100.100:443] 6.098 <- (1) Packet A|2|S0|782efb7d96243f4c|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 6.108 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 6.212/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 6.109 Discarding pn space Initial because first Handshake message is being sent 6.109 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 6.212/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 6.109 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|8c17376aed7a73a3|47|1 StreamFrame[0(CIB),0,17,fin]] 6.128 -> Packet A|1|S0|8c17376aed7a73a3|32|1 AckFrame[2|Δ19] 6.211 loss detection timeout handler running Sending probe 0, because no ack since 6.107. Current RTT: 35/17. 6.211 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.211 (Probe is a handshake retransmit) 6.211 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 6.418/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 6.211 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 6.215 <- (6) Packet A|10|S0|1ed9caede938e990|29|2 PingFrame[] Padding(1) 6.215 -> Packet A|7|S0|6597c1b516dcf360|41|2 ConnectionCloseFrame[0|0|] AckFrame[9,7-6,4,2|Δ0] 6.370 <- (2) Packet A|6|S0|782efb7d96243f4c|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 6.390 -> Packet A|2|S0|8c17376aed7a73a3|34|1 AckFrame[6,2|Δ19] 6.417 loss detection timeout handler running Sending probe 1, because no ack since 6.109. Current RTT: 35/17. 6.417 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.417 (Probe is a handshake retransmit) 6.418 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 6.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 6.417 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 6.418 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 6.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 6.418 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 6.421 <- (3) Packet A|7|S0|782efb7d96243f4c|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|d64d8ac44dc69201|12262f77956790040bedec6afe9ddabd] 6.422 State is set to Confirmed reschedule loss detection timer for PTO over 198 millis, based on 6.621/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -185 millis, based on 6.237/App, because ackElicitingInFlight | RTT:35/17 6.422 loss detection timeout handler running 6.422 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 6.109. Current RTT: 35/17. 6.422 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 6.679/App, because ackElicitingInFlight | RTT:35/17 6.423 -> Packet PA|3|S0|8c17376aed7a73a3|47|1 StreamFrame[0(CIB),0,17,fin] 6.442 -> Packet A|4|S0|8c17376aed7a73a3|34|1 AckFrame[7-6,2|Δ19] 6.455 <- (4) Packet A|8|S0|782efb7d96243f4c|33|1 AckFrame[3-2|Δ1] 6.455 Cwnd(-): 6000; inflight: 0 6.455 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.455 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 6.572/App, because ackElicitingInFlight | RTT:35/14 6.456 -> Packet A|5|S0|8c17376aed7a73a3|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7|Δ0] 6.456 <- (5) Packet A|9|S0|782efb7d96243f4c|1055|1 StreamFrame[0(CIB),0,1024,fin] 6.457 Finished downloading https://server4:443/byrnnwewrs at 20:53.111 on ClientConnection[f71ea9873e5bc569/782efb7d96243f4c(V1) with server4/193.167.100.100:443] 6.457 Closing ClientConnection[f71ea9873e5bc569/782efb7d96243f4c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.457 -> Packet A|6|S0|8c17376aed7a73a3|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-7|Δ0] 6.457 Creating connection with server4:443 with v1 6.458 Setting up connection for downloading https://server4:443/xnpdyozusy at 20:53.113 on ClientConnection[ee7df3c1ac72c0b6/2b1671721cb761b4(V1) with server4/193.167.100.100:443] 6.458 Original destination connection id: ee7df3c1ac72c0b6 (scid: 2b1671721cb761b4) >- CryptoStream[I|ClientHello] 6.460 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.660/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.460 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.488 <- (6) Packet A|10|S0|782efb7d96243f4c|33|1 AckFrame[5-2|Δ1] 6.489 -> Packet A|7|S0|8c17376aed7a73a3|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-7|Δ0] 6.660 loss detection timeout handler running Sending probe 0, because no ack since 6.460. Current RTT: 100/25. 6.660 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.660 (Probe is an initial retransmit) 6.661 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.061/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.661 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.694 <- (1) Packet I|3|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 6.695 probe count not reset on ack because handshake not yet confirmed 6.695 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.095/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.694 <- (1) Packet H|4|L|764|1 CryptoFrame[0,717] 6.698 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.893/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.698 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 6.701 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.895/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.701 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.702 Starting downloading https://server4:443/xnpdyozusy at 20:53.356 on ClientConnection[ee7df3c1ac72c0b6/2b1671721cb761b4(V1) with server4/193.167.100.100:443] 6.694 <- (1) Packet A|5|S0|2b1671721cb761b4|259|2 CryptoFrame[0,89] Padding(139) -< CryptoStream[A|NewSessionTicket] 6.702 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.799/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.702 Discarding pn space Initial because first Handshake message is being sent 6.703 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.800/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.703 -> [Packet H|1|L|46|1 AckFrame[4|Δ0], Packet A|0|S0|d4406fd6f7470708|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0]] 6.733 <- (2) Packet A|6|S0|2b1671721cb761b4|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|66b281f016208029|28399d6d445783fe4cb574155267084d] 6.734 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 6.798/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 6.825/App, because ackElicitingInFlight | RTT:33/16 6.734 Discarding pn space Handshake because HandshakeDone is received 6.754 -> Packet A|1|S0|d4406fd6f7470708|32|1 AckFrame[6-5|Δ19] 6.825 loss detection timeout handler running Sending probe 0, because no ack since 6.703. Current RTT: 33/16. 6.825 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 7.069/App, because ackElicitingInFlight | RTT:33/16 6.825 -> Packet PA|2|S0|d4406fd6f7470708|47|1 StreamFrame[0(CIB),0,17,fin] 6.857 <- (3) Packet A|7|S0|2b1671721cb761b4|33|1 AckFrame[2|Δ1] 6.858 Cwnd(-): 6000; inflight: 0 6.858 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.858 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 6.965/App, because ackElicitingInFlight | RTT:33/12 6.859 -> Packet A|3|S0|d4406fd6f7470708|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6-5|Δ0] 6.859 <- (4) Packet A|8|S0|2b1671721cb761b4|1055|1 StreamFrame[0(CIB),0,1024,fin] 6.860 Finished downloading https://server4:443/xnpdyozusy at 20:53.514 on ClientConnection[ee7df3c1ac72c0b6/2b1671721cb761b4(V1) with server4/193.167.100.100:443] 6.860 Closing ClientConnection[ee7df3c1ac72c0b6/2b1671721cb761b4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.861 Creating connection with server4:443 with v1 6.860 -> Packet A|4|S0|d4406fd6f7470708|36|2 ConnectionCloseFrame[0|0|] AckFrame[8-5|Δ1] 6.861 Setting up connection for downloading https://server4:443/hqxiorzifq at 20:53.516 on ClientConnection[76584c3483b26d2f/3136246803f02c32(V1) with server4/193.167.100.100:443] 6.861 Original destination connection id: 76584c3483b26d2f (scid: 3136246803f02c32) >- CryptoStream[I|ClientHello] 6.863 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.063/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.863 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.062 loss detection timeout handler running Sending probe 0, because no ack since 6.863. Current RTT: 100/25. 7.063 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.063 (Probe is an initial retransmit) 7.063 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.463/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.063 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.463 loss detection timeout handler running Sending probe 1, because no ack since 7.063. Current RTT: 100/25. 7.463 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.463 (Probe is an initial retransmit) 7.463 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.263/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.463 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.464 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.264/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.464 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.498 <- (1) Packet I|6|L|179|2 Token=[] AckFrame[3,0|Δ0] CryptoFrame[0,123] 7.499 probe count not reset on ack because handshake not yet confirmed 7.499 Cwnd(-): 6000; inflight: 1200 -< CryptoStream[I|ServerHello] 7.498 <- (1) Packet H|7|L|762|1 CryptoFrame[0,715] 7.502 -> Packet I|4|L|1201|2 Token=[] AckFrame[6|Δ0] Padding(1153) >- CryptoStream[H|Finished] 7.505 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.506 Starting downloading https://server4:443/hqxiorzifq at 20:54.160 on ClientConnection[76584c3483b26d2f/3136246803f02c32(V1) with server4/193.167.100.100:443] 7.506 -> Packet H|1|L|46|1 AckFrame[7|Δ0] 7.498 <- (1) Packet A|8|S0|3136246803f02c32|259|2 CryptoFrame[0,89] Padding(139) -< CryptoStream[A|NewSessionTicket] 7.507 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.604/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.507 Discarding pn space Initial because first Handshake message is being sent 7.507 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.604/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.507 -> Packet A|0|S0|958426c104f1ff58|47|1 StreamFrame[0(CIB),0,17,fin] 7.526 -> Packet A|1|S0|958426c104f1ff58|32|1 AckFrame[8|Δ19] 7.537 <- (2) Packet A|9|S0|3136246803f02c32|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|909a053e5b174c2d|c7d68e8c8a302bf325b6c5ffcccf3d02] 7.538 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 7.602/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 7.629/App, because ackElicitingInFlight | RTT:33/16 7.538 Discarding pn space Handshake because HandshakeDone is received 7.557 -> Packet A|2|S0|958426c104f1ff58|32|1 AckFrame[9-8|Δ19] 7.628 loss detection timeout handler running Sending probe 0, because no ack since 7.507. Current RTT: 33/16. 7.628 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 7.872/App, because ackElicitingInFlight | RTT:33/16 7.628 -> Packet PA|3|S0|958426c104f1ff58|47|1 StreamFrame[0(CIB),0,17,fin] 7.660 <- (3) Packet A|10|S0|3136246803f02c32|35|1 AckFrame[3,1|Δ1] 7.661 Cwnd(-): 3000; inflight: 0 7.661 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.661 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 7.771/App, because ackElicitingInFlight | RTT:33/13 7.661 -> Packet A|4|S0|958426c104f1ff58|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[9|Δ0] 7.693 <- (4) Packet A|12|S0|3136246803f02c32|35|1 AckFrame[4-3,1|Δ1] 7.694 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.512 <- (5) Packet A|14|S0|3136246803f02c32|29|2 PingFrame[] Padding(1) 8.533 -> Packet A|5|S0|958426c104f1ff58|36|1 AckFrame[14,12,10|Δ19] 8.565 <- (6) Packet A|15|S0|3136246803f02c32|1055|1 StreamFrame[0(CIB),0,1024,fin] 8.567 Finished downloading https://server4:443/hqxiorzifq at 20:55.221 on ClientConnection[76584c3483b26d2f/3136246803f02c32(V1) with server4/193.167.100.100:443] 8.567 Closing ClientConnection[76584c3483b26d2f/3136246803f02c32(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.567 -> Packet A|6|S0|958426c104f1ff58|39|2 ConnectionCloseFrame[0|0|] AckFrame[15-14,12,10|Δ0] 8.567 Creating connection with server4:443 with v1 8.568 Setting up connection for downloading https://server4:443/xxxlsqcpfb at 20:55.222 on ClientConnection[079a9a6b40043df4/005807d313f09690(V1) with server4/193.167.100.100:443] 8.568 Original destination connection id: 079a9a6b40043df4 (scid: 005807d313f09690) >- CryptoStream[I|ClientHello] 8.569 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.770/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.569 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.605 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 8.605 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.805/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.605 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 8.608 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.711/Handshake, because peerAwaitingAddressValidation | RTT:35/17 8.608 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 8.612 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.715/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.612 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.612 Starting downloading https://server4:443/xxxlsqcpfb at 20:55.267 on ClientConnection[079a9a6b40043df4/005807d313f09690(V1) with server4/193.167.100.100:443] 8.605 <- (1) Packet A|2|S0|005807d313f09690|259|2 CryptoFrame[0,89] Padding(139) -< CryptoStream[A|NewSessionTicket] 8.613 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.716/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.613 Discarding pn space Initial because first Handshake message is being sent 8.613 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.716/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.613 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|4a082e7e989c81d8|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0]] 8.643 <- (2) Packet A|3|S0|005807d313f09690|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|7114ce4507c01fff|211e18432f0aaad46fbdae85a7cc3c2c] 8.644 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 8.715/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 97 millis, based on 8.741/App, because ackElicitingInFlight | RTT:35/17 8.644 Discarding pn space Handshake because HandshakeDone is received 8.663 -> Packet A|1|S0|4a082e7e989c81d8|32|1 AckFrame[3-2|Δ19] 8.741 loss detection timeout handler running Sending probe 0, because no ack since 8.613. Current RTT: 35/17. 8.741 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 8.997/App, because ackElicitingInFlight | RTT:35/17 8.741 -> Packet PA|2|S0|4a082e7e989c81d8|47|1 StreamFrame[0(CIB),0,17,fin] 8.908 <- (3) Packet A|6|S0|005807d313f09690|29|2 PingFrame[] Padding(1) 8.927 -> Packet A|3|S0|4a082e7e989c81d8|34|1 AckFrame[6,3-2|Δ19] 8.997 loss detection timeout handler running Sending probe 1, because no ack since 8.741. Current RTT: 35/17. 8.997 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 511 millis, based on 9.509/App, because ackElicitingInFlight | RTT:35/17 8.997 -> Packet PA|4|S0|4a082e7e989c81d8|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 511 millis, based on 9.510/App, because ackElicitingInFlight | RTT:35/17 8.998 -> Packet PA|5|S0|4a082e7e989c81d8|47|1 StreamFrame[0(CIB),0,17,fin] 9.175 <- (4) Packet A|8|S0|005807d313f09690|29|2 PingFrame[] Padding(1) 9.195 -> Packet A|6|S0|4a082e7e989c81d8|36|1 AckFrame[8,6,3-2|Δ19] 9.358 <- (5) Packet A|10|S0|005807d313f09690|29|2 PingFrame[] Padding(1) 9.378 -> Packet A|7|S0|4a082e7e989c81d8|38|1 AckFrame[10,8,6,3-2|Δ19] 9.410 <- (6) Packet A|11|S0|005807d313f09690|1055|1 StreamFrame[0(CIB),0,1024,fin] 9.411 Finished downloading https://server4:443/xxxlsqcpfb at 20:56.066 on ClientConnection[079a9a6b40043df4/005807d313f09690(V1) with server4/193.167.100.100:443] 9.411 Closing ClientConnection[079a9a6b40043df4/005807d313f09690(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.412 Creating connection with server4:443 with v1 9.412 -> Packet A|8|S0|4a082e7e989c81d8|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,8,6,3-2|Δ0] 9.412 Setting up connection for downloading https://server4:443/qlubiliiei at 20:56.067 on ClientConnection[860cb03cd0a61257/4f505c7310d9bd3b(V1) with server4/193.167.100.100:443] 9.412 Original destination connection id: 860cb03cd0a61257 (scid: 4f505c7310d9bd3b) >- CryptoStream[I|ClientHello] 9.414 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.614/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.414 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.449 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 9.450 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.650/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.449 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 9.454 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.556/Handshake, because peerAwaitingAddressValidation | RTT:34/17 9.454 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.457 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.449 <- (1) Packet A|2|S0|4f505c7310d9bd3b|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 9.458 Starting downloading https://server4:443/qlubiliiei at 20:56.112 on ClientConnection[860cb03cd0a61257/4f505c7310d9bd3b(V1) with server4/193.167.100.100:443] 9.458 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.458 Discarding pn space Initial because first Handshake message is being sent 9.457 -> Packet H|0|L|80|1 CryptoFrame[0,36] 9.458 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.458 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|ccfd69419edbc686|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0]] 9.560 loss detection timeout handler running Sending probe 0, because no ack since 9.457. Current RTT: 34/17. 9.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.560 (Probe is a handshake retransmit) 9.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 9.764/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.560 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 9.573 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 9.573 <- (2) Packet A|4|S0|4f505c7310d9bd3b|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 9.573 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] 9.592 <- (3) Packet A|5|S0|4f505c7310d9bd3b|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|791bf4877ba49fad|a24a574992ddfc2b5dd302f6739f1431] 9.592 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 9.712/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 9.585/App, because ackElicitingInFlight | RTT:34/17 9.592 Discarding pn space Handshake because HandshakeDone is received 9.592 loss detection timeout handler running Sending probe 0, because no ack since 9.458. Current RTT: 34/17. 9.592 (Probe is retransmit on level App) 9.593 -> Packet A|1|S0|ccfd69419edbc686|34|1 AckFrame[5-4,2|Δ18] reschedule loss detection timer for PTO over 253 millis, based on 9.847/App, because ackElicitingInFlight | RTT:34/17 9.593 -> Packet PA|2|S0|ccfd69419edbc686|47|1 StreamFrame[0(CIB),0,17,fin] 9.846 loss detection timeout handler running Sending probe 1, because no ack since 9.593. Current RTT: 34/17. 9.846 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 10.355/App, because ackElicitingInFlight | RTT:34/17 9.847 -> Packet PA|3|S0|ccfd69419edbc686|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 10.356/App, because ackElicitingInFlight | RTT:34/17 9.848 -> Packet PA|4|S0|ccfd69419edbc686|47|1 StreamFrame[0(CIB),0,17,fin] 9.879 <- (4) Packet A|6|S0|4f505c7310d9bd3b|34|1 AckFrame[4-3,1|Δ0] 9.879 Cwnd(-): 6000; inflight: 0 9.879 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 9.880 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 114 millis, based on 9.995/App, because ackElicitingInFlight | RTT:34/14 9.880 -> Packet A|5|S0|ccfd69419edbc686|47|1 StreamFrame[0(CIB),0,17,fin] 9.880 <- (5) Packet A|7|S0|4f505c7310d9bd3b|1055|1 StreamFrame[0(CIB),0,1024,fin] 9.881 Finished downloading https://server4:443/qlubiliiei at 20:56.536 on ClientConnection[860cb03cd0a61257/4f505c7310d9bd3b(V1) with server4/193.167.100.100:443] 9.881 Closing ClientConnection[860cb03cd0a61257/4f505c7310d9bd3b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.881 -> Packet A|6|S0|ccfd69419edbc686|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 9.882 Creating connection with server4:443 with v1 9.882 Setting up connection for downloading https://server4:443/bjzbintjyw at 20:56.537 on ClientConnection[910dc9b4ffb59622/1e81fb9780a9f940(V1) with server4/193.167.100.100:443] 9.882 Original destination connection id: 910dc9b4ffb59622 (scid: 1e81fb9780a9f940) >- CryptoStream[I|ClientHello] 9.884 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.084/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.884 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.912 <- (6) Packet A|8|S0|4f505c7310d9bd3b|36|2 AckFrame[5-3,1|Δ1] PingFrame[] 9.912 -> Packet A|7|S0|ccfd69419edbc686|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 9.919 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 9.920 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.120/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.919 <- (1) Packet H|1|L|762|1 CryptoFrame[0,715] 9.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 10.026/Handshake, because peerAwaitingAddressValidation | RTT:35/17 9.923 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 9.926 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 10.029/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 9.926 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.926 Starting downloading https://server4:443/bjzbintjyw at 20:56.581 on ClientConnection[910dc9b4ffb59622/1e81fb9780a9f940(V1) with server4/193.167.100.100:443] 9.919 <- (1) Packet A|2|S0|1e81fb9780a9f940|261|2 CryptoFrame[0,89] Padding(141) 9.926 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 9.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 10.030/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 9.927 Discarding pn space Initial because first Handshake message is being sent 9.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 10.030/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 9.927 -> Packet A|0|S0|04da40fa1f8134a9|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 9.958 <- (2) Packet A|3|S0|1e81fb9780a9f940|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c90892d01eb95bf4|d950d88e0b6f15156eb444b740de56ac] 9.958 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 10.029/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 97 millis, based on 10.055/App, because ackElicitingInFlight | RTT:35/17 9.958 Discarding pn space Handshake because HandshakeDone is received 9.978 -> Packet A|1|S0|04da40fa1f8134a9|32|1 AckFrame[3-2|Δ19] 10.019 <- (7) Packet A|9|S0|4f505c7310d9bd3b|29|2 PingFrame[] Padding(1) 10.020 -> Packet A|8|S0|ccfd69419edbc686|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 10.055 loss detection timeout handler running Sending probe 0, because no ack since 9.927. Current RTT: 35/17. 