d14512411c4f0cfe: No root crt list specified -- certificate will not be verified. d14512411c4f0cfe: Sending ALPN list (1): hq-interop d14512411c4f0cfe: Sending transport parameter TLS extension (85 bytes): d14512411c4f0cfe: Extension list (85 bytes): d14512411c4f0cfe: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 d14512411c4f0cfe: Extension type: 4 (initial_max_data), length 4, 80100000 d14512411c4f0cfe: Extension type: 8 (max_streams_bidi), length 2, 4200 d14512411c4f0cfe: Extension type: 1 (idle_timeout), length 4, 8002bf20 d14512411c4f0cfe: Extension type: 3 (max_packet_size), length 2, 45a0 d14512411c4f0cfe: Extension type: 9 (max_streams_uni), length 2, 4200 d14512411c4f0cfe: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 d14512411c4f0cfe: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff d14512411c4f0cfe: Extension type: 14 (active_connection_id_limit), length 1, 08 d14512411c4f0cfe: Extension type: 11 (max_ack_delay), length 1, 0a d14512411c4f0cfe: Extension type: 15 (hcid), length 8, 55b4f92f72439446 d14512411c4f0cfe: Extension type: 6537 (unknown), length 4, 80004512 d14512411c4f0cfe: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 d14512411c4f0cfe: Extension type: 29016 (enable_time_stamp), length 1, 03 d14512411c4f0cfe: Extension type: 10930 (grease_quic_bit), length 0 d14512411c4f0cfe: Preparing GET on stream 0 for /chilly-cruel-wolverine d14512411c4f0cfe: Sending packet type: 2 (initial), S0, Q1, Version 1, d14512411c4f0cfe: , <55b4f92f72439446>, Seq: 125571, pl: 441 d14512411c4f0cfe: Token length: 0 d14512411c4f0cfe: Prepared 421 bytes d14512411c4f0cfe: ping, 1 bytes d14512411c4f0cfe: crypto_hs, offset 0, length 416: 0100019c0303d3fc... d14512411c4f0cfe: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, d14512411c4f0cfe: , <55b4f92f72439446>, Seq: 0, pl: 760 d14512411c4f0cfe: Prepared 740 bytes d14512411c4f0cfe: stream 0, offset 0, length 29, fin = 1: 474554202f636869... d14512411c4f0cfe: padding, 708 bytes d14512411c4f0cfe: Sending 1252 bytes to 193.167.100.100:443 at T=0.001909 (1f957918) d14512411c4f0cfe: T= 0.252205, Lost packet type 2, number 125571, size 451, DCID <>, reason: timer d14512411c4f0cfe: Sending packet type: 2 (initial), S0, Q1, Version 1, d14512411c4f0cfe: , <55b4f92f72439446>, Seq: 125572, pl: 441 d14512411c4f0cfe: Token length: 0 d14512411c4f0cfe: Prepared 421 bytes d14512411c4f0cfe: ping, 1 bytes d14512411c4f0cfe: crypto_hs, offset 0, length 416: 0100019c0303d3fc... d14512411c4f0cfe: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, d14512411c4f0cfe: , <55b4f92f72439446>, Seq: 1, pl: 760 d14512411c4f0cfe: Prepared 740 bytes d14512411c4f0cfe: padding, 740 bytes d14512411c4f0cfe: Sending 1252 bytes to 193.167.100.100:443 at T=0.252205 (1f994ad0) d14512411c4f0cfe: Receiving 1200 bytes from 193.167.100.100:443 at T=0.286464 (1f99d0a3) d14512411c4f0cfe: Receiving packet type: 2 (initial), S0, Q1, Version 1, d14512411c4f0cfe: <55b4f92f72439446>, <3c216366a6db0ae5>, Seq: 0, pl: 160 d14512411c4f0cfe: Token length: 0 d14512411c4f0cfe: Decrypted 142 bytes d14512411c4f0cfe: ack (nb=0), 125572 d14512411c4f0cfe: crypto_hs, offset 0, length 129: 0200007d03037d9e... d14512411c4f0cfe: Receiving packet type: 4 (handshake), S0, Q1, Version 1, d14512411c4f0cfe: <55b4f92f72439446>, <3c216366a6db0ae5>, Seq: 1, pl: 210 d14512411c4f0cfe: Decrypted 192 bytes d14512411c4f0cfe: crypto_hs, offset 0, length 188: 0800008400820010... d14512411c4f0cfe: Received transport parameter TLS extension (105 bytes): d14512411c4f0cfe: Extension list (105 bytes): d14512411c4f0cfe: Extension type: 0 (ocid), length 8, d14512411c4f0cfe d14512411c4f0cfe: Extension type: 1 (idle_timeout), length 4, 8000ea60 d14512411c4f0cfe: Extension type: 2 (stateless_reset_token), length 16, 901de724e1c14eacb4955a7d6e9dde99 d14512411c4f0cfe: Extension type: 4 (initial_max_data), length 4, 80100000 d14512411c4f0cfe: Extension type: 5 (max_stream_data_bidi_local), length 4, 80100000 d14512411c4f0cfe: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80100000 d14512411c4f0cfe: Extension type: 7 (max_stream_data_uni), length 4, 80100000 d14512411c4f0cfe: Extension type: 8 (max_streams_bidi), length 2, 4080 d14512411c4f0cfe: Extension type: 9 (max_streams_uni), length 2, 4080 d14