10.055 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 10.312/App, because ackElicitingInFlight | RTT:35/17 10.056 -> Packet PA|2|S0|04da40fa1f8134a9|47|1 StreamFrame[0(CIB),0,17,fin] 10.088 <- (3) Packet A|6|S0|1e81fb9780a9f940|33|1 AckFrame[2-0|Δ1] 10.088 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.098 <- (4) Packet A|7|S0|1e81fb9780a9f940|29|2 PingFrame[] Padding(1) 10.118 -> Packet A|3|S0|04da40fa1f8134a9|32|1 AckFrame[7-6|Δ19] 10.282 <- (5) Packet A|9|S0|1e81fb9780a9f940|29|2 PingFrame[] Padding(1) 10.302 -> Packet A|4|S0|04da40fa1f8134a9|34|1 AckFrame[9,7-6|Δ19] 10.345 <- (6) Packet A|10|S0|1e81fb9780a9f940|1055|1 StreamFrame[0(CIB),0,1024,fin] 10.346 Finished downloading https://server4:443/bjzbintjyw at 20:57.000 on ClientConnection[910dc9b4ffb59622/1e81fb9780a9f940(V1) with server4/193.167.100.100:443] 10.346 Closing ClientConnection[910dc9b4ffb59622/1e81fb9780a9f940(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.346 Creating connection with server4:443 with v1 10.346 -> Packet A|5|S0|04da40fa1f8134a9|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,7-6|Δ0] 10.347 Setting up connection for downloading https://server4:443/ynddbhpztc at 20:57.002 on ClientConnection[d1bc1b3aeea9ade9/b60d49e2ca729434(V1) with server4/193.167.100.100:443] 10.347 Original destination connection id: d1bc1b3aeea9ade9 (scid: b60d49e2ca729434) >- CryptoStream[I|ClientHello] 10.349 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.549/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.349 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.548 loss detection timeout handler running Sending probe 0, because no ack since 10.349. Current RTT: 100/25. 10.548 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.548 (Probe is an initial retransmit) 10.549 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.949/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.549 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.582 <- (1) Packet I|3|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 10.583 probe count not reset on ack because handshake not yet confirmed 10.583 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.983/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.582 <- (1) Packet H|4|L|763|1 CryptoFrame[0,716] 10.586 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.780/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.586 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 10.588 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.782/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.588 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.588 Starting downloading https://server4:443/ynddbhpztc at 20:57.243 on ClientConnection[d1bc1b3aeea9ade9/b60d49e2ca729434(V1) with server4/193.167.100.100:443] 10.589 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 10.582 <- (1) Packet A|5|S0|b60d49e2ca729434|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 10.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.686/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.589 Discarding pn space Initial because first Handshake message is being sent 10.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.686/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.589 -> Packet A|0|S0|9d09ed1896b503ea|47|1 StreamFrame[0(CIB),0,17,fin] 10.608 -> Packet A|1|S0|9d09ed1896b503ea|32|1 AckFrame[5|Δ19] 10.685 loss detection timeout handler running Sending probe 0, because no ack since 10.588. Current RTT: 33/16. 10.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.685 (Probe is a handshake retransmit) 10.686 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.686 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 10.717 <- (2) Packet A|8|S0|b60d49e2ca729434|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|349849de3edf43dd|8eade9f8098472a2a922ef3558f68080] 10.718 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 10.833/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 10.711/App, because ackElicitingInFlight | RTT:33/16 10.718 loss detection timeout handler running 10.718 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 10.589. Current RTT: 33/16. 10.718 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 10.962/App, because ackElicitingInFlight | RTT:33/16 10.718 -> Packet PA|2|S0|9d09ed1896b503ea|47|1 StreamFrame[0(CIB),0,17,fin] 10.738 -> Packet A|3|S0|9d09ed1896b503ea|34|1 AckFrame[8,5|Δ19] 10.769 <- (3) Packet A|9|S0|b60d49e2ca729434|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 10.789 -> Packet A|4|S0|9d09ed1896b503ea|34|1 AckFrame[9-8,5|Δ19] 10.891 <- (4) Packet A|10|S0|b60d49e2ca729434|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 10.911 -> Packet A|5|S0|9d09ed1896b503ea|34|1 AckFrame[10-8,5|Δ19] 10.962 loss detection timeout handler running Sending probe 1, because no ack since 10.718. Current RTT: 33/16. 10.962 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 11.450/App, because ackElicitingInFlight | RTT:33/16 10.962 -> Packet PA|6|S0|9d09ed1896b503ea|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 11.451/App, because ackElicitingInFlight | RTT:33/16 10.963 -> Packet PA|7|S0|9d09ed1896b503ea|47|1 StreamFrame[0(CIB),0,17,fin] 10.995 <- (5) Packet A|11|S0|b60d49e2ca729434|35|1 AckFrame[6-5,3|Δ1] 10.996 Cwnd(-): 6000; inflight: 47 10.996 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 89 millis, based on 11.085/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 105 millis, based on 11.102/App, because ackElicitingInFlight | RTT:33/12 10.996 -> Packet A|8|S0|9d09ed1896b503ea|47|1 StreamFrame[0(CIB),0,17,fin] 10.996 <- (6) Packet A|12|S0|b60d49e2ca729434|1055|1 StreamFrame[0(CIB),0,1024,fin] 10.997 Finished downloading https://server4:443/ynddbhpztc at 20:57.651 on ClientConnection[d1bc1b3aeea9ade9/b60d49e2ca729434(V1) with server4/193.167.100.100:443] 10.997 Closing ClientConnection[d1bc1b3aeea9ade9/b60d49e2ca729434(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.998 Creating connection with server4:443 with v1 10.997 -> Packet A|9|S0|9d09ed1896b503ea|35|2 ConnectionCloseFrame[0|0|] AckFrame[12-11|Δ0] 10.998 Setting up connection for downloading https://server4:443/bczhdqhbty at 20:57.653 on ClientConnection[6086caf29306614e/b3f3cb676df42e19(V1) with server4/193.167.100.100:443] 10.998 Original destination connection id: 6086caf29306614e (scid: b3f3cb676df42e19) >- CryptoStream[I|ClientHello] 11.000 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.200/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.000 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.035 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 11.036 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.236/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.035 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 11.039 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 11.141/Handshake, because peerAwaitingAddressValidation | RTT:34/17 11.039 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 11.041 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 101 millis, based on 11.144/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.041 -> Packet H|0|L|80|1 CryptoFrame[0,36] 11.042 Starting downloading https://server4:443/bczhdqhbty at 20:57.696 on ClientConnection[6086caf29306614e/b3f3cb676df42e19(V1) with server4/193.167.100.100:443] 11.035 <- (1) Packet A|2|S0|b3f3cb676df42e19|260|2 CryptoFrame[0,89] Padding(140) 11.042 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 11.042 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 11.144/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.042 Discarding pn space Initial because first Handshake message is being sent 11.042 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 11.144/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.042 -> Packet A|0|S0|5f695c3729ef0486|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 11.144 loss detection timeout handler running Sending probe 0, because no ack since 11.041. Current RTT: 34/17. 11.144 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.144 (Probe is a handshake retransmit) 11.144 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 11.348/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.144 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 11.347 loss detection timeout handler running Sending probe 1, because no ack since 11.042. Current RTT: 34/17. 11.348 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.348 (Probe is a handshake retransmit) 11.348 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 11.756/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.348 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 11.349 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 11.757/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.349 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 11.381 <- (2) Packet A|6|S0|b3f3cb676df42e19|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|3042d92c2673baa0|b79e57fb068ac47d1a7f2dbbd2377aff] 11.381 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 11.550/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -212 millis, based on 11.169/App, because ackElicitingInFlight | RTT:34/17 11.382 loss detection timeout handler running 11.382 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 11.042. Current RTT: 34/17. 11.382 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 11.636/App, because ackElicitingInFlight | RTT:34/17 11.382 -> Packet PA|1|S0|5f695c3729ef0486|47|1 StreamFrame[0(CIB),0,17,fin] 11.402 -> Packet A|2|S0|5f695c3729ef0486|34|1 AckFrame[6,2|Δ19] 11.416 <- (3) Packet A|8|S0|b3f3cb676df42e19|1055|1 StreamFrame[0(CIB),0,1024,fin] 11.417 Finished downloading https://server4:443/bczhdqhbty at 20:58.071 on ClientConnection[6086caf29306614e/b3f3cb676df42e19(V1) with server4/193.167.100.100:443] 11.417 Closing ClientConnection[6086caf29306614e/b3f3cb676df42e19(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.417 -> Packet A|3|S0|5f695c3729ef0486|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,6,2|Δ0] 11.418 Creating connection with server4:443 with v1 11.418 Setting up connection for downloading https://server4:443/jeowzmbaep at 20:58.073 on ClientConnection[cf944f9c23f7d2da/0546e0a447cd04db(V1) with server4/193.167.100.100:443] 11.418 Original destination connection id: cf944f9c23f7d2da (scid: 0546e0a447cd04db) >- CryptoStream[I|ClientHello] 11.420 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.620/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.420 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.455 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 11.456 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.656/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.455 <- (1) Packet H|1|L|762|1 CryptoFrame[0,715] 11.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.562/Handshake, because peerAwaitingAddressValidation | RTT:35/17 11.459 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 11.461 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.564/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 11.461 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.461 Starting downloading https://server4:443/jeowzmbaep at 20:58.116 on ClientConnection[cf944f9c23f7d2da/0546e0a447cd04db(V1) with server4/193.167.100.100:443] 11.461 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 11.455 <- (1) Packet A|2|S0|0546e0a447cd04db|261|2 CryptoFrame[0,89] Padding(141) -< CryptoStream[A|NewSessionTicket] 11.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.565/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 11.462 Discarding pn space Initial because first Handshake message is being sent 11.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.565/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 11.462 -> Packet A|0|S0|e519b9a51be0c160|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 11.492 <- (2) Packet A|3|S0|0546e0a447cd04db|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|ac262b8ccea4473e|832b64d8d42dcb9129649f4f31f98a27] 11.493 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 11.564/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 97 millis, based on 11.590/App, because ackElicitingInFlight | RTT:35/17 11.493 Discarding pn space Handshake because HandshakeDone is received 11.494 <- (3) Packet A|4|S0|0546e0a447cd04db|33|1 AckFrame[0|Δ1] 11.494 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.495 <- (4) Packet A|5|S0|0546e0a447cd04db|1055|1 StreamFrame[0(CIB),0,1024,fin] 11.496 Finished downloading https://server4:443/jeowzmbaep at 20:58.150 on ClientConnection[cf944f9c23f7d2da/0546e0a447cd04db(V1) with server4/193.167.100.100:443] 11.496 -> Packet A|1|S0|e519b9a51be0c160|32|1 AckFrame[5-3|Δ2] 11.496 Closing ClientConnection[cf944f9c23f7d2da/0546e0a447cd04db(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.496 -> Packet A|2|S0|e519b9a51be0c160|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 11.496 Creating connection with server4:443 with v1 11.497 Setting up connection for downloading https://server4:443/ywwvcthhte at 20:58.152 on ClientConnection[e9ef713193f6cd47/1bcf1fd30c515504(V1) with server4/193.167.100.100:443] 11.497 Original destination connection id: e9ef713193f6cd47 (scid: 1bcf1fd30c515504) >- CryptoStream[I|ClientHello] 11.499 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.699/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.498 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.533 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 11.534 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.734/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.533 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 11.536 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.639/Handshake, because peerAwaitingAddressValidation | RTT:35/17 11.536 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 11.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.643/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 11.539 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.540 Starting downloading https://server4:443/ywwvcthhte at 20:58.194 on ClientConnection[e9ef713193f6cd47/1bcf1fd30c515504(V1) with server4/193.167.100.100:443] 11.533 <- (1) Packet A|2|S0|1bcf1fd30c515504|259|2 CryptoFrame[0,89] Padding(139) 11.540 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 11.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.643/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 11.540 Discarding pn space Initial because first Handshake message is being sent 11.541 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.644/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 11.541 -> Packet A|0|S0|6d4cdd19ddccfc45|47|1 StreamFrame[0(CIB),0,17,fin] 11.560 -> Packet A|1|S0|6d4cdd19ddccfc45|32|1 AckFrame[2|Δ19] 11.571 <- (2) Packet A|3|S0|1bcf1fd30c515504|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a4e7328560e93b57|bf222b7fa04f283f12b7d9b56e1686f9] 11.571 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 11.642/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 97 millis, based on 11.669/App, because ackElicitingInFlight | RTT:35/17 11.571 Discarding pn space Handshake because HandshakeDone is received 11.591 -> Packet A|2|S0|6d4cdd19ddccfc45|32|1 AckFrame[3-2|Δ19] 11.669 loss detection timeout handler running Sending probe 0, because no ack since 11.541. Current RTT: 35/17. 11.669 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 11.925/App, because ackElicitingInFlight | RTT:35/17 11.669 -> Packet PA|3|S0|6d4cdd19ddccfc45|47|1 StreamFrame[0(CIB),0,17,fin] 11.703 <- (3) Packet A|5|S0|1bcf1fd30c515504|1055|1 StreamFrame[0(CIB),0,1024,fin] 11.703 Finished downloading https://server4:443/ywwvcthhte at 20:58.358 on ClientConnection[e9ef713193f6cd47/1bcf1fd30c515504(V1) with server4/193.167.100.100:443] 11.703 Closing ClientConnection[e9ef713193f6cd47/1bcf1fd30c515504(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.704 Creating connection with server4:443 with v1 11.704 -> Packet A|4|S0|6d4cdd19ddccfc45|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ1] 11.705 Setting up connection for downloading https://server4:443/fqxtjopnek at 20:58.359 on ClientConnection[b1756b6c780b757b/a77cec3325263a68(V1) with server4/193.167.100.100:443] 11.705 Original destination connection id: b1756b6c780b757b (scid: a77cec3325263a68) >- CryptoStream[I|ClientHello] 11.706 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.907/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.706 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.741 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 11.742 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.942/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.741 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 11.746 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.849/Handshake, because peerAwaitingAddressValidation | RTT:35/17 11.746 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 11.749 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.852/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 11.749 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.749 Starting downloading https://server4:443/fqxtjopnek at 20:58.404 on ClientConnection[b1756b6c780b757b/a77cec3325263a68(V1) with server4/193.167.100.100:443] 11.741 <- (1) Packet A|2|S0|a77cec3325263a68|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 11.749 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.749 -> Packet H|1|L|46|1 AckFrame[1|Δ0] reschedule loss detection timer for PTO over 102 millis, based on 11.853/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 11.750 Discarding pn space Initial because first Handshake message is being sent 11.750 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.853/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 11.750 -> Packet A|0|S0|866d7f13f8a7c764|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 11.780 <- (2) Packet A|3|S0|a77cec3325263a68|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|45a3c77732b3c22d|6561e5ea73712e364693f59e1b9fdd03] 11.781 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 11.852/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 97 millis, based on 11.878/App, because ackElicitingInFlight | RTT:35/17 11.781 Discarding pn space Handshake because HandshakeDone is received 11.800 -> Packet A|1|S0|866d7f13f8a7c764|32|1 AckFrame[3-2|Δ19] 11.872 <- (4) Packet A|6|S0|1bcf1fd30c515504|29|2 PingFrame[] Padding(1) 11.873 -> Packet A|5|S0|6d4cdd19ddccfc45|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 11.878 loss detection timeout handler running Sending probe 0, because no ack since 11.750. Current RTT: 35/17. 11.878 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 12.134/App, because ackElicitingInFlight | RTT:35/17 11.878 -> Packet PA|2|S0|866d7f13f8a7c764|47|1 StreamFrame[0(CIB),0,17,fin] 12.133 loss detection timeout handler running Sending probe 1, because no ack since 11.878. Current RTT: 35/17. 12.134 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 511 millis, based on 12.646/App, because ackElicitingInFlight | RTT:35/17 12.134 -> Packet PA|3|S0|866d7f13f8a7c764|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 511 millis, based on 12.647/App, because ackElicitingInFlight | RTT:35/17 12.135 -> Packet PA|4|S0|866d7f13f8a7c764|47|1 StreamFrame[0(CIB),0,17,fin] 12.167 <- (3) Packet A|4|S0|a77cec3325263a68|35|1 AckFrame[4,1|Δ1] 12.167 Cwnd(-): 6000; inflight: 47 12.167 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.168 -> Packet A|5|S0|866d7f13f8a7c764|47|1 StreamFrame[0(CIB),0,17,fin] 12.168 <- (4) Packet A|5|S0|a77cec3325263a68|1055|1 StreamFrame[0(CIB),0,1024,fin] 12.169 Finished downloading https://server4:443/fqxtjopnek at 20:58.823 on ClientConnection[b1756b6c780b757b/a77cec3325263a68(V1) with server4/193.167.100.100:443] 12.169 Closing ClientConnection[b1756b6c780b757b/a77cec3325263a68(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.169 -> Packet A|6|S0|866d7f13f8a7c764|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 12.170 Creating connection with server4:443 with v1 12.170 Setting up connection for downloading https://server4:443/pbbehqomqw at 20:58.825 on ClientConnection[b9e21a6e497117fc/abe3223ee98b6d50(V1) with server4/193.167.100.100:443] 12.170 Original destination connection id: b9e21a6e497117fc (scid: abe3223ee98b6d50) >- CryptoStream[I|ClientHello] 12.172 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.372/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.172 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.207 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 12.207 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.407/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.207 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 12.210 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.312/Handshake, because peerAwaitingAddressValidation | RTT:34/17 12.210 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 12.213 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.315/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.213 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.207 <- (1) Packet A|2|S0|abe3223ee98b6d50|259|2 CryptoFrame[0,89] Padding(139) 12.214 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 12.214 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.316/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.214 Discarding pn space Initial because first Handshake message is being sent 12.214 Starting downloading https://server4:443/pbbehqomqw at 20:58.868 on ClientConnection[b9e21a6e497117fc/abe3223ee98b6d50(V1) with server4/193.167.100.100:443] 12.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.317/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.214 -> Packet A|0|S0|80c0a0aee68e038d|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 12.316 loss detection timeout handler running Sending probe 0, because no ack since 12.213. Current RTT: 34/17. 12.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.316 (Probe is a handshake retransmit) 12.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 12.520/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.316 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 12.348 <- (2) Packet A|3|S0|abe3223ee98b6d50|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|434e80f2160cc601|8fae4e00c105a94ba0bc725ab6be5a16] 12.348 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 12.468/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 12.341/App, because ackElicitingInFlight | RTT:34/17 12.348 Discarding pn space Handshake because HandshakeDone is received 12.348 loss detection timeout handler running Sending probe 0, because no ack since 12.214. Current RTT: 34/17. 12.349 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 12.603/App, because ackElicitingInFlight | RTT:34/17 12.349 -> Packet PA|1|S0|80c0a0aee68e038d|47|1 StreamFrame[0(CIB),0,17,fin] 12.368 -> Packet A|2|S0|80c0a0aee68e038d|32|1 AckFrame[3-2|Δ19] 12.382 <- (3) Packet A|5|S0|abe3223ee98b6d50|1055|1 StreamFrame[0(CIB),0,1024,fin] 12.383 Finished downloading https://server4:443/pbbehqomqw at 20:59.037 on ClientConnection[b9e21a6e497117fc/abe3223ee98b6d50(V1) with server4/193.167.100.100:443] 12.383 Closing ClientConnection[b9e21a6e497117fc/abe3223ee98b6d50(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.383 Creating connection with server4:443 with v1 12.383 -> Packet A|3|S0|80c0a0aee68e038d|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 12.384 Setting up connection for downloading https://server4:443/yedfdwuefo at 20:59.038 on ClientConnection[39c42d286fec7a92/5af5350519f53cb0(V1) with server4/193.167.100.100:443] 12.384 Original destination connection id: 39c42d286fec7a92 (scid: 5af5350519f53cb0) >- CryptoStream[I|ClientHello] 12.386 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.586/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.385 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.585 loss detection timeout handler running Sending probe 0, because no ack since 12.385. Current RTT: 100/25. 12.585 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.585 (Probe is an initial retransmit) 12.585 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.985/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.585 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.985 loss detection timeout handler running Sending probe 1, because no ack since 12.585. Current RTT: 100/25. 12.985 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.985 (Probe is an initial retransmit) 12.985 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.785/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.985 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.986 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.786/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.986 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.019 <- (1) Packet I|9|L|49|1 Token=[] AckFrame[3-1|Δ0] 13.019 probe count not reset on ack because handshake not yet confirmed 13.019 Retransmitting CryptoFrame[0,257] on level Initial 13.019 Cwnd(-): 6000; inflight: 0 13.019 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.819/Initial, because peerAwaitingAddressValidation | RTT:100/25 13.020 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 13.404/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.019 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.403 loss detection timeout handler running Sending probe 2, because no ack since 13.019. Current RTT: 32/16. 13.403 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.403 (Probe is an initial retransmit) 13.403 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 14.172/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.403 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.404 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 14.172/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.404 -> Packet PI|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.420 <- (2) Packet I|10|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 13.420 <- (2) Packet H|11|L|763|1 CryptoFrame[0,716] 13.424 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 14.192/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.424 -> Packet I|7|L|1201|2 Token=[] AckFrame[10-9|Δ0] Padding(1153) >- CryptoStream[H|Finished] 13.427 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 14.195/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.426 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.427 Starting downloading https://server4:443/yedfdwuefo at 21:00.081 on ClientConnection[39c42d286fec7a92/5af5350519f53cb0(V1) with server4/193.167.100.100:443] 13.420 <- (2) Packet A|12|S0|5af5350519f53cb0|266|2 CryptoFrame[0,89] Padding(146) 13.427 -> Packet H|1|L|46|1 AckFrame[11|Δ0] -< CryptoStream[A|NewSessionTicket] 13.427 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 13.523/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.427 Discarding pn space Initial because first Handshake message is being sent 13.427 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 13.523/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.427 -> Packet A|0|S0|be7baca54e9ea93f|47|1 StreamFrame[0(CIB),0,17,fin] 13.437 Discarding packet (51 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.446 -> Packet A|1|S0|be7baca54e9ea93f|32|1 AckFrame[12|Δ19] 13.459 <- (4) Packet A|15|S0|5af5350519f53cb0|33|1 AckFrame[0|Δ1] 13.460 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 13.556/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.460 <- (5) Packet A|16|S0|5af5350519f53cb0|1055|1 StreamFrame[0(CIB),0,1024,fin] 13.461 Finished downloading https://server4:443/yedfdwuefo at 21:00.116 on ClientConnection[39c42d286fec7a92/5af5350519f53cb0(V1) with server4/193.167.100.100:443] 13.461 Closing ClientConnection[39c42d286fec7a92/5af5350519f53cb0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.461 -> Packet A|2|S0|be7baca54e9ea93f|37|2 ConnectionCloseFrame[0|0|] AckFrame[16-15,12|Δ0] 13.462 Creating connection with server4:443 with v1 13.462 Setting up connection for downloading https://server4:443/ugoszgastr at 21:00.117 on ClientConnection[896e018cd2df57df/6b068a34eaa8df64(V1) with server4/193.167.100.100:443] 13.462 Original destination connection id: 896e018cd2df57df (scid: 6b068a34eaa8df64) >- CryptoStream[I|ClientHello] 13.464 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.664/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.464 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.663 loss detection timeout handler running Sending probe 0, because no ack since 13.464. Current RTT: 100/25. 13.663 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.663 (Probe is an initial retransmit) 13.664 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.064/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.663 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.063 loss detection timeout handler running Sending probe 1, because no ack since 13.663. Current RTT: 100/25. 14.063 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.063 (Probe is an initial retransmit) 14.064 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.864/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.063 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.064 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.864/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.064 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.100 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[3|Δ2] CryptoFrame[0,123] 14.101 probe count not reset on ack because handshake not yet confirmed 14.101 Retransmitting CryptoFrame[0,257] on level Initial 14.101 Cwnd(-): 6000; inflight: 1200 14.101 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 14.100 <- (1) Packet H|1|L|762|1 CryptoFrame[0,715] 14.103 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 14.106 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.107 Starting downloading https://server4:443/ugoszgastr at 21:00.761 on ClientConnection[896e018cd2df57df/6b068a34eaa8df64(V1) with server4/193.167.100.100:443] 14.100 <- (1) Packet A|2|S0|6b068a34eaa8df64|261|2 CryptoFrame[0,89] Padding(141) 14.107 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 14.107 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 14.210/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 14.107 Discarding pn space Initial because first Handshake message is being sent 14.107 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 14.210/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 14.107 -> Packet A|0|S0|ec564eca32ddab8f|47|1 StreamFrame[0(CIB),0,17,fin] 14.127 -> Packet A|1|S0|ec564eca32ddab8f|32|1 AckFrame[2|Δ19] 14.209 loss detection timeout handler running Sending probe 0, because no ack since 14.106. Current RTT: 35/17. 14.209 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.210 (Probe is a handshake retransmit) 14.210 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 14.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 14.210 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 14.415 loss detection timeout handler running Sending probe 1, because no ack since 14.107. Current RTT: 35/17. 14.415 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.415 (Probe is a handshake retransmit) 14.416 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 14.828/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 14.416 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 14.417 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 14.829/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 14.417 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 14.740 <- (2) Packet A|5|S0|6b068a34eaa8df64|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 14.760 -> Packet A|2|S0|ec564eca32ddab8f|34|1 AckFrame[5,2|Δ19] 14.791 <- (3) Packet A|6|S0|6b068a34eaa8df64|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e3854e8e7db61b06|81bb009cbbcaf59a4d1e81ee60e734b4] 14.792 State is set to Confirmed reschedule loss detection timer for PTO over -172 millis, based on 14.619/App, because ackElicitingInFlight | RTT:35/17 14.792 loss detection timeout handler running Sending probe 2, because no ack since 14.107. Current RTT: 35/17. 14.792 (Probe is retransmit on level App) reschedule loss detection timer for PTO over -556 millis, based on 14.235/App, because ackElicitingInFlight | RTT:35/17 14.792 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 127 millis, based on 14.920/App, because ackElicitingInFlight | RTT:35/17 14.792 -> Packet PA|3|S0|ec564eca32ddab8f|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 127 millis, based on 14.921/App, because ackElicitingInFlight | RTT:35/17 14.793 -> Packet PA|4|S0|ec564eca32ddab8f|47|1 StreamFrame[0(CIB),0,17,fin] 14.812 -> Packet A|5|S0|ec564eca32ddab8f|34|1 AckFrame[6-5,2|Δ19] 14.824 <- (4) Packet A|7|S0|6b068a34eaa8df64|33|1 AckFrame[3-2|Δ1] 14.825 Cwnd(-): 3000; inflight: 47 14.825 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 96 millis, based on 14.921/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 115 millis, based on 14.941/App, because ackElicitingInFlight | RTT:35/14 14.825 -> Packet A|6|S0|ec564eca32ddab8f|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ0] 14.826 <- (5) Packet A|8|S0|6b068a34eaa8df64|1055|1 StreamFrame[0(CIB),0,1024,fin] 14.826 Finished downloading https://server4:443/ugoszgastr at 21:01.481 on ClientConnection[896e018cd2df57df/6b068a34eaa8df64(V1) with server4/193.167.100.100:443] 14.826 Closing ClientConnection[896e018cd2df57df/6b068a34eaa8df64(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.826 <- (6) Packet A|9|S0|6b068a34eaa8df64|33|1 AckFrame[4-2|Δ1] 14.827 -> Packet A|7|S0|ec564eca32ddab8f|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-6|Δ0] 14.827 Creating connection with server4:443 with v1 14.828 Setting up connection for downloading https://server4:443/nzisirnlgu at 21:01.482 on ClientConnection[9c98e81224460a82/5517910d564b735f(V1) with server4/193.167.100.100:443] 14.828 Original destination connection id: 9c98e81224460a82 (scid: 5517910d564b735f) >- CryptoStream[I|ClientHello] 14.829 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.029/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.829 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.029 loss detection timeout handler running Sending probe 0, because no ack since 14.829. Current RTT: 100/25. 15.029 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.029 (Probe is an initial retransmit) 15.029 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.429/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.029 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.063 <- (1) Packet I|3|L|176|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 15.063 probe count not reset on ack because handshake not yet confirmed 15.063 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.463/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.063 <- (1) Packet H|4|L|762|1 CryptoFrame[0,715] 15.066 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.260/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.066 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 15.069 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.263/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.069 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.069 Starting downloading https://server4:443/nzisirnlgu at 21:01.724 on ClientConnection[9c98e81224460a82/5517910d564b735f(V1) with server4/193.167.100.100:443] 15.063 <- (1) Packet A|5|S0|5517910d564b735f|262|2 CryptoFrame[0,89] Padding(142) -< CryptoStream[A|NewSessionTicket] 15.070 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.167/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.070 Discarding pn space Initial because first Handshake message is being sent 15.071 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.168/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.070 -> [Packet H|1|L|46|1 AckFrame[4|Δ0], Packet A|0|S0|82272de6fc7b3844|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0]] 15.167 loss detection timeout handler running Sending probe 0, because no ack since 15.069. Current RTT: 33/16. 15.167 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.167 (Probe is a handshake retransmit) 15.167 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.361/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.167 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 15.182 <- (2) Packet H|6|L|45|2 PingFrame[] Padding(1) 15.182 <- (2) Packet A|7|S0|5517910d564b735f|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 15.182 -> Packet H|3|L|48|1 AckFrame[6,4|Δ0] 15.202 -> Packet A|1|S0|82272de6fc7b3844|34|1 AckFrame[7,5|Δ19] 15.320 <- (3) Packet A|9|S0|5517910d564b735f|29|2 PingFrame[] Padding(1) 15.340 -> Packet A|2|S0|82272de6fc7b3844|36|1 AckFrame[9,7,5|Δ19] 15.360 loss detection timeout handler running Sending probe 1, because no ack since 15.070. Current RTT: 33/16. 15.360 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.360 (Probe is a handshake retransmit) 15.361 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 15.749/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.361 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 15.362 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 15.750/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.362 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 15.564 <- (4) Packet A|10|S0|5517910d564b735f|29|2 PingFrame[] Padding(1) 15.584 -> Packet A|3|S0|82272de6fc7b3844|36|1 AckFrame[10-9,7,5|Δ19] 15.616 <- (5) Packet A|11|S0|5517910d564b735f|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5291792b9b889335|3b75aed192891206616a1d8204b40f73] 15.616 State is set to Confirmed reschedule loss detection timer for PTO over -58 millis, based on 15.558/App, because ackElicitingInFlight | RTT:33/16 15.616 loss detection timeout handler running Sending probe 2, because no ack since 15.070. Current RTT: 33/16. reschedule loss detection timer for PTO over -424 millis, based on 15.192/App, because ackElicitingInFlight | RTT:33/16 15.616 Discarding pn space Handshake because HandshakeDone is received 15.616 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 15.860/App, because ackElicitingInFlight | RTT:33/16 15.616 -> Packet PA|4|S0|82272de6fc7b3844|47|1 StreamFrame[0(CIB),0,17,fin] 15.636 -> Packet A|5|S0|82272de6fc7b3844|36|1 AckFrame[11-9,7,5|Δ19] 15.648 <- (6) Packet A|12|S0|5517910d564b735f|35|1 AckFrame[4-3,1|Δ1] 15.649 Cwnd(-): 6000; inflight: 0 15.649 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.649 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 15.759/App, because ackElicitingInFlight | RTT:33/13 15.649 -> Packet A|6|S0|82272de6fc7b3844|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[11|Δ0] 15.681 <- (7) Packet A|14|S0|5517910d564b735f|35|1 AckFrame[6-3,1|Δ1] 15.682 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.025 <- (8) Packet A|16|S0|5517910d564b735f|29|2 PingFrame[] Padding(1) 16.044 -> Packet A|7|S0|82272de6fc7b3844|36|1 AckFrame[16,14,12|Δ19] 16.076 <- (9) Packet A|17|S0|5517910d564b735f|1055|1 StreamFrame[0(CIB),0,1024,fin] 16.077 Finished downloading https://server4:443/nzisirnlgu at 21:02.732 on ClientConnection[9c98e81224460a82/5517910d564b735f(V1) with server4/193.167.100.100:443] 16.077 Closing ClientConnection[9c98e81224460a82/5517910d564b735f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.078 Creating connection with server4:443 with v1 16.078 -> Packet A|8|S0|82272de6fc7b3844|39|2 ConnectionCloseFrame[0|0|] AckFrame[17-16,14,12|Δ0] 16.078 Setting up connection for downloading https://server4:443/wsyhztquep at 21:02.733 on ClientConnection[cdf9abb933dec9a6/d53bbde9db05df44(V1) with server4/193.167.100.100:443] 16.079 Original destination connection id: cdf9abb933dec9a6 (scid: d53bbde9db05df44) >- CryptoStream[I|ClientHello] 16.080 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.280/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.080 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.115 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 16.116 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.316/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.119 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 16.222/Handshake, because peerAwaitingAddressValidation | RTT:35/17 16.115 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 16.119 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 16.121 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 16.224/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.121 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.122 Starting downloading https://server4:443/wsyhztquep at 21:02.776 on ClientConnection[cdf9abb933dec9a6/d53bbde9db05df44(V1) with server4/193.167.100.100:443] 16.121 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 16.115 <- (1) Packet A|2|S0|d53bbde9db05df44|259|2 CryptoFrame[0,89] Padding(139) -< CryptoStream[A|NewSessionTicket] 16.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 16.225/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.122 Discarding pn space Initial because first Handshake message is being sent 16.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 16.225/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.122 -> Packet A|0|S0|babdddf631ff8ee9|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 16.152 <- (2) Packet A|3|S0|d53bbde9db05df44|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|6269ef76e2386627|c66e4ed97d16d70de0890f218bb837cf] 16.153 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 16.224/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 97 millis, based on 16.250/App, because ackElicitingInFlight | RTT:35/17 16.153 Discarding pn space Handshake because HandshakeDone is received 16.154 <- (3) Packet A|4|S0|d53bbde9db05df44|33|1 AckFrame[0|Δ1] 16.154 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.155 <- (4) Packet A|5|S0|d53bbde9db05df44|1055|1 StreamFrame[0(CIB),0,1024,fin] 16.156 Finished downloading https://server4:443/wsyhztquep at 21:02.810 on ClientConnection[cdf9abb933dec9a6/d53bbde9db05df44(V1) with server4/193.167.100.100:443] 16.155 -> Packet A|1|S0|babdddf631ff8ee9|32|1 AckFrame[5-3|Δ2] 16.156 Closing ClientConnection[cdf9abb933dec9a6/d53bbde9db05df44(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.156 -> Packet A|2|S0|babdddf631ff8ee9|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 16.156 Creating connection with server4:443 with v1 16.157 Setting up connection for downloading https://server4:443/mgokjrdadm at 21:02.811 on ClientConnection[85aab2503c6794a8/16fb6a5ca8e369e8(V1) with server4/193.167.100.100:443] 16.157 Original destination connection id: 85aab2503c6794a8 (scid: 16fb6a5ca8e369e8) >- CryptoStream[I|ClientHello] 16.158 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.358/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.158 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.193 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 16.194 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.394/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.193 <- (1) Packet H|1|L|762|1 CryptoFrame[0,715] 16.196 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.298/Handshake, because peerAwaitingAddressValidation | RTT:34/17 16.196 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 16.199 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.301/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.199 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.199 Starting downloading https://server4:443/mgokjrdadm at 21:02.854 on ClientConnection[85aab2503c6794a8/16fb6a5ca8e369e8(V1) with server4/193.167.100.100:443] 16.193 <- (1) Packet A|2|S0|16fb6a5ca8e369e8|261|2 CryptoFrame[0,89] Padding(141) 16.199 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 16.200 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.302/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.200 Discarding pn space Initial because first Handshake message is being sent 16.200 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.302/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.200 -> Packet A|0|S0|894533247fa68128|47|1 StreamFrame[0(CIB),0,17,fin] 16.219 -> Packet A|1|S0|894533247fa68128|32|1 AckFrame[2|Δ19] 16.301 loss detection timeout handler running Sending probe 0, because no ack since 16.199. Current RTT: 34/17. 16.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.301 (Probe is a handshake retransmit) 16.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 16.505/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.301 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 16.310 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 16.310 <- (2) Packet A|4|S0|16fb6a5ca8e369e8|120|1 CryptoFrame[0,89] 16.311 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] -< CryptoStream[A|NewSessionTicket] 16.330 -> Packet A|2|S0|894533247fa68128|34|1 AckFrame[4,2|Δ19] 16.452 <- (3) Packet A|6|S0|16fb6a5ca8e369e8|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 16.472 -> Packet A|3|S0|894533247fa68128|36|1 AckFrame[6,4,2|Δ19] 16.503 <- (4) Packet A|7|S0|16fb6a5ca8e369e8|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|6d6ff1dd455a773f|e4f23c49ef4d3c104c0868b0424e5bcd] 16.503 State is set to Confirmed reschedule loss detection timer for PTO over -49 millis, based on 16.454/App, because ackElicitingInFlight | RTT:34/17 16.503 loss detection timeout handler running Sending probe 1, because no ack since 16.200. Current RTT: 34/17. reschedule loss detection timer for PTO over -176 millis, based on 16.327/App, because ackElicitingInFlight | RTT:34/17 16.503 Discarding pn space Handshake because HandshakeDone is received 16.503 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 16.757/App, because ackElicitingInFlight | RTT:34/17 16.503 -> Packet PA|4|S0|894533247fa68128|47|1 StreamFrame[0(CIB),0,17,fin] 16.523 -> Packet A|5|S0|894533247fa68128|36|1 AckFrame[7-6,4,2|Δ19] 16.535 <- (5) Packet A|8|S0|16fb6a5ca8e369e8|33|1 AckFrame[4-3|Δ1] 16.536 Cwnd(-): 6000; inflight: 0 16.536 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 16.536 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 114 millis, based on 16.651/App, because ackElicitingInFlight | RTT:34/14 16.536 -> Packet A|6|S0|894533247fa68128|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7|Δ0] 16.537 <- (6) Packet A|9|S0|16fb6a5ca8e369e8|1055|1 StreamFrame[0(CIB),0,1024,fin] 16.537 Finished downloading https://server4:443/mgokjrdadm at 21:03.192 on ClientConnection[85aab2503c6794a8/16fb6a5ca8e369e8(V1) with server4/193.167.100.100:443] 16.537 Closing ClientConnection[85aab2503c6794a8/16fb6a5ca8e369e8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.538 -> Packet A|7|S0|894533247fa68128|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-7|Δ0] 16.538 Creating connection with server4:443 with v1 16.538 Setting up connection for downloading https://server4:443/qlyzvrykkd at 21:03.193 on ClientConnection[8667423dc8e8d56b/c995889446467ab0(V1) with server4/193.167.100.100:443] 16.538 Original destination connection id: 8667423dc8e8d56b (scid: c995889446467ab0) >- CryptoStream[I|ClientHello] 16.540 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.740/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.540 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.739 loss detection timeout handler running Sending probe 0, because no ack since 16.540. Current RTT: 100/25. 16.739 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.739 (Probe is an initial retransmit) 16.740 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.140/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.740 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.775 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ2] CryptoFrame[0,123] 16.775 probe count not reset on ack because handshake not yet confirmed 16.776 Retransmitting CryptoFrame[0,257] on level Initial 16.776 Cwnd(-): 6000; inflight: 0 16.776 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.176/Initial, because peerAwaitingAddressValidation | RTT:100/25 16.776 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 16.982/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.776 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 16.775 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 16.778 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 16.984/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.778 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 16.781 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 16.987/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.781 -> Packet H|0|L|80|1 CryptoFrame[0,36] 16.781 Starting downloading https://server4:443/qlyzvrykkd at 21:03.436 on ClientConnection[8667423dc8e8d56b/c995889446467ab0(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.782 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 16.988/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.775 <- (1) Packet A|2|S0|c995889446467ab0|259|2 CryptoFrame[0,89] Padding(139) 16.782 -> Packet A|0|S0|4cc12a9d50843090|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 16.782 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.782 -> Packet H|1|L|46|1 AckFrame[1|Δ0] reschedule loss detection timer for PTO over 102 millis, based on 16.885/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.782 Discarding pn space Initial because first Handshake message is being sent 16.801 -> Packet A|1|S0|4cc12a9d50843090|32|1 AckFrame[2|Δ19] 16.809 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.884 loss detection timeout handler running Sending probe 0, because no ack since 16.781. Current RTT: 35/17. 16.884 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.884 (Probe is a handshake retransmit) 16.885 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 17.091/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 16.885 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 16.916 <- (3) Packet A|6|S0|c995889446467ab0|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2116df5ec3a3fe9d|9fa04edd05a8956e38b8601b6e400892] 16.917 State is set to Confirmed reschedule loss detection timer for PTO over 121 millis, based on 17.038/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -6 millis, based on 16.910/App, because ackElicitingInFlight | RTT:35/17 16.917 Discarding pn space Handshake because HandshakeDone is received 16.917 loss detection timeout handler running Sending probe 0, because no ack since 16.782. Current RTT: 35/17. 16.917 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 17.173/App, because ackElicitingInFlight | RTT:35/17 16.917 -> Packet PA|2|S0|4cc12a9d50843090|47|1 StreamFrame[0(CIB),0,17,fin] 16.936 -> Packet A|3|S0|4cc12a9d50843090|34|1 AckFrame[6,2|Δ19] 16.949 <- (4) Packet A|7|S0|c995889446467ab0|33|1 AckFrame[2|Δ1] 16.949 Cwnd(-): 3000; inflight: 0 16.949 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 16.950 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 17.066/App, because ackElicitingInFlight | RTT:35/14 16.950 -> Packet A|4|S0|4cc12a9d50843090|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6,2|Δ0] 16.967 <- (5) Packet A|9|S0|c995889446467ab0|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 16.981 <- (6) Packet A|10|S0|c995889446467ab0|33|1 AckFrame[4-2|Δ1] 16.982 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.987 -> Packet A|5|S0|4cc12a9d50843090|34|1 AckFrame[10-9,7|Δ19] 17.019 <- (7) Packet A|11|S0|c995889446467ab0|1055|1 StreamFrame[0(CIB),0,1024,fin] 17.019 Finished downloading https://server4:443/qlyzvrykkd at 21:03.674 on ClientConnection[8667423dc8e8d56b/c995889446467ab0(V1) with server4/193.167.100.100:443] 17.020 Closing ClientConnection[8667423dc8e8d56b/c995889446467ab0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.020 -> Packet A|6|S0|4cc12a9d50843090|37|2 ConnectionCloseFrame[0|0|] AckFrame[11-9,7|Δ0] 17.020 Creating connection with server4:443 with v1 17.021 Setting up connection for downloading https://server4:443/qwfitgzmdf at 21:03.675 on ClientConnection[f62c0f8550157ea4/ab5654ff6c9ae708(V1) with server4/193.167.100.100:443] 17.021 Original destination connection id: f62c0f8550157ea4 (scid: ab5654ff6c9ae708) >- CryptoStream[I|ClientHello] 17.022 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.222/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.022 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.058 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 17.059 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.259/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.058 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 17.061 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 17.169/Handshake, because peerAwaitingAddressValidation | RTT:36/18 17.061 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 17.063 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 17.171/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 17.063 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.063 Starting downloading https://server4:443/qwfitgzmdf at 21:03.718 on ClientConnection[f62c0f8550157ea4/ab5654ff6c9ae708(V1) with server4/193.167.100.100:443] 17.058 <- (1) Packet A|2|S0|ab5654ff6c9ae708|259|2 CryptoFrame[0,89] Padding(139) -< CryptoStream[A|NewSessionTicket] 17.064 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 17.172/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 17.064 Discarding pn space Initial because first Handshake message is being sent 17.064 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 17.172/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 17.064 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|733df3c0225f36d9|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0]] 17.094 <- (2) Packet A|3|S0|ab5654ff6c9ae708|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|8d24120272f0c339|be9106eda1687e511d1d6afa584fc5f8] 17.095 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 17.171/Handshake, because ackElicitingInFlight | RTT:36/18 reschedule loss detection timer for PTO over 101 millis, based on 17.197/App, because ackElicitingInFlight | RTT:36/18 17.095 Discarding pn space Handshake because HandshakeDone is received 17.097 <- (3) Packet A|5|S0|ab5654ff6c9ae708|1055|1 StreamFrame[0(CIB),0,1024,fin] 17.098 -> Packet A|1|S0|733df3c0225f36d9|34|1 AckFrame[5,3-2|Δ2] 17.098 Finished downloading https://server4:443/qwfitgzmdf at 21:03.752 on ClientConnection[f62c0f8550157ea4/ab5654ff6c9ae708(V1) with server4/193.167.100.100:443] 17.098 Closing ClientConnection[f62c0f8550157ea4/ab5654ff6c9ae708(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.098 -> Packet A|2|S0|733df3c0225f36d9|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 17.098 Creating connection with server4:443 with v1 17.099 Setting up connection for downloading https://server4:443/lmdrqjqsxm at 21:03.754 on ClientConnection[052f4116d8fa5441/e88f0c9b68f3e55c(V1) with server4/193.167.100.100:443] 17.099 Original destination connection id: 052f4116d8fa5441 (scid: e88f0c9b68f3e55c) >- CryptoStream[I|ClientHello] 17.100 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.300/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.100 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.300 loss detection timeout handler running Sending probe 0, because no ack since 17.100. Current RTT: 100/25. 17.300 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.300 (Probe is an initial retransmit) 17.300 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.700/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.300 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.699 loss detection timeout handler running Sending probe 1, because no ack since 17.300. Current RTT: 100/25. 17.699 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.700 (Probe is an initial retransmit) 17.700 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.500/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.700 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.701 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.501/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.701 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.735 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ2] CryptoFrame[0,123] 17.735 probe count not reset on ack because handshake not yet confirmed 17.736 Retransmitting CryptoFrame[0,257] on level Initial 17.736 Cwnd(-): 6000; inflight: 1200 17.736 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.536/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.736 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 411 millis, based on 18.148/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.736 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 17.735 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 17.738 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 18.150/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.738 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 17.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 18.153/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.741 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.741 Starting downloading https://server4:443/lmdrqjqsxm at 21:04.396 on ClientConnection[052f4116d8fa5441/e88f0c9b68f3e55c(V1) with server4/193.167.100.100:443] 17.735 <- (1) Packet A|2|S0|e88f0c9b68f3e55c|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 17.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 17.844/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.741 Discarding pn space Initial because first Handshake message is being sent 17.741 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 17.742 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 17.845/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.742 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|a58d4b107b60a57c|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0]] 17.844 loss detection timeout handler running Sending probe 0, because no ack since 17.741. Current RTT: 35/17. 17.844 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.844 (Probe is a handshake retransmit) 17.845 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 18.051/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.844 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 18.050 loss detection timeout handler running Sending probe 1, because no ack since 17.742. Current RTT: 35/17. 18.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.050 (Probe is a handshake retransmit) 18.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 18.462/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 18.050 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 18.051 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 18.463/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 18.051 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 18.462 loss detection timeout handler running Sending probe 2, because no ack since 17.742. Current RTT: 35/17. 18.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.463 (Probe is a handshake retransmit) 18.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 823 millis, based on 19.287/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 18.463 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 18.464 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 823 millis, based on 19.288/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 18.464 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 18.478 <- (3) Packet A|8|S0|e88f0c9b68f3e55c|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 18.497 -> Packet A|1|S0|a58d4b107b60a57c|34|1 AckFrame[8,2|Δ19] 19.280 <- (4) Packet A|9|S0|e88f0c9b68f3e55c|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 19.287 loss detection timeout handler running Sending probe 3, because no ack since 17.742. Current RTT: 35/17. 19.287 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.287 (Probe is a handshake retransmit) 19.287 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1647 millis, based on 20.935/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 19.287 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 19.288 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1647 millis, based on 20.936/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 19.288 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 19.301 -> Packet A|2|S0|a58d4b107b60a57c|34|1 AckFrame[9-8,2|Δ20] 19.514 <- (5) Packet A|11|S0|e88f0c9b68f3e55c|29|2 PingFrame[] Padding(1) 19.533 -> Packet A|3|S0|a58d4b107b60a57c|36|1 AckFrame[11,9-8,2|Δ19] 19.564 <- (6) Packet A|12|S0|e88f0c9b68f3e55c|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|dabf4e9cb5553162|3d6bc8a1060fc94ca3148a13b09689c9] 19.564 State is set to Confirmed reschedule loss detection timer for PTO over 225 millis, based on 19.790/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -1694 millis, based on 17.870/App, because ackElicitingInFlight | RTT:35/17 19.565 Discarding pn space Handshake because HandshakeDone is received 19.565 loss detection timeout handler running Sending probe 0, because no ack since 17.742. Current RTT: 35/17. 19.565 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 19.821/App, because ackElicitingInFlight | RTT:35/17 19.565 -> Packet PA|4|S0|a58d4b107b60a57c|47|1 StreamFrame[0(CIB),0,17,fin] 19.584 -> Packet A|5|S0|a58d4b107b60a57c|36|1 AckFrame[12-11,9-8,2|Δ19] 19.597 <- (7) Packet A|13|S0|e88f0c9b68f3e55c|33|1 AckFrame[4-2|Δ1] 19.597 Cwnd(-): 3000; inflight: 0 19.597 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.597 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 19.713/App, because ackElicitingInFlight | RTT:35/14 19.597 -> Packet A|6|S0|a58d4b107b60a57c|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[12|Δ0] 19.598 <- (8) Packet A|14|S0|e88f0c9b68f3e55c|1055|1 StreamFrame[0(CIB),0,1024,fin] 19.599 Finished downloading https://server4:443/lmdrqjqsxm at 21:06.253 on ClientConnection[052f4116d8fa5441/e88f0c9b68f3e55c(V1) with server4/193.167.100.100:443] 19.599 Closing ClientConnection[052f4116d8fa5441/e88f0c9b68f3e55c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.599 -> Packet A|7|S0|a58d4b107b60a57c|35|2 ConnectionCloseFrame[0|0|] AckFrame[14-12|Δ0] 19.599 Creating connection with server4:443 with v1 19.600 Setting up connection for downloading https://server4:443/yunwmgluru at 21:06.255 on ClientConnection[32dcc90b414f4df4/29759a553c381403(V1) with server4/193.167.100.100:443] 19.600 Original destination connection id: 32dcc90b414f4df4 (scid: 29759a553c381403) >- CryptoStream[I|ClientHello] 19.601 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.801/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.601 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.629 <- (9) Packet A|15|S0|e88f0c9b68f3e55c|33|1 AckFrame[6-2|Δ1] 19.630 -> Packet A|8|S0|a58d4b107b60a57c|35|2 ConnectionCloseFrame[0|0|] AckFrame[14-12|Δ0] 19.636 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 19.637 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.837/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.636 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 19.639 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.741/Handshake, because peerAwaitingAddressValidation | RTT:34/17 19.639 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 19.641 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.743/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.641 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.642 Starting downloading https://server4:443/yunwmgluru at 21:06.296 on ClientConnection[32dcc90b414f4df4/29759a553c381403(V1) with server4/193.167.100.100:443] 19.636 <- (1) Packet A|2|S0|29759a553c381403|259|2 CryptoFrame[0,89] Padding(139) 19.642 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 19.642 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.744/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.642 Discarding pn space Initial because first Handshake message is being sent 19.642 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.744/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.642 -> Packet A|0|S0|bd11bfd74ffc1def|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 19.673 <- (2) Packet A|3|S0|29759a553c381403|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|bf2404b263dfba3d|cf99de7bed7b0882192fe56e6302a776] 19.673 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 19.743/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 96 millis, based on 19.769/App, because ackElicitingInFlight | RTT:34/17 19.673 Discarding pn space Handshake because HandshakeDone is received 19.675 <- (3) Packet A|5|S0|29759a553c381403|1055|1 StreamFrame[0(CIB),0,1024,fin] 19.675 -> Packet A|1|S0|bd11bfd74ffc1def|34|1 AckFrame[5,3-2|Δ2] 19.676 Finished downloading https://server4:443/yunwmgluru at 21:06.330 on ClientConnection[32dcc90b414f4df4/29759a553c381403(V1) with server4/193.167.100.100:443] 19.676 Closing ClientConnection[32dcc90b414f4df4/29759a553c381403(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.676 Creating connection with server4:443 with v1 19.676 -> Packet A|2|S0|bd11bfd74ffc1def|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 19.677 Setting up connection for downloading https://server4:443/wenecfjloo at 21:06.331 on ClientConnection[674bb61cb6eb54ab/2c77f7c7ce430729(V1) with server4/193.167.100.100:443] 19.677 Original destination connection id: 674bb61cb6eb54ab (scid: 2c77f7c7ce430729) >- CryptoStream[I|ClientHello] 19.678 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.878/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.678 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.712 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 19.713 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.913/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.712 <- (1) Packet H|1|L|762|1 CryptoFrame[0,715] 19.715 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.817/Handshake, because peerAwaitingAddressValidation | RTT:34/17 19.715 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 19.717 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.819/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.717 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.717 Starting downloading https://server4:443/wenecfjloo at 21:06.372 on ClientConnection[674bb61cb6eb54ab/2c77f7c7ce430729(V1) with server4/193.167.100.100:443] 19.712 <- (1) Packet A|2|S0|2c77f7c7ce430729|261|2 CryptoFrame[0,89] Padding(141) 19.717 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 19.717 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.819/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.717 Discarding pn space Initial because first Handshake message is being sent 19.718 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.820/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.717 -> Packet A|0|S0|2c721796ce6f8eb5|47|1 StreamFrame[0(CIB),0,17,fin] 19.737 -> Packet A|1|S0|2c721796ce6f8eb5|32|1 AckFrame[2|Δ19] 19.819 loss detection timeout handler running Sending probe 0, because no ack since 19.717. Current RTT: 34/17. 19.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.819 (Probe is a handshake retransmit) 19.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 20.023/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.819 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 19.847 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 19.847 <- (2) Packet A|4|S0|2c77f7c7ce430729|120|1 CryptoFrame[0,89] 19.848 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] -< CryptoStream[A|NewSessionTicket] 19.867 -> Packet A|2|S0|2c721796ce6f8eb5|34|1 AckFrame[4,2|Δ19] 20.022 loss detection timeout handler running Sending probe 1, because no ack since 19.717. Current RTT: 34/17. 20.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.022 (Probe is a handshake retransmit) 20.023 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 20.431/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.023 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 20.024 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 20.432/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.024 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 20.431 loss detection timeout handler running Sending probe 2, because no ack since 19.717. Current RTT: 34/17. 20.431 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.431 (Probe is a handshake retransmit) 20.431 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 21.247/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.431 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 20.432 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 21.248/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.432 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 20.463 <- (3) Packet A|7|S0|2c77f7c7ce430729|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 20.482 -> Packet A|3|S0|2c721796ce6f8eb5|36|1 AckFrame[7,4,2|Δ19] 20.513 <- (4) Packet A|8|S0|2c77f7c7ce430729|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a031a951f3f6f7ef|d8cb19843a197b993223ac9f3749be95] 20.514 State is set to Confirmed reschedule loss detection timer for PTO over 219 millis, based on 20.733/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -669 millis, based on 19.844/App, because ackElicitingInFlight | RTT:34/17 20.514 Discarding pn space Handshake because HandshakeDone is received 20.514 loss detection timeout handler running Sending probe 0, because no ack since 19.717. Current RTT: 34/17. 20.514 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 20.768/App, because ackElicitingInFlight | RTT:34/17 20.514 -> Packet PA|4|S0|2c721796ce6f8eb5|47|1 StreamFrame[0(CIB),0,17,fin] 20.534 -> Packet A|5|S0|2c721796ce6f8eb5|36|1 AckFrame[8-7,4,2|Δ19] 20.548 <- (5) Packet A|10|S0|2c77f7c7ce430729|1055|1 StreamFrame[0(CIB),0,1024,fin] 20.548 Finished downloading https://server4:443/wenecfjloo at 21:07.203 on ClientConnection[674bb61cb6eb54ab/2c77f7c7ce430729(V1) with server4/193.167.100.100:443] 20.548 Closing ClientConnection[674bb61cb6eb54ab/2c77f7c7ce430729(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.549 -> Packet A|6|S0|2c721796ce6f8eb5|41|2 ConnectionCloseFrame[0|0|] AckFrame[10,8-7,4,2|Δ0] 20.549 Creating connection with server4:443 with v1 20.549 Setting up connection for downloading https://server4:443/uvqybohncs at 21:07.204 on ClientConnection[21a33233ef786130/0e0c7005a6ba025c(V1) with server4/193.167.100.100:443] 20.550 Original destination connection id: 21a33233ef786130 (scid: 0e0c7005a6ba025c) >- CryptoStream[I|ClientHello] 20.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.751/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.551 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.750 loss detection timeout handler running Sending probe 0, because no ack since 20.551. Current RTT: 100/25. 20.750 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.750 (Probe is an initial retransmit) 20.751 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.151/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.750 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.786 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ2] CryptoFrame[0,123] 20.787 probe count not reset on ack because handshake not yet confirmed 20.787 Retransmitting CryptoFrame[0,257] on level Initial 20.787 Cwnd(-): 6000; inflight: 0 20.787 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.187/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.787 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 20.993/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 20.787 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 20.786 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 20.789 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 20.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 20.789 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 20.792 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 20.998/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 20.792 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.786 <- (1) Packet A|2|S0|0e0c7005a6ba025c|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 20.792 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.792 Starting downloading https://server4:443/uvqybohncs at 21:07.447 on ClientConnection[21a33233ef786130/0e0c7005a6ba025c(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 20.895/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 20.792 Discarding pn space Initial because first Handshake message is being sent 20.792 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 20.793 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 20.896/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 20.793 -> Packet A|0|S0|d79d4a5498e47adf|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 20.821 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.895 loss detection timeout handler running Sending probe 0, because no ack since 20.792. Current RTT: 35/17. 20.895 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.895 (Probe is a handshake retransmit) 20.896 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 21.102/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 20.895 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 20.927 <- (3) Packet A|6|S0|0e0c7005a6ba025c|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|53bf6546c1de2d5c|bcc208b34aff53cae26eee6fc5e70ea9] 20.928 State is set to Confirmed reschedule loss detection timer for PTO over 121 millis, based on 21.049/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -7 millis, based on 20.921/App, because ackElicitingInFlight | RTT:35/17 20.928 Discarding pn space Handshake because HandshakeDone is received 20.928 loss detection timeout handler running Sending probe 0, because no ack since 20.793. Current RTT: 35/17. 20.928 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 21.184/App, because ackElicitingInFlight | RTT:35/17 20.928 -> Packet PA|1|S0|d79d4a5498e47adf|47|1 StreamFrame[0(CIB),0,17,fin] 20.947 -> Packet A|2|S0|d79d4a5498e47adf|34|1 AckFrame[6,2|Δ19] 20.960 <- (4) Packet A|7|S0|0e0c7005a6ba025c|33|1 AckFrame[1|Δ1] 20.960 Cwnd(-): 3000; inflight: 0 20.960 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.960 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 115 millis, based on 21.077/App, because ackElicitingInFlight | RTT:35/14 20.961 -> Packet A|3|S0|d79d4a5498e47adf|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6,2|Δ0] 20.978 <- (5) Packet A|9|S0|0e0c7005a6ba025c|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 20.993 <- (6) Packet A|10|S0|0e0c7005a6ba025c|33|1 AckFrame[3-1|Δ1] 20.993 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.998 -> Packet A|4|S0|d79d4a5498e47adf|34|1 AckFrame[10-9,7|Δ19] 21.030 <- (7) Packet A|11|S0|0e0c7005a6ba025c|1055|1 StreamFrame[0(CIB),0,1024,fin] 21.031 Finished downloading https://server4:443/uvqybohncs at 21:07.685 on ClientConnection[21a33233ef786130/0e0c7005a6ba025c(V1) with server4/193.167.100.100:443] 21.031 Closing ClientConnection[21a33233ef786130/0e0c7005a6ba025c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.031 -> Packet A|5|S0|d79d4a5498e47adf|37|2 ConnectionCloseFrame[0|0|] AckFrame[11-9,7|Δ0] 21.031 Creating connection with server4:443 with v1 21.032 Setting up connection for downloading https://server4:443/niqngajwnt at 21:07.687 on ClientConnection[dae37598152192b9/e1f9c7cce7a88e1f(V1) with server4/193.167.100.100:443] 21.032 Original destination connection id: dae37598152192b9 (scid: e1f9c7cce7a88e1f) >- CryptoStream[I|ClientHello] 21.033 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.233/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.033 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.233 loss detection timeout handler running Sending probe 0, because no ack since 21.033. Current RTT: 100/25. 21.233 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.233 (Probe is an initial retransmit) 21.233 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.633/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.233 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.267 <- (1) Packet I|3|L|176|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 21.267 probe count not reset on ack because handshake not yet confirmed 21.267 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.667/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.267 <- (1) Packet H|4|L|762|1 CryptoFrame[0,715] 21.269 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.463/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.269 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 21.272 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.466/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.271 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.272 Starting downloading https://server4:443/niqngajwnt at 21:07.926 on ClientConnection[dae37598152192b9/e1f9c7cce7a88e1f(V1) with server4/193.167.100.100:443] 21.267 <- (1) Packet A|5|S0|e1f9c7cce7a88e1f|262|2 CryptoFrame[0,89] Padding(142) 21.272 -> Packet H|1|L|46|1 AckFrame[4|Δ0] -< CryptoStream[A|NewSessionTicket] 21.272 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.369/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.272 Discarding pn space Initial because first Handshake message is being sent 21.272 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.369/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.272 -> Packet A|0|S0|9cc669c9170a5bff|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 21.303 <- (2) Packet A|6|S0|e1f9c7cce7a88e1f|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|86a50307d6c9ada1|1ca54e446165315cd3954c20929cecdd] 21.303 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 21.368/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 21.394/App, because ackElicitingInFlight | RTT:33/16 21.303 Discarding pn space Handshake because HandshakeDone is received 21.304 <- (3) Packet A|7|S0|e1f9c7cce7a88e1f|33|1 AckFrame[0|Δ1] 21.304 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.323 -> Packet A|1|S0|9cc669c9170a5bff|32|1 AckFrame[7-6|Δ19] 21.704 <- (4) Packet A|10|S0|e1f9c7cce7a88e1f|29|2 PingFrame[] Padding(1) 21.724 -> Packet A|2|S0|9cc669c9170a5bff|34|1 AckFrame[10,7-6|Δ19] 23.296 <- (5) Packet A|12|S0|e1f9c7cce7a88e1f|29|2 PingFrame[] Padding(1) 23.316 -> Packet A|3|S0|9cc669c9170a5bff|36|1 AckFrame[12,10,7-6|Δ19] 23.348 <- (6) Packet A|13|S0|e1f9c7cce7a88e1f|1055|1 StreamFrame[0(CIB),0,1024,fin] 23.349 Finished downloading https://server4:443/niqngajwnt at 21:10.003 on ClientConnection[dae37598152192b9/e1f9c7cce7a88e1f(V1) with server4/193.167.100.100:443] 23.349 Closing ClientConnection[dae37598152192b9/e1f9c7cce7a88e1f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.349 -> Packet A|4|S0|9cc669c9170a5bff|39|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,10,7-6|Δ0] 23.350 Creating connection with server4:443 with v1 23.350 Setting up connection for downloading https://server4:443/hzcdckcmjz at 21:10.005 on ClientConnection[59ec67fb5394ccba/289350bfe4fbcd92(V1) with server4/193.167.100.100:443] 23.350 Original destination connection id: 59ec67fb5394ccba (scid: 289350bfe4fbcd92) >- CryptoStream[I|ClientHello] 23.351 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.551/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.351 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.387 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 23.387 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.587/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.387 <- (1) Packet H|1|L|762|1 CryptoFrame[0,715] 23.389 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.493/Handshake, because peerAwaitingAddressValidation | RTT:35/17 23.389 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 23.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.495/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.391 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.392 Starting downloading https://server4:443/hzcdckcmjz at 21:10.046 on ClientConnection[59ec67fb5394ccba/289350bfe4fbcd92(V1) with server4/193.167.100.100:443] 23.387 <- (1) Packet A|2|S0|289350bfe4fbcd92|261|2 CryptoFrame[0,89] Padding(141) 23.392 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 23.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.495/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.392 Discarding pn space Initial because first Handshake message is being sent 23.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.495/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.392 -> Packet A|0|S0|dcf54b69660e133a|47|1 StreamFrame[0(CIB),0,17,fin] 23.412 -> Packet A|1|S0|dcf54b69660e133a|32|1 AckFrame[2|Δ19] 23.425 <- (2) Packet A|4|S0|289350bfe4fbcd92|33|1 AckFrame[0|Δ1] 23.425 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.528/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.527 loss detection timeout handler running Sending probe 0, because no ack since 23.391. Current RTT: 35/14. 23.527 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.528 (Probe is a handshake retransmit) 23.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 23.710/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/14 23.528 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 23.543 <- (3) Packet A|6|S0|289350bfe4fbcd92|29|2 PingFrame[] Padding(1) 23.562 -> Packet A|2|S0|dcf54b69660e133a|36|1 AckFrame[6,4,2|Δ19] 23.594 <- (4) Packet A|7|S0|289350bfe4fbcd92|1084|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f93695c3fb5c4ca1|8f6525d878c6581c7501df0ab548cecc] StreamFrame[0(CIB),0,1024,fin] 23.595 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 23.710/Handshake, because ackElicitingInFlight | RTT:35/14 23.595 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 23.595 Discarding pn space Handshake because HandshakeDone is received 23.595 Finished downloading https://server4:443/hzcdckcmjz at 21:10.250 on ClientConnection[59ec67fb5394ccba/289350bfe4fbcd92(V1) with server4/193.167.100.100:443] 23.595 Closing ClientConnection[59ec67fb5394ccba/289350bfe4fbcd92(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.595 -> Packet A|3|S0|dcf54b69660e133a|39|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4,2|Δ0] 23.596 Creating connection with server4:443 with v1 23.596 Setting up connection for downloading https://server4:443/ypzpokjldv at 21:10.251 on ClientConnection[0aadf7fb6e24f49c/b8f0565c9a0a49ec(V1) with server4/193.167.100.100:443] 23.597 Original destination connection id: 0aadf7fb6e24f49c (scid: b8f0565c9a0a49ec) >- CryptoStream[I|ClientHello] 23.598 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.798/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.598 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.797 loss detection timeout handler running Sending probe 0, because no ack since 23.598. Current RTT: 100/25. 23.797 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.797 (Probe is an initial retransmit) 23.798 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.198/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.798 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.197 loss detection timeout handler running Sending probe 1, because no ack since 23.798. Current RTT: 100/25. 24.197 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.197 (Probe is an initial retransmit) 24.197 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.998/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.197 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.198 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.998/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.198 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.233 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ2] CryptoFrame[0,123] 24.234 probe count not reset on ack because handshake not yet confirmed 24.234 Retransmitting CryptoFrame[0,257] on level Initial 24.234 Cwnd(-): 6000; inflight: 1200 24.234 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 25.034/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.234 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 411 millis, based on 24.646/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 24.234 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 24.233 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 24.237 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 24.649/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 24.237 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 24.239 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 24.651/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 24.239 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.239 Starting downloading https://server4:443/ypzpokjldv at 21:10.894 on ClientConnection[0aadf7fb6e24f49c/b8f0565c9a0a49ec(V1) with server4/193.167.100.100:443] 24.239 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 24.233 <- (1) Packet A|2|S0|b8f0565c9a0a49ec|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 24.240 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 24.343/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 24.240 Discarding pn space Initial because first Handshake message is being sent 24.240 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 24.343/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 24.240 -> Packet A|0|S0|9b4087037c4181ed|47|1 StreamFrame[0(CIB),0,17,fin] 24.259 -> Packet A|1|S0|9b4087037c4181ed|32|1 AckFrame[2|Δ19] 24.267 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.342 loss detection timeout handler running Sending probe 0, because no ack since 24.239. Current RTT: 35/17. 24.342 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.342 (Probe is a handshake retransmit) 24.343 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 24.549/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 24.342 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 24.472 <- (3) Packet A|7|S0|b8f0565c9a0a49ec|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 24.491 -> Packet A|2|S0|9b4087037c4181ed|34|1 AckFrame[7,2|Δ19] 24.523 <- (4) Packet A|8|S0|b8f0565c9a0a49ec|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c7ea2e9c568fc342|3a154b55ca70913c93d71297b1e6a982] 24.523 State is set to Confirmed reschedule loss detection timer for PTO over -27 millis, based on 24.496/App, because ackElicitingInFlight | RTT:35/17 24.523 loss detection timeout handler running Sending probe 1, because no ack since 24.240. Current RTT: 35/17. reschedule loss detection timer for PTO over -155 millis, based on 24.368/App, because ackElicitingInFlight | RTT:35/17 24.523 Discarding pn space Handshake because HandshakeDone is received 24.523 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 127 millis, based on 24.651/App, because ackElicitingInFlight | RTT:35/17 24.523 -> Packet PA|3|S0|9b4087037c4181ed|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 127 millis, based on 24.652/App, because ackElicitingInFlight | RTT:35/17 24.524 -> Packet PA|4|S0|9b4087037c4181ed|47|1 StreamFrame[0(CIB),0,17,fin] 24.543 -> Packet A|5|S0|9b4087037c4181ed|34|1 AckFrame[8-7,2|Δ19] 24.555 <- (5) Packet A|9|S0|b8f0565c9a0a49ec|33|1 AckFrame[3-2|Δ1] 24.555 Cwnd(-): 3000; inflight: 47 24.555 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 96 millis, based on 24.652/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 115 millis, based on 24.672/App, because ackElicitingInFlight | RTT:35/14 24.556 -> Packet A|6|S0|9b4087037c4181ed|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8|Δ0] 24.557 <- (6) Packet A|11|S0|b8f0565c9a0a49ec|33|1 AckFrame[4-2|Δ1] reschedule loss detection timer for PTO over 114 millis, based on 24.672/App, because ackElicitingInFlight | RTT:35/14 24.671 loss detection timeout handler running Sending probe 0, because no ack since 24.556. Current RTT: 35/12. 24.672 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 215 millis, based on 24.888/App, because ackElicitingInFlight | RTT:35/12 24.672 -> Packet PA|7|S0|9b4087037c4181ed|47|1 StreamFrame[0(CIB),0,17,fin] 24.709 <- (7) Packet A|13|S0|b8f0565c9a0a49ec|29|2 PingFrame[] Padding(1) 24.729 -> Packet A|8|S0|9b4087037c4181ed|36|1 AckFrame[13,11,9-8|Δ19] 24.887 loss detection timeout handler running Sending probe 1, because no ack since 24.672. Current RTT: 35/12. 24.887 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 431 millis, based on 25.320/App, because ackElicitingInFlight | RTT:35/12 24.888 -> Packet PA|9|S0|9b4087037c4181ed|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 431 millis, based on 25.321/App, because ackElicitingInFlight | RTT:35/12 24.889 -> Packet PA|10|S0|9b4087037c4181ed|47|1 StreamFrame[0(CIB),0,17,fin] 25.016 <- (8) Packet A|15|S0|b8f0565c9a0a49ec|29|2 PingFrame[] Padding(1) 25.035 -> Packet A|11|S0|9b4087037c4181ed|38|1 AckFrame[15,13,11,9-8|Δ19] 25.068 <- (9) Packet A|16|S0|b8f0565c9a0a49ec|1055|1 StreamFrame[0(CIB),0,1024,fin] 25.069 Finished downloading https://server4:443/ypzpokjldv at 21:11.723 on ClientConnection[0aadf7fb6e24f49c/b8f0565c9a0a49ec(V1) with server4/193.167.100.100:443] 25.069 Closing ClientConnection[0aadf7fb6e24f49c/b8f0565c9a0a49ec(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.069 -> Packet A|12|S0|9b4087037c4181ed|41|2 ConnectionCloseFrame[0|0|] AckFrame[16-15,13,11,9-8|Δ0] 25.069 Creating connection with server4:443 with v1 25.070 Setting up connection for downloading https://server4:443/ttcnhtdypd at 21:11.725 on ClientConnection[9cd020a46d705e71/4ec346d10584aabb(V1) with server4/193.167.100.100:443] 25.070 Original destination connection id: 9cd020a46d705e71 (scid: 4ec346d10584aabb) >- CryptoStream[I|ClientHello] 25.071 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.271/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.071 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.106 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 25.107 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.307/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 25.106 <- (1) Packet H|1|L|762|1 CryptoFrame[0,715] 25.109 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.212/Handshake, because peerAwaitingAddressValidation | RTT:35/17 25.109 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 25.111 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.215/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.111 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.112 Starting downloading https://server4:443/ttcnhtdypd at 21:11.766 on ClientConnection[9cd020a46d705e71/4ec346d10584aabb(V1) with server4/193.167.100.100:443] 25.112 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 25.106 <- (1) Packet A|2|S0|4ec346d10584aabb|261|2 CryptoFrame[0,89] Padding(141) -< CryptoStream[A|NewSessionTicket] 25.112 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.215/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.112 Discarding pn space Initial because first Handshake message is being sent 25.112 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.215/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.112 -> Packet A|0|S0|8b7e37d364a9e315|47|1 StreamFrame[0(CIB),0,17,fin] 25.132 -> Packet A|1|S0|8b7e37d364a9e315|32|1 AckFrame[2|Δ19] 25.201 <- (10) Packet A|17|S0|b8f0565c9a0a49ec|29|2 PingFrame[] Padding(1) 25.202 -> Packet A|13|S0|9b4087037c4181ed|41|2 ConnectionCloseFrame[0|0|] AckFrame[16-15,13,11,9-8|Δ0] 25.214 loss detection timeout handler running Sending probe 0, because no ack since 25.111. Current RTT: 35/17. 25.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.215 (Probe is a handshake retransmit) 25.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 25.421/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.215 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 25.309 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 25.420 loss detection timeout handler running Sending probe 1, because no ack since 25.112. Current RTT: 35/17. 25.420 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.420 (Probe is a handshake retransmit) 25.420 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 25.832/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.420 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 25.421 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 25.833/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.421 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 25.453 <- (3) Packet A|6|S0|4ec346d10584aabb|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|913dae46011d423b|aa168e366f23601b8bf53583ada9269c] 25.453 State is set to Confirmed reschedule loss detection timer for PTO over 171 millis, based on 25.624/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -213 millis, based on 25.240/App, because ackElicitingInFlight | RTT:35/17 25.453 loss detection timeout handler running 25.453 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 25.112. Current RTT: 35/17. 25.453 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 25.710/App, because ackElicitingInFlight | RTT:35/17 25.454 -> Packet PA|2|S0|8b7e37d364a9e315|47|1 StreamFrame[0(CIB),0,17,fin] 25.473 -> Packet A|3|S0|8b7e37d364a9e315|34|1 AckFrame[6,2|Δ19] 25.485 <- (4) Packet A|7|S0|4ec346d10584aabb|33|1 AckFrame[2|Δ1] 25.486 Cwnd(-): 6000; inflight: 0 25.486 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 25.486 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 25.602/App, because ackElicitingInFlight | RTT:35/14 25.486 -> Packet A|4|S0|8b7e37d364a9e315|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6,2|Δ0] 25.487 <- (5) Packet A|8|S0|4ec346d10584aabb|1055|1 StreamFrame[0(CIB),0,1024,fin] 25.487 Finished downloading https://server4:443/ttcnhtdypd at 21:12.142 on ClientConnection[9cd020a46d705e71/4ec346d10584aabb(V1) with server4/193.167.100.100:443] 25.487 Closing ClientConnection[9cd020a46d705e71/4ec346d10584aabb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.488 -> Packet A|5|S0|8b7e37d364a9e315|37|2 ConnectionCloseFrame[0|0|] AckFrame[8-6,2|Δ0] 25.488 Creating connection with server4:443 with v1 25.488 Setting up connection for downloading https://server4:443/uiowswknli at 21:12.143 on ClientConnection[00128ac6cdaf3a03/bda25126387ba376(V1) with server4/193.167.100.100:443] 25.488 Original destination connection id: 00128ac6cdaf3a03 (scid: bda25126387ba376) >- CryptoStream[I|ClientHello] 25.490 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.690/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.490 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.525 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 25.526 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.726/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 25.525 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 25.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.631/Handshake, because peerAwaitingAddressValidation | RTT:35/17 25.528 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 25.530 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.633/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.530 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.530 Starting downloading https://server4:443/uiowswknli at 21:12.185 on ClientConnection[00128ac6cdaf3a03/bda25126387ba376(V1) with server4/193.167.100.100:443] 25.525 <- (1) Packet A|2|S0|bda25126387ba376|259|2 CryptoFrame[0,89] Padding(139) 25.530 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 25.531 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.634/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.531 Discarding pn space Initial because first Handshake message is being sent 25.531 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.634/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.531 -> Packet A|0|S0|8a6801eae2417c00|47|1 StreamFrame[0(CIB),0,17,fin] 25.550 -> Packet A|1|S0|8a6801eae2417c00|32|1 AckFrame[2|Δ19] 25.563 <- (2) Packet A|4|S0|bda25126387ba376|33|1 AckFrame[0|Δ1] 25.563 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.667/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.564 <- (3) Packet A|5|S0|bda25126387ba376|1055|1 StreamFrame[0(CIB),0,1024,fin] 25.565 Finished downloading https://server4:443/uiowswknli at 21:12.219 on ClientConnection[00128ac6cdaf3a03/bda25126387ba376(V1) with server4/193.167.100.100:443] 25.565 Closing ClientConnection[00128ac6cdaf3a03/bda25126387ba376(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.565 -> Packet A|2|S0|8a6801eae2417c00|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 25.566 Creating connection with server4:443 with v1 25.566 Setting up connection for downloading https://server4:443/vlkfhtobkl at 21:12.221 on ClientConnection[29c90eca0e68bfdf/0cf54a7f891c8b10(V1) with server4/193.167.100.100:443] 25.566 Original destination connection id: 29c90eca0e68bfdf (scid: 0cf54a7f891c8b10) >- CryptoStream[I|ClientHello] 25.567 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.767/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.567 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.602 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 25.603 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.803/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 25.602 <- (1) Packet H|1|L|762|1 CryptoFrame[0,715] 25.605 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.708/Handshake, because peerAwaitingAddressValidation | RTT:35/17 25.605 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 25.608 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.608 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.608 Starting downloading https://server4:443/vlkfhtobkl at 21:12.263 on ClientConnection[29c90eca0e68bfdf/0cf54a7f891c8b10(V1) with server4/193.167.100.100:443] 25.608 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 25.602 <- (1) Packet A|2|S0|0cf54a7f891c8b10|261|2 CryptoFrame[0,89] Padding(141) -< CryptoStream[A|NewSessionTicket] 25.608 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.608 Discarding pn space Initial because first Handshake message is being sent 25.608 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.712/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.608 -> Packet A|0|S0|68225b186da08fab|47|1 StreamFrame[0(CIB),0,17,fin] 25.628 -> Packet A|1|S0|68225b186da08fab|32|1 AckFrame[2|Δ19] 25.687 <- (6) Packet A|9|S0|4ec346d10584aabb|121|2 PingFrame[] CryptoFrame[0,89] 25.688 -> Packet A|6|S0|8b7e37d364a9e315|37|2 ConnectionCloseFrame[0|0|] AckFrame[8-6,2|Δ0] 25.711 loss detection timeout handler running Sending probe 0, because no ack since 25.608. Current RTT: 35/17. 25.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.711 (Probe is a handshake retransmit) 25.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 25.917/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.711 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 25.740 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 25.740 <- (2) Packet A|4|S0|0cf54a7f891c8b10|120|1 CryptoFrame[0,89] 25.740 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] -< CryptoStream[A|NewSessionTicket] 25.742 <- (3) Packet A|5|S0|0cf54a7f891c8b10|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|092f5db1efcdcda1|778992a4943aa66e5576fb9748af84b3] 25.742 State is set to Confirmed reschedule loss detection timer for PTO over 121 millis, based on 25.864/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -6 millis, based on 25.736/App, because ackElicitingInFlight | RTT:35/17 25.743 Discarding pn space Handshake because HandshakeDone is received 25.743 loss detection timeout handler running Sending probe 0, because no ack since 25.608. Current RTT: 35/17. 25.743 (Probe is retransmit on level App) 25.743 -> Packet A|2|S0|68225b186da08fab|34|1 AckFrame[5-4,2|Δ2] reschedule loss detection timer for PTO over 255 millis, based on 25.999/App, because ackElicitingInFlight | RTT:35/17 25.743 -> Packet PA|3|S0|68225b186da08fab|47|1 StreamFrame[0(CIB),0,17,fin] 25.775 <- (4) Packet A|6|S0|0cf54a7f891c8b10|33|1 AckFrame[3-2|Δ1] 25.776 Cwnd(-): 6000; inflight: 0 25.776 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 25.776 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 115 millis, based on 25.892/App, because ackElicitingInFlight | RTT:35/14 25.776 -> Packet A|4|S0|68225b186da08fab|47|1 StreamFrame[0(CIB),0,17,fin] 25.776 <- (5) Packet A|7|S0|0cf54a7f891c8b10|1055|1 StreamFrame[0(CIB),0,1024,fin] 25.777 Finished downloading https://server4:443/vlkfhtobkl at 21:12.431 on ClientConnection[29c90eca0e68bfdf/0cf54a7f891c8b10(V1) with server4/193.167.100.100:443] 25.777 Closing ClientConnection[29c90eca0e68bfdf/0cf54a7f891c8b10(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.777 -> Packet A|5|S0|68225b186da08fab|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 25.777 Creating connection with server4:443 with v1 25.778 Setting up connection for downloading https://server4:443/bzcgqqbsbt at 21:12.433 on ClientConnection[598f6117c8912d32/f6f6d9fc1c1bd06a(V1) with server4/193.167.100.100:443] 25.778 Original destination connection id: 598f6117c8912d32 (scid: f6f6d9fc1c1bd06a) >- CryptoStream[I|ClientHello] 25.780 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.980/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.779 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.808 <- (6) Packet A|8|S0|0cf54a7f891c8b10|33|1 AckFrame[4-2|Δ1] 25.808 -> Packet A|6|S0|68225b186da08fab|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 25.815 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 25.816 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.016/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 25.815 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 25.818 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.921/Handshake, because peerAwaitingAddressValidation | RTT:35/17 25.818 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 25.820 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.923/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.820 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.821 Starting downloading https://server4:443/bzcgqqbsbt at 21:12.475 on ClientConnection[598f6117c8912d32/f6f6d9fc1c1bd06a(V1) with server4/193.167.100.100:443] 25.821 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 25.815 <- (1) Packet A|2|S0|f6f6d9fc1c1bd06a|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 25.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.924/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.821 Discarding pn space Initial because first Handshake message is being sent 25.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.924/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.821 -> Packet A|0|S0|6cd79906b65c349d|47|1 StreamFrame[0(CIB),0,17,fin] 25.840 -> Packet A|1|S0|6cd79906b65c349d|32|1 AckFrame[2|Δ19] 25.923 loss detection timeout handler running Sending probe 0, because no ack since 25.820. Current RTT: 35/17. 25.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.923 (Probe is a handshake retransmit) 25.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 26.129/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.923 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 25.931 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 25.931 <- (2) Packet A|4|S0|f6f6d9fc1c1bd06a|120|1 CryptoFrame[0,89] 25.931 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] -< CryptoStream[A|NewSessionTicket] 25.950 -> Packet A|2|S0|6cd79906b65c349d|34|1 AckFrame[4,2|Δ19] 26.033 <- (3) Packet H|5|L|45|2 PingFrame[] Padding(1) 26.033 <- (3) Packet A|6|S0|f6f6d9fc1c1bd06a|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 26.034 -> Packet H|4|L|50|1 AckFrame[5,3,1|Δ0] 26.054 -> Packet A|3|S0|6cd79906b65c349d|36|1 AckFrame[6,4,2|Δ19] 26.125 <- (4) Packet H|7|L|45|2 PingFrame[] Padding(1) 26.125 <- (4) Packet A|8|S0|f6f6d9fc1c1bd06a|120|1 CryptoFrame[0,89] 26.126 -> Packet H|5|L|52|1 AckFrame[7,5,3,1|Δ0] -< CryptoStream[A|NewSessionTicket] 26.129 loss detection timeout handler running Sending probe 1, because no ack since 25.821. Current RTT: 35/17. 26.129 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.129 (Probe is a handshake retransmit) 26.129 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 26.541/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 26.129 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 26.130 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 26.542/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 26.130 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 26.145 -> Packet A|4|S0|6cd79906b65c349d|38|1 AckFrame[8,6,4,2|Δ19] 26.413 <- (5) Packet A|11|S0|f6f6d9fc1c1bd06a|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 26.433 -> Packet A|5|S0|6cd79906b65c349d|40|1 AckFrame[11,8,6,4,2|Δ19] 26.541 loss detection timeout handler running Sending probe 2, because no ack since 25.821. Current RTT: 35/17. 26.541 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.541 (Probe is a handshake retransmit) 26.542 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 823 millis, based on 27.366/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 26.541 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 26.542 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 823 millis, based on 27.367/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 26.542 -> Packet PH|9|L|80|1 CryptoFrame[0,36] 26.543 <- (6) Packet A|13|S0|f6f6d9fc1c1bd06a|29|2 PingFrame[] Padding(1) 26.563 -> Packet A|6|S0|6cd79906b65c349d|42|1 AckFrame[13,11,8,6,4,2|Δ19] 26.595 <- (7) Packet A|14|S0|f6f6d9fc1c1bd06a|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|da65b43731123e36|bf3e0c04d85ef0bd658fa3e67eb10561] 26.595 State is set to Confirmed reschedule loss detection timer for PTO over 249 millis, based on 26.845/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -646 millis, based on 25.949/App, because ackElicitingInFlight | RTT:35/17 26.595 loss detection timeout handler running 26.595 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 25.821. Current RTT: 35/17. 26.595 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 26.851/App, because ackElicitingInFlight | RTT:35/17 26.595 -> Packet PA|7|S0|6cd79906b65c349d|47|1 StreamFrame[0(CIB),0,17,fin] 26.615 -> Packet A|8|S0|6cd79906b65c349d|42|1 AckFrame[14-13,11,8,6,4,2|Δ19] 26.627 <- (8) Packet A|15|S0|f6f6d9fc1c1bd06a|33|1 AckFrame[7-5|Δ1] 26.628 Cwnd(-): 6000; inflight: 0 26.628 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 26.628 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 26.744/App, because ackElicitingInFlight | RTT:35/14 26.628 -> Packet A|9|S0|6cd79906b65c349d|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[14|Δ0] 26.629 <- (9) Packet A|16|S0|f6f6d9fc1c1bd06a|1055|1 StreamFrame[0(CIB),0,1024,fin] 26.629 Finished downloading https://server4:443/bzcgqqbsbt at 21:13.284 on ClientConnection[598f6117c8912d32/f6f6d9fc1c1bd06a(V1) with server4/193.167.100.100:443] 26.629 Closing ClientConnection[598f6117c8912d32/f6f6d9fc1c1bd06a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.630 -> Packet A|10|S0|6cd79906b65c349d|35|2 ConnectionCloseFrame[0|0|] AckFrame[16-14|Δ0] 26.630 Creating connection with server4:443 with v1 26.631 Setting up connection for downloading https://server4:443/vvmplyxttb at 21:13.285 on ClientConnection[16e10fb7c00ff388/bb954486fa5e669b(V1) with server4/193.167.100.100:443] 26.631 Original destination connection id: 16e10fb7c00ff388 (scid: bb954486fa5e669b) >- CryptoStream[I|ClientHello] 26.632 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.832/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.632 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.660 <- (10) Packet A|17|S0|f6f6d9fc1c1bd06a|35|1 AckFrame[9,7-5|Δ1] 26.660 -> Packet A|11|S0|6cd79906b65c349d|35|2 ConnectionCloseFrame[0|0|] AckFrame[16-14|Δ0] 26.667 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 26.667 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.867/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 26.667 <- (1) Packet H|1|L|762|1 CryptoFrame[0,715] 26.669 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.771/Handshake, because peerAwaitingAddressValidation | RTT:34/17 26.669 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 26.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.671 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.672 Starting downloading https://server4:443/vvmplyxttb at 21:13.326 on ClientConnection[16e10fb7c00ff388/bb954486fa5e669b(V1) with server4/193.167.100.100:443] 26.667 <- (1) Packet A|2|S0|bb954486fa5e669b|261|2 CryptoFrame[0,89] Padding(141) -< CryptoStream[A|NewSessionTicket] 26.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.774/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.672 Discarding pn space Initial because first Handshake message is being sent 26.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.774/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.672 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|2d872ee40fcc11f4|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0]] 26.773 loss detection timeout handler running Sending probe 0, because no ack since 26.671. Current RTT: 34/17. 26.774 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.774 (Probe is a handshake retransmit) 26.774 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 26.978/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.774 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 26.782 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 26.782 <- (2) Packet A|4|S0|bb954486fa5e669b|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 26.783 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] 26.802 -> Packet A|1|S0|2d872ee40fcc11f4|34|1 AckFrame[4,2|Δ19] 26.977 loss detection timeout handler running Sending probe 1, because no ack since 26.672. Current RTT: 34/17. 26.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.977 (Probe is a handshake retransmit) 26.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 27.385/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.977 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 26.978 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 27.386/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.978 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 27.165 <- (3) Packet A|7|S0|bb954486fa5e669b|29|2 PingFrame[] Padding(1) 27.185 -> Packet A|2|S0|2d872ee40fcc11f4|36|1 AckFrame[7,4,2|Δ19] 27.216 <- (4) Packet A|8|S0|bb954486fa5e669b|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|8c38d95410eaee17|41b6e8183c4062e981144a191c674ee5] 27.216 State is set to Confirmed reschedule loss detection timer for PTO over -35 millis, based on 27.180/App, because ackElicitingInFlight | RTT:34/17 27.216 loss detection timeout handler running Sending probe 2, because no ack since 26.672. Current RTT: 34/17. reschedule loss detection timer for PTO over -417 millis, based on 26.799/App, because ackElicitingInFlight | RTT:34/17 27.216 Discarding pn space Handshake because HandshakeDone is received 27.216 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 27.470/App, because ackElicitingInFlight | RTT:34/17 27.216 -> Packet PA|3|S0|2d872ee40fcc11f4|47|1 StreamFrame[0(CIB),0,17,fin] 27.236 -> Packet A|4|S0|2d872ee40fcc11f4|36|1 AckFrame[8-7,4,2|Δ19] 27.248 <- (5) Packet A|9|S0|bb954486fa5e669b|33|1 AckFrame[3-1|Δ1] 27.249 Cwnd(-): 6000; inflight: 0 27.249 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 27.249 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 114 millis, based on 27.364/App, because ackElicitingInFlight | RTT:34/14 27.249 -> Packet A|5|S0|2d872ee40fcc11f4|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8|Δ0] 27.249 <- (6) Packet A|10|S0|bb954486fa5e669b|1055|1 StreamFrame[0(CIB),0,1024,fin] 27.250 Finished downloading https://server4:443/vvmplyxttb at 21:13.905 on ClientConnection[16e10fb7c00ff388/bb954486fa5e669b(V1) with server4/193.167.100.100:443] 27.250 Closing ClientConnection[16e10fb7c00ff388/bb954486fa5e669b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.250 -> Packet A|6|S0|2d872ee40fcc11f4|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-8|Δ0] 27.251 Creating connection with server4:443 with v1 27.251 Setting up connection for downloading https://server4:443/qgybtcdpgi at 21:13.906 on ClientConnection[b226595113996e38/4967dbec5b24c2ab(V1) with server4/193.167.100.100:443] 27.251 Original destination connection id: b226595113996e38 (scid: 4967dbec5b24c2ab) >- CryptoStream[I|ClientHello] 27.252 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.452/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.252 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.281 <- (7) Packet A|11|S0|bb954486fa5e669b|33|1 AckFrame[5-1|Δ1] 27.281 -> Packet A|7|S0|2d872ee40fcc11f4|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-8|Δ0] 27.452 loss detection timeout handler running Sending probe 0, because no ack since 27.252. Current RTT: 100/25. 27.452 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.452 (Probe is an initial retransmit) 27.452 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.852/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.452 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.485 <- (1) Packet I|3|L|176|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 27.486 probe count not reset on ack because handshake not yet confirmed 27.486 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.886/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.485 <- (1) Packet H|4|L|763|1 CryptoFrame[0,716] 27.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 27.682/Handshake, because peerAwaitingAddressValidation | RTT:33/16 27.488 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.491 Starting downloading https://server4:443/qgybtcdpgi at 21:14.145 on ClientConnection[b226595113996e38/4967dbec5b24c2ab(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 193 millis, based on 27.685/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.485 <- (1) Packet A|5|S0|4967dbec5b24c2ab|261|2 CryptoFrame[0,89] Padding(141) 27.490 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[A|NewSessionTicket] 27.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.588/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.491 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 27.491 Discarding pn space Initial because first Handshake message is being sent 27.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.588/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.491 -> Packet A|0|S0|03cb4558b670cf83|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 27.587 loss detection timeout handler running Sending probe 0, because no ack since 27.490. Current RTT: 33/16. 27.587 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.588 (Probe is a handshake retransmit) 27.588 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 27.782/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.588 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 27.724 <- (2) Packet A|7|S0|4967dbec5b24c2ab|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 27.744 -> Packet A|1|S0|03cb4558b670cf83|34|1 AckFrame[7,5|Δ19] 27.775 <- (3) Packet A|8|S0|4967dbec5b24c2ab|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|9d842c79b56ab743|295a1d709c98cda950ce4d3cbf1bf4df] 27.775 State is set to Confirmed reschedule loss detection timer for PTO over -39 millis, based on 27.735/App, because ackElicitingInFlight | RTT:33/16 27.775 loss detection timeout handler running Sending probe 1, because no ack since 27.491. Current RTT: 33/16. reschedule loss detection timer for PTO over -40 millis, based on 27.735/App, because ackElicitingInFlight | RTT:33/16 27.775 (Probe is retransmit on level App) 27.775 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 243 millis, based on 28.020/App, because ackElicitingInFlight | RTT:33/16 27.776 -> Packet PA|2|S0|03cb4558b670cf83|47|1 StreamFrame[0(CIB),0,17,fin] 27.795 -> Packet A|3|S0|03cb4558b670cf83|34|1 AckFrame[8-7,5|Δ19] 28.019 loss detection timeout handler running Sending probe 1, because no ack since 27.776. Current RTT: 33/16. 28.019 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 28.507/App, because ackElicitingInFlight | RTT:33/16 28.019 -> Packet PA|4|S0|03cb4558b670cf83|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 28.508/App, because ackElicitingInFlight | RTT:33/16 28.020 -> Packet PA|5|S0|03cb4558b670cf83|47|1 StreamFrame[0(CIB),0,17,fin] 28.053 <- (4) Packet A|10|S0|4967dbec5b24c2ab|1055|1 StreamFrame[0(CIB),0,1024,fin] 28.054 Finished downloading https://server4:443/qgybtcdpgi at 21:14.708 on ClientConnection[b226595113996e38/4967dbec5b24c2ab(V1) with server4/193.167.100.100:443] 28.054 Closing ClientConnection[b226595113996e38/4967dbec5b24c2ab(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.055 -> Packet A|6|S0|03cb4558b670cf83|39|2 ConnectionCloseFrame[0|0|] AckFrame[10,8-7,5|Δ0] 28.055 Creating connection with server4:443 with v1 28.055 Setting up connection for downloading https://server4:443/bxvibbfkrw at 21:14.710 on ClientConnection[08e2743d630392ae/732d95ac94e4b9e0(V1) with server4/193.167.100.100:443] 28.055 Original destination connection id: 08e2743d630392ae (scid: 732d95ac94e4b9e0) >- CryptoStream[I|ClientHello] 28.056 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.256/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.056 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.091 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 28.092 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.292/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 28.091 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 28.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 28.198/Handshake, because peerAwaitingAddressValidation | RTT:35/17 28.094 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 28.097 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 28.200/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.097 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.097 Starting downloading https://server4:443/bxvibbfkrw at 21:14.752 on ClientConnection[08e2743d630392ae/732d95ac94e4b9e0(V1) with server4/193.167.100.100:443] 28.091 <- (1) Packet A|2|S0|732d95ac94e4b9e0|260|2 CryptoFrame[0,89] Padding(140) 28.097 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 28.097 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 28.200/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.098 Discarding pn space Initial because first Handshake message is being sent 28.098 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 28.201/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.098 -> Packet A|0|S0|36386ec73749d0fc|47|1 StreamFrame[0(CIB),0,17,fin] 28.117 -> Packet A|1|S0|36386ec73749d0fc|32|1 AckFrame[2|Δ19] 28.131 <- (2) Packet A|5|S0|732d95ac94e4b9e0|1055|1 StreamFrame[0(CIB),0,1024,fin] 28.132 Finished downloading https://server4:443/bxvibbfkrw at 21:14.786 on ClientConnection[08e2743d630392ae/732d95ac94e4b9e0(V1) with server4/193.167.100.100:443] 28.132 Closing ClientConnection[08e2743d630392ae/732d95ac94e4b9e0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.132 -> Packet A|2|S0|36386ec73749d0fc|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 28.133 Creating connection with server4:443 with v1 28.133 Setting up connection for downloading https://server4:443/nyvgxpcgbu at 21:14.788 on ClientConnection[aa502ccae9fc8b79/369d80c156e759cf(V1) with server4/193.167.100.100:443] 28.133 Original destination connection id: aa502ccae9fc8b79 (scid: 369d80c156e759cf) >- CryptoStream[I|ClientHello] 28.135 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.335/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.135 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.334 loss detection timeout handler running Sending probe 0, because no ack since 28.135. Current RTT: 100/25. 28.334 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.334 (Probe is an initial retransmit) 28.334 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.734/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.334 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.569 <- (1) Packet I|6|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 28.569 <- (1) Packet H|7|L|762|1 CryptoFrame[0,715] 28.572 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 28.972/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.572 -> Packet I|2|L|1201|2 Token=[] AckFrame[6|Δ0] Padding(1153) >- CryptoStream[H|Finished] 28.575 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 28.975/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.575 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.575 Starting downloading https://server4:443/nyvgxpcgbu at 21:15.230 on ClientConnection[aa502ccae9fc8b79/369d80c156e759cf(V1) with server4/193.167.100.100:443] 28.569 <- (1) Packet A|8|S0|369d80c156e759cf|267|2 CryptoFrame[0,89] Padding(147) -< CryptoStream[A|NewSessionTicket] 28.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 28.776/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.576 Discarding pn space Initial because first Handshake message is being sent 28.575 -> Packet H|1|L|46|1 AckFrame[7|Δ0] 28.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 28.776/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.576 -> Packet A|0|S0|a5ab8f2a89f38990|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8|Δ0] 28.743 <- (2) Packet A|10|S0|369d80c156e759cf|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 28.762 -> Packet A|1|S0|a5ab8f2a89f38990|34|1 AckFrame[10,8|Δ19] 28.775 loss detection timeout handler running Sending probe 0, because no ack since 28.575. Current RTT: 100/25. 28.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.775 (Probe is a handshake retransmit) 28.776 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 29.176/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.775 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 29.015 <- (3) Packet A|11|S0|369d80c156e759cf|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 29.035 -> Packet A|2|S0|a5ab8f2a89f38990|34|1 AckFrame[11-10,8|Δ19] 29.175 loss detection timeout handler running Sending probe 1, because no ack since 28.576. Current RTT: 100/25. 29.175 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.175 (Probe is a handshake retransmit) 29.175 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 29.975/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.175 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 29.176 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 29.976/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.176 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 29.975 loss detection timeout handler running Sending probe 2, because no ack since 28.576. Current RTT: 100/25. 29.975 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.975 (Probe is a handshake retransmit) 29.976 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 31.576/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.975 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 29.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 31.577/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.977 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 30.641 <- (4) Packet A|13|S0|369d80c156e759cf|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 30.661 -> Packet A|3|S0|a5ab8f2a89f38990|36|1 AckFrame[13,11-10,8|Δ19] 30.692 <- (5) Packet A|14|S0|369d80c156e759cf|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b5c21bf615338b7e|b1e2d870cb783c59164d57181cad5cea] 30.692 State is set to Confirmed reschedule loss detection timer for PTO over -316 millis, based on 30.376/App, because ackElicitingInFlight | RTT:100/25 30.693 loss detection timeout handler running Sending probe 3, because no ack since 28.576. Current RTT: 100/25. reschedule loss detection timer for PTO over -1891 millis, based on 28.801/App, because ackElicitingInFlight | RTT:100/25 30.693 Discarding pn space Handshake because HandshakeDone is received 30.693 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 31.143/App, because ackElicitingInFlight | RTT:100/25 30.693 -> Packet PA|4|S0|a5ab8f2a89f38990|47|1 StreamFrame[0(CIB),0,17,fin] 30.712 -> Packet A|5|S0|a5ab8f2a89f38990|36|1 AckFrame[14-13,11-10,8|Δ19] 30.724 <- (6) Packet A|15|S0|369d80c156e759cf|33|1 AckFrame[4-3|Δ1] 30.725 Cwnd(-): 6000; inflight: 0 30.725 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 30.725 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 30.841/App, because ackElicitingInFlight | RTT:31/15 30.725 -> Packet A|6|S0|a5ab8f2a89f38990|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[14|Δ0] 30.757 <- (7) Packet A|17|S0|369d80c156e759cf|35|1 AckFrame[6,4-3|Δ1] 30.757 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 30.872 <- (8) Packet A|18|S0|369d80c156e759cf|29|2 PingFrame[] Padding(1) 30.891 -> Packet A|7|S0|a5ab8f2a89f38990|34|1 AckFrame[18-17,15|Δ19] 31.064 <- (9) Packet A|20|S0|369d80c156e759cf|29|2 PingFrame[] Padding(1) 31.084 -> Packet A|8|S0|a5ab8f2a89f38990|36|1 AckFrame[20,18-17,15|Δ19] 31.116 <- (10) Packet A|21|S0|369d80c156e759cf|1055|1 StreamFrame[0(CIB),0,1024,fin] 31.117 Finished downloading https://server4:443/nyvgxpcgbu at 21:17.771 on ClientConnection[aa502ccae9fc8b79/369d80c156e759cf(V1) with server4/193.167.100.100:443] 31.117 Closing ClientConnection[aa502ccae9fc8b79/369d80c156e759cf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.117 -> Packet A|9|S0|a5ab8f2a89f38990|39|2 ConnectionCloseFrame[0|0|] AckFrame[21-20,18-17,15|Δ0] 31.117 Creating connection with server4:443 with v1 31.118 Setting up connection for downloading https://server4:443/flcjmelonv at 21:17.773 on ClientConnection[60010f631bd83079/d157647dbca2f188(V1) with server4/193.167.100.100:443] 31.118 Original destination connection id: 60010f631bd83079 (scid: d157647dbca2f188) >- CryptoStream[I|ClientHello] 31.120 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.320/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.120 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.155 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 31.156 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.356/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 31.155 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 31.158 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 31.261/Handshake, because peerAwaitingAddressValidation | RTT:35/17 31.158 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 31.161 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 31.264/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 31.161 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.161 Starting downloading https://server4:443/flcjmelonv at 21:17.816 on ClientConnection[60010f631bd83079/d157647dbca2f188(V1) with server4/193.167.100.100:443] 31.155 <- (1) Packet A|2|S0|d157647dbca2f188|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 31.161 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.162 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 31.265/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 31.162 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|7a7e545ca8ed5136|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0]] reschedule loss detection timer for PTO over 102 millis, based on 31.264/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 31.162 Discarding pn space Initial because first Handshake message is being sent 31.192 <- (2) Packet A|3|S0|d157647dbca2f188|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|6d40d81142524dcf|6b162f7feac8fb286ba406a3a294f5c3] 31.193 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 31.264/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 96 millis, based on 31.290/App, because ackElicitingInFlight | RTT:35/17 31.193 Discarding pn space Handshake because HandshakeDone is received 31.212 -> Packet A|1|S0|7a7e545ca8ed5136|32|1 AckFrame[3-2|Δ19] 31.289 loss detection timeout handler running Sending probe 0, because no ack since 31.162. Current RTT: 35/17. 31.289 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 31.545/App, because ackElicitingInFlight | RTT:35/17 31.289 -> Packet PA|2|S0|7a7e545ca8ed5136|47|1 StreamFrame[0(CIB),0,17,fin] 31.545 loss detection timeout handler running Sending probe 1, because no ack since 31.289. Current RTT: 35/17. 31.545 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 511 millis, based on 32.057/App, because ackElicitingInFlight | RTT:35/17 31.545 -> Packet PA|3|S0|7a7e545ca8ed5136|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 511 millis, based on 32.058/App, because ackElicitingInFlight | RTT:35/17 31.546 -> Packet PA|4|S0|7a7e545ca8ed5136|47|1 StreamFrame[0(CIB),0,17,fin] 31.548 <- (3) Packet A|7|S0|d157647dbca2f188|29|2 PingFrame[] Padding(1) 31.567 -> Packet A|5|S0|7a7e545ca8ed5136|34|1 AckFrame[7,3-2|Δ19] 31.577 <- (4) Packet A|8|S0|d157647dbca2f188|35|2 AckFrame[4-3,0|Δ0] PingFrame[] 31.577 Cwnd(-): 6000; inflight: 0 31.577 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.596 -> Packet A|6|S0|7a7e545ca8ed5136|34|1 AckFrame[8-7,3|Δ19] 31.629 <- (5) Packet A|9|S0|d157647dbca2f188|1055|1 StreamFrame[0(CIB),0,1024,fin] 31.629 Finished downloading https://server4:443/flcjmelonv at 21:18.284 on ClientConnection[60010f631bd83079/d157647dbca2f188(V1) with server4/193.167.100.100:443] 31.629 Closing ClientConnection[60010f631bd83079/d157647dbca2f188(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.630 -> Packet A|7|S0|7a7e545ca8ed5136|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-7,3|Δ0] 31.630 Creating connection with server4:443 with v1 31.631 Setting up connection for downloading https://server4:443/emebnfoagb at 21:18.285 on ClientConnection[653d33d36f2fc495/136bf50288ef7c9c(V1) with server4/193.167.100.100:443] 31.631 Original destination connection id: 653d33d36f2fc495 (scid: 136bf50288ef7c9c) >- CryptoStream[I|ClientHello] 31.632 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.832/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.632 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.667 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 31.667 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.867/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 31.667 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 31.669 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.771/Handshake, because peerAwaitingAddressValidation | RTT:34/17 31.669 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 31.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.671 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.672 Starting downloading https://server4:443/emebnfoagb at 21:18.326 on ClientConnection[653d33d36f2fc495/136bf50288ef7c9c(V1) with server4/193.167.100.100:443] 31.672 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 31.667 <- (1) Packet A|2|S0|136bf50288ef7c9c|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 31.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.774/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.672 Discarding pn space Initial because first Handshake message is being sent 31.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.774/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.672 -> Packet A|0|S0|8900d10ca5d0344c|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 31.773 loss detection timeout handler running Sending probe 0, because no ack since 31.671. Current RTT: 34/17. 31.773 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.773 (Probe is a handshake retransmit) 31.773 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 31.978/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.773 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 31.781 <- (2) Packet H|3|L|45|2 PingFrame[] Padding(1) 31.781 <- (2) Packet A|4|S0|136bf50288ef7c9c|120|1 CryptoFrame[0,89] 31.782 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] -< CryptoStream[A|NewSessionTicket] 31.801 -> Packet A|1|S0|8900d10ca5d0344c|34|1 AckFrame[4,2|Δ19] 31.977 loss detection timeout handler running Sending probe 1, because no ack since 31.672. Current RTT: 34/17. 31.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.977 (Probe is a handshake retransmit) 31.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 32.385/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.977 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 31.978 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 32.386/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.978 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 32.009 <- (3) Packet A|7|S0|136bf50288ef7c9c|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|68f34d8a4e981b56|cdaa2b18c8f630c9c75a939042aeca66] 32.009 State is set to Confirmed reschedule loss detection timer for PTO over 171 millis, based on 32.180/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -209 millis, based on 31.799/App, because ackElicitingInFlight | RTT:34/17 32.009 Discarding pn space Handshake because HandshakeDone is received 32.009 loss detection timeout handler running Sending probe 0, because no ack since 31.672. Current RTT: 34/17. 32.009 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 32.263/App, because ackElicitingInFlight | RTT:34/17 32.009 -> Packet PA|2|S0|8900d10ca5d0344c|47|1 StreamFrame[0(CIB),0,17,fin] 32.028 -> Packet A|3|S0|8900d10ca5d0344c|36|1 AckFrame[7,4,2|Δ19] 32.059 <- (4) Packet A|10|S0|136bf50288ef7c9c|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 32.079 -> Packet A|4|S0|8900d10ca5d0344c|38|1 AckFrame[10,7,4,2|Δ19] 32.194 <- (5) Packet A|12|S0|136bf50288ef7c9c|29|2 PingFrame[] Padding(1) 32.214 -> Packet A|5|S0|8900d10ca5d0344c|40|1 AckFrame[12,10,7,4,2|Δ19] 32.246 <- (6) Packet A|13|S0|136bf50288ef7c9c|1055|1 StreamFrame[0(CIB),0,1024,fin] 32.246 Finished downloading https://server4:443/emebnfoagb at 21:18.901 on ClientConnection[653d33d36f2fc495/136bf50288ef7c9c(V1) with server4/193.167.100.100:443] 32.246 Closing ClientConnection[653d33d36f2fc495/136bf50288ef7c9c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.247 -> Packet A|6|S0|8900d10ca5d0344c|43|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,10,7,4,2|Δ0] 32.247 Creating connection with server4:443 with v1 32.247 Setting up connection for downloading https://server4:443/zdgpaxxtqs at 21:18.902 on ClientConnection[59f380a22e721ad2/79041890100a2ca2(V1) with server4/193.167.100.100:443] 32.247 Original destination connection id: 59f380a22e721ad2 (scid: 79041890100a2ca2) >- CryptoStream[I|ClientHello] 32.251 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.451/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.251 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.286 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 32.286 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.486/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 32.286 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 32.288 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.392/Handshake, because peerAwaitingAddressValidation | RTT:35/17 32.288 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 32.291 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.394/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.291 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.292 Starting downloading https://server4:443/zdgpaxxtqs at 21:18.946 on ClientConnection[59f380a22e721ad2/79041890100a2ca2(V1) with server4/193.167.100.100:443] 32.286 <- (1) Packet A|2|S0|79041890100a2ca2|260|2 CryptoFrame[0,89] Padding(140) -< CryptoStream[A|NewSessionTicket] 32.292 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.395/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.292 Discarding pn space Initial because first Handshake message is being sent 32.292 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.395/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.292 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|1de548b482db4e38|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0]] 32.325 <- (2) Packet A|4|S0|79041890100a2ca2|33|1 AckFrame[0|Δ1] 32.325 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.428/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.326 <- (3) Packet A|5|S0|79041890100a2ca2|1055|1 StreamFrame[0(CIB),0,1024,fin] 32.327 Finished downloading https://server4:443/zdgpaxxtqs at 21:18.981 on ClientConnection[59f380a22e721ad2/79041890100a2ca2(V1) with server4/193.167.100.100:443] 32.327 Closing ClientConnection[59f380a22e721ad2/79041890100a2ca2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.327 -> Packet A|1|S0|1de548b482db4e38|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 32.327 Creating connection with server4:443 with v1 32.328 Setting up connection for downloading https://server4:443/xlgmoqhbdj at 21:18.983 on ClientConnection[a3164399eb2f8110/b30e66f81ba5ea06(V1) with server4/193.167.100.100:443] 32.328 Original destination connection id: a3164399eb2f8110 (scid: b30e66f81ba5ea06) >- CryptoStream[I|ClientHello] 32.330 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.530/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.329 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.529 loss detection timeout handler running Sending probe 0, because no ack since 32.329. Current RTT: 100/25. 32.529 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.529 (Probe is an initial retransmit) 32.529 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.929/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.529 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.563 <- (1) Packet I|3|L|176|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 32.563 probe count not reset on ack because handshake not yet confirmed 32.563 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.963/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 32.563 <- (1) Packet H|4|L|763|1 CryptoFrame[0,716] 32.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 32.760/Handshake, because peerAwaitingAddressValidation | RTT:33/16 32.566 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 32.568 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 32.762/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 32.568 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.569 Starting downloading https://server4:443/xlgmoqhbdj at 21:19.223 on ClientConnection[a3164399eb2f8110/b30e66f81ba5ea06(V1) with server4/193.167.100.100:443] 32.563 <- (1) Packet A|5|S0|b30e66f81ba5ea06|261|2 CryptoFrame[0,89] Padding(141) 32.569 -> Packet H|1|L|46|1 AckFrame[4|Δ0] -< CryptoStream[A|NewSessionTicket] 32.569 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 32.666/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 32.569 Discarding pn space Initial because first Handshake message is being sent 32.569 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 32.666/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 32.569 -> Packet A|0|S0|76da73dba91bcf27|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 32.600 <- (2) Packet A|6|S0|b30e66f81ba5ea06|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|189cd21ceed7db32|96b94b53e67f2a67fef1bbbda3d850ab] 32.600 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 32.665/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 32.691/App, because ackElicitingInFlight | RTT:33/16 32.601 Discarding pn space Handshake because HandshakeDone is received 32.601 <- (3) Packet A|7|S0|b30e66f81ba5ea06|33|1 AckFrame[0|Δ1] 32.602 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 32.603 <- (4) Packet A|8|S0|b30e66f81ba5ea06|1055|1 StreamFrame[0(CIB),0,1024,fin] 32.603 -> Packet A|1|S0|76da73dba91bcf27|32|1 AckFrame[8-6|Δ2] 32.603 Finished downloading https://server4:443/xlgmoqhbdj at 21:19.258 on ClientConnection[a3164399eb2f8110/b30e66f81ba5ea06(V1) with server4/193.167.100.100:443] 32.603 Closing ClientConnection[a3164399eb2f8110/b30e66f81ba5ea06(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.604 -> Packet A|2|S0|76da73dba91bcf27|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-6|Δ0] 32.604 Creating connection with server4:443 with v1 32.604 Setting up connection for downloading https://server4:443/hmfiewtdsy at 21:19.259 on ClientConnection[e331a5c4a4249d22/451733f190e3be14(V1) with server4/193.167.100.100:443] 32.604 Original destination connection id: e331a5c4a4249d22 (scid: 451733f190e3be14) >- CryptoStream[I|ClientHello] 32.606 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.806/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.606 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.805 loss detection timeout handler running Sending probe 0, because no ack since 32.606. Current RTT: 100/25. 32.805 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.805 (Probe is an initial retransmit) 32.805 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 33.205/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.805 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.204 loss detection timeout handler running Sending probe 1, because no ack since 32.805. Current RTT: 100/25. 33.205 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 33.205 (Probe is an initial retransmit) 33.205 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 34.005/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.205 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.206 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 34.006/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.206 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.240 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ2] CryptoFrame[0,123] 33.241 probe count not reset on ack because handshake not yet confirmed 33.241 Retransmitting CryptoFrame[0,257] on level Initial 33.241 Cwnd(-): 6000; inflight: 1200 33.241 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 34.041/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.241 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 411 millis, based on 33.653/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 33.241 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 33.243 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 33.655/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 33.240 <- (1) Packet H|1|L|762|1 CryptoFrame[0,715] 33.243 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 33.245 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 33.657/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 33.245 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.246 Starting downloading https://server4:443/hmfiewtdsy at 21:19.900 on ClientConnection[e331a5c4a4249d22/451733f190e3be14(V1) with server4/193.167.100.100:443] 33.240 <- (1) Packet A|2|S0|451733f190e3be14|261|2 CryptoFrame[0,89] Padding(141) 33.246 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 33.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 33.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 33.246 Discarding pn space Initial because first Handshake message is being sent 33.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.246 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) reschedule loss detection timer for PTO over 102 millis, based on 33.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 33.246 -> Packet A|0|S0|5faa4e3f68d0c8cf|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 33.277 <- (3) Packet A|7|S0|451733f190e3be14|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f861bcd0dce77ce0|011c9c824f79ab302d4e70757f317e4c] 33.277 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 33.348/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 96 millis, based on 33.374/App, because ackElicitingInFlight | RTT:35/17 33.277 Discarding pn space Handshake because HandshakeDone is received 33.278 <- (4) Packet A|8|S0|451733f190e3be14|33|1 AckFrame[0|Δ1] 33.278 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.279 <- (5) Packet A|9|S0|451733f190e3be14|1055|1 StreamFrame[0(CIB),0,1024,fin] 33.280 -> Packet A|1|S0|5faa4e3f68d0c8cf|32|1 AckFrame[9-7|Δ2] 33.280 Finished downloading https://server4:443/hmfiewtdsy at 21:19.934 on ClientConnection[e331a5c4a4249d22/451733f190e3be14(V1) with server4/193.167.100.100:443] 33.280 Closing ClientConnection[e331a5c4a4249d22/451733f190e3be14(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.280 -> Packet A|2|S0|5faa4e3f68d0c8cf|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-7|Δ0] 33.280 Creating connection with server4:443 with v1 33.281 Setting up connection for downloading https://server4:443/qatgohkchs at 21:19.935 on ClientConnection[57811567be79a848/897894b2dbfc59e3(V1) with server4/193.167.100.100:443] 33.281 Original destination connection id: 57811567be79a848 (scid: 897894b2dbfc59e3) >- CryptoStream[I|ClientHello] 33.282 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.482/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.282 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.311 <- (6) Packet A|10|S0|451733f190e3be14|120|1 CryptoFrame[0,89] 33.311 -> Packet A|3|S0|5faa4e3f68d0c8cf|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-7|Δ0] 33.317 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 33.317 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.517/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 33.317 <- (1) Packet H|1|L|763|1 CryptoFrame[0,716] 33.320 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 33.423/Handshake, because peerAwaitingAddressValidation | RTT:35/17 33.319 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 33.321 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 33.424/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 33.321 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.322 Starting downloading https://server4:443/qatgohkchs at 21:19.976 on ClientConnection[57811567be79a848/897894b2dbfc59e3(V1) with server4/193.167.100.100:443] 33.317 <- (1) Packet A|2|S0|897894b2dbfc59e3|260|2 CryptoFrame[0,89] Padding(140) 33.322 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 33.322 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 33.425/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 33.322 Discarding pn space Initial because first Handshake message is being sent 33.322 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 33.425/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 33.322 -> Packet A|0|S0|e8e6decc1b5ff18e|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 33.424 loss detection timeout handler running Sending probe 0, because no ack since 33.321. Current RTT: 35/17. 33.424 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.424 (Probe is a handshake retransmit) 33.425 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 33.631/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 33.424 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 33.448 <- (2) Packet H|3|L|763|1 CryptoFrame[0,716] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.448 <- (2) Packet A|4|S0|897894b2dbfc59e3|120|1 CryptoFrame[0,89] 33.449 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] -< CryptoStream[A|NewSessionTicket] 33.468 -> Packet A|1|S0|e8e6decc1b5ff18e|34|1 AckFrame[4,2|Δ19] 33.630 loss detection timeout handler running Sending probe 1, because no ack since 33.322. Current RTT: 35/17. 33.630 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.630 (Probe is a handshake retransmit) 33.630 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 34.042/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 33.630 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 33.631 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 34.043/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 33.631 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 34.042 loss detection timeout handler running Sending probe 2, because no ack since 33.322. Current RTT: 35/17. 34.042 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 34.042 (Probe is a handshake retransmit) 34.043 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 823 millis, based on 34.867/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 34.042 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 34.044 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 823 millis, based on 34.868/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 34.044 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 34.376 <- (3) Packet A|8|S0|897894b2dbfc59e3|121|2 PingFrame[] CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 34.395 -> Packet A|2|S0|e8e6decc1b5ff18e|36|1 AckFrame[8,4,2|Δ19] 34.427 <- (4) Packet A|9|S0|897894b2dbfc59e3|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|8a2f5cc255fa2ffc|a17934c269a074691068cec379c760f1] 34.427 State is set to Confirmed reschedule loss detection timer for PTO over -80 millis, based on 34.346/App, because ackElicitingInFlight | RTT:35/17 34.427 loss detection timeout handler running Sending probe 3, because no ack since 33.322. Current RTT: 35/17. reschedule loss detection timer for PTO over -977 millis, based on 33.450/App, because ackElicitingInFlight | RTT:35/17 34.427 Discarding pn space Handshake because HandshakeDone is received 34.427 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 127 millis, based on 34.555/App, because ackElicitingInFlight | RTT:35/17 34.427 -> Packet PA|3|S0|e8e6decc1b5ff18e|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 127 millis, based on 34.556/App, because ackElicitingInFlight | RTT:35/17 34.428 -> Packet PA|4|S0|e8e6decc1b5ff18e|47|1 StreamFrame[0(CIB),0,17,fin] 34.446 -> Packet A|5|S0|e8e6decc1b5ff18e|36|1 AckFrame[9-8,4,2|Δ19] 34.461 <- (5) Packet A|11|S0|897894b2dbfc59e3|1055|1 StreamFrame[0(CIB),0,1024,fin] 34.462 Finished downloading https://server4:443/qatgohkchs at 21:21.116 on ClientConnection[57811567be79a848/897894b2dbfc59e3(V1) with server4/193.167.100.100:443] 34.462 Closing ClientConnection[57811567be79a848/897894b2dbfc59e3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 34.462 -> Packet A|6|S0|e8e6decc1b5ff18e|41|2 ConnectionCloseFrame[0|0|] AckFrame[11,9-8,4,2|Δ0] 34.462 Creating connection with server4:443 with v1 34.463 Setting up connection for downloading https://server4:443/asktwqzcnd at 21:21.118 on ClientConnection[9bc09467e04d9e17/2554f38e300edd40(V1) with server4/193.167.100.100:443] 34.463 Original destination connection id: 9bc09467e04d9e17 (scid: 2554f38e300edd40) >- CryptoStream[I|ClientHello] 34.464 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 34.664/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.464 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.663 loss detection timeout handler running Sending probe 0, because no ack since 34.464. Current RTT: 100/25. 34.663 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 34.663 (Probe is an initial retransmit) 34.664 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 35.064/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.664 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.697 <- (1) Packet I|3|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 34.697 probe count not reset on ack because handshake not yet confirmed 34.698 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 35.098/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 34.697 <- (1) Packet H|4|L|762|1 CryptoFrame[0,715] 34.700 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 34.894/Handshake, because peerAwaitingAddressValidation | RTT:33/16 34.700 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 34.702 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 34.896/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.702 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 34.702 Starting downloading https://server4:443/asktwqzcnd at 21:21.357 on ClientConnection[9bc09467e04d9e17/2554f38e300edd40(V1) with server4/193.167.100.100:443] 34.697 <- (1) Packet A|5|S0|2554f38e300edd40|261|2 CryptoFrame[0,89] Padding(141) 34.702 -> Packet H|1|L|46|1 AckFrame[4|Δ0] -< CryptoStream[A|NewSessionTicket] 34.702 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.799/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.702 Discarding pn space Initial because first Handshake message is being sent 34.702 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.799/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.702 -> Packet A|0|S0|e59a52576b7c59b3|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 34.799 loss detection timeout handler running Sending probe 0, because no ack since 34.702. Current RTT: 33/16. 34.799 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 34.799 (Probe is a handshake retransmit) 34.799 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 34.993/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.799 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 34.812 <- (2) Packet H|6|L|45|2 PingFrame[] Padding(1) 34.812 <- (2) Packet A|7|S0|2554f38e300edd40|120|1 CryptoFrame[0,89] -< CryptoStream[A|NewSessionTicket] 34.812 -> Packet H|3|L|48|1 AckFrame[6,4|Δ0] 34.831 -> Packet A|1|S0|e59a52576b7c59b3|34|1 AckFrame[7,5|Δ19] 34.992 loss detection timeout handler running Sending probe 1, because no ack since 34.702. Current RTT: 33/16. 34.992 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 34.992 (Probe is a handshake retransmit) 34.992 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 35.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.992 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 34.993 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 35.381/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.993 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 35.187 <- (3) Packet A|10|S0|2554f38e300edd40|29|2 PingFrame[] Padding(1) 35.206 -> Packet A|2|S0|e59a52576b7c59b3|36|1 AckFrame[10,7,5|Δ19] 35.238 <- (4) Packet A|11|S0|2554f38e300edd40|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|681f2a1c560dcd9c|c57b753a4c7574d2d987364478ed2aaa] 35.238 State is set to Confirmed reschedule loss detection timer for PTO over -47 millis, based on 35.190/App, because ackElicitingInFlight | RTT:33/16 35.238 loss detection timeout handler running Sending probe 2, because no ack since 34.702. Current RTT: 33/16. reschedule loss detection timer for PTO over -413 millis, based on 34.824/App, because ackElicitingInFlight | RTT:33/16 35.238 Discarding pn space Handshake because HandshakeDone is received 35.238 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 35.482/App, because ackElicitingInFlight | RTT:33/16 35.238 -> Packet PA|3|S0|e59a52576b7c59b3|47|1 StreamFrame[0(CIB),0,17,fin] 35.258 -> Packet A|4|S0|e59a52576b7c59b3|36|1 AckFrame[11-10,7,5|Δ19] 35.270 <- (5) Packet A|12|S0|2554f38e300edd40|33|1 AckFrame[3-1|Δ1] 35.271 Cwnd(-): 6000; inflight: 0 35.271 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 35.271 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 35.381/App, because ackElicitingInFlight | RTT:33/13 35.271 -> Packet A|5|S0|e59a52576b7c59b3|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[11|Δ0] 35.272 <- (6) Packet A|13|S0|2554f38e300edd40|1055|1 StreamFrame[0(CIB),0,1024,fin] 35.272 Finished downloading https://server4:443/asktwqzcnd at 21:21.927 on ClientConnection[9bc09467e04d9e17/2554f38e300edd40(V1) with server4/193.167.100.100:443] 35.272 Closing ClientConnection[9bc09467e04d9e17/2554f38e300edd40(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 35.273 -> Packet A|6|S0|e59a52576b7c59b3|35|2 ConnectionCloseFrame[0|0|] AckFrame[13-11|Δ0] 35.273 Creating connection with server4:443 with v1 35.273 Setting up connection for downloading https://server4:443/kbjwckuqlh at 21:21.928 on ClientConnection[eded0cb1a9b305d7/52a8bc0a4449eecd(V1) with server4/193.167.100.100:443] 35.273 Original destination connection id: eded0cb1a9b305d7 (scid: 52a8bc0a4449eecd) >- CryptoStream[I|ClientHello] 35.275 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 35.475/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.274 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.303 <- (7) Packet A|14|S0|2554f38e300edd40|35|1 AckFrame[5,3-1|Δ1] 35.303 -> Packet A|7|S0|e59a52576b7c59b3|35|2 ConnectionCloseFrame[0|0|] AckFrame[13-11|Δ0] 35.309 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 35.310 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 35.510/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 35.309 <- (1) Packet H|1|L|764|1 CryptoFrame[0,717] 35.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 35.414/Handshake, because peerAwaitingAddressValidation | RTT:34/17 35.312 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 35.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 35.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 35.314 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.314 Starting downloading https://server4:443/kbjwckuqlh at 21:21.969 on ClientConnection[eded0cb1a9b305d7/52a8bc0a4449eecd(V1) with server4/193.167.100.100:443] 35.309 <- (1) Packet A|2|S0|52a8bc0a4449eecd|259|2 CryptoFrame[0,89] Padding(139) 35.314 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 35.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 35.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 35.314 Discarding pn space Initial because first Handshake message is being sent 35.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 35.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 35.314 -> Packet A|0|S0|a09bd3f71809de09|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 35.348 <- (2) Packet A|5|S0|52a8bc0a4449eecd|1055|1 StreamFrame[0(CIB),0,1024,fin] 35.348 Finished downloading https://server4:443/kbjwckuqlh at 21:22.003 on ClientConnection[eded0cb1a9b305d7/52a8bc0a4449eecd(V1) with server4/193.167.100.100:443] 35.348 Closing ClientConnection[eded0cb1a9b305d7/52a8bc0a4449eecd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 35.349 -> Packet A|1|S0|a09bd3f71809de09|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 35.349 Creating connection with server4:443 with v1 35.349 Setting up connection for downloading https://server4:443/jiasgfddhh at 21:22.004 on ClientConnection[6b9d413f0e4bb763/683c62c60e8970a3(V1) with server4/193.167.100.100:443] 35.349 Original destination connection id: 6b9d413f0e4bb763 (scid: 683c62c60e8970a3) >- CryptoStream[I|ClientHello] 35.350 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 35.550/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.350 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.550 loss detection timeout handler running Sending probe 0, because no ack since 35.350. Current RTT: 100/25. 35.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 35.550 (Probe is an initial retransmit) 35.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 35.950/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.550 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.787 <- (1) Packet I|3|L|171|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 35.787 <- (1) Packet H|4|L|762|1 CryptoFrame[0,715] 35.790 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 36.190/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.790 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 35.792 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 36.192/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.792 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.792 Starting downloading https://server4:443/jiasgfddhh at 21:22.446 on ClientConnection[6b9d413f0e4bb763/683c62c60e8970a3(V1) with server4/193.167.100.100:443] 35.787 <- (1) Packet A|5|S0|683c62c60e8970a3|267|2 CryptoFrame[0,89] Padding(147) 35.792 -> Packet H|1|L|46|1 AckFrame[4|Δ0] -< CryptoStream[A|NewSessionTicket] 35.792 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 35.992/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.792 Discarding pn space Initial because first Handshake message is being sent 35.792 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 35.992/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.792 -> Packet A|0|S0|c295867bf2880019|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 35.823 <- (2) Packet A|6|S0|683c62c60e8970a3|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|dce9f05c014798c6|6968efac791673fff482abafa8995811] 35.823 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 35.992/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 36.017/App, because ackElicitingInFlight | RTT:100/25 35.823 Discarding pn space Handshake because HandshakeDone is received 35.824 <- (3) Packet A|7|S0|683c62c60e8970a3|33|1 AckFrame[0|Δ1] 35.825 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 35.826 <- (4) Packet A|8|S0|683c62c60e8970a3|1055|1 StreamFrame[0(CIB),0,1024,fin] 35.826 -> Packet A|1|S0|c295867bf2880019|32|1 AckFrame[8-6|Δ2] 35.826 Finished downloading https://server4:443/jiasgfddhh at 21:22.481 on ClientConnection[6b9d413f0e4bb763/683c62c60e8970a3(V1) with server4/193.167.100.100:443] 35.826 Closing ClientConnection[6b9d413f0e4bb763/683c62c60e8970a3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 35.826 -> Packet A|2|S0|c295867bf2880019|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-6|Δ0] 35.827 Creating connection with server4:443 with v1 35.827 Setting up connection for downloading https://server4:443/jrddrpakdk at 21:22.482 on ClientConnection[64983aeb4f89bf09/29604f3b2426b50f(V1) with server4/193.167.100.100:443] 35.827 Original destination connection id: 64983aeb4f89bf09 (scid: 29604f3b2426b50f) >- CryptoStream[I|ClientHello] 35.828 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.028/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.828 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.863 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 35.863 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.063/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 35.863 <- (1) Packet H|1|L|761|1 CryptoFrame[0,714] 35.865 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 35.967/Handshake, because peerAwaitingAddressValidation | RTT:34/17 35.865 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 35.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 35.970/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 35.868 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.868 Starting downloading https://server4:443/jrddrpakdk at 21:22.523 on ClientConnection[64983aeb4f89bf09/29604f3b2426b50f(V1) with server4/193.167.100.100:443] 35.868 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 35.863 <- (1) Packet A|2|S0|29604f3b2426b50f|262|2 CryptoFrame[0,89] Padding(142) -< CryptoStream[A|NewSessionTicket] 35.869 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 35.971/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 35.869 Discarding pn space Initial because first Handshake message is being sent 35.869 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 35.971/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 35.869 -> Packet A|0|S0|ae0ce5200b160310|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 35.899 <- (2) Packet A|3|S0|29604f3b2426b50f|56|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|37dcd9da9e9218a2|eb6120e443a6933f1322446372bdea8b] 35.900 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 35.970/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 96 millis, based on 35.996/App, because ackElicitingInFlight | RTT:34/17 35.900 Discarding pn space Handshake because HandshakeDone is received 35.900 <- (3) Packet A|4|S0|29604f3b2426b50f|33|1 AckFrame[0|Δ1] 35.901 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 35.902 <- (4) Packet A|5|S0|29604f3b2426b50f|1055|1 StreamFrame[0(CIB),0,1024,fin] 35.902 -> Packet A|1|S0|ae0ce5200b160310|32|1 AckFrame[5-3|Δ2] 35.902 Finished downloading https://server4:443/jrddrpakdk at 21:22.557 on ClientConnection[64983aeb4f89bf09/29604f3b2426b50f(V1) with server4/193.167.100.100:443] 35.902 Closing ClientConnection[64983aeb4f89bf09/29604f3b2426b50f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 35.902 -> Packet A|2|S0|ae0ce5200b160310|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0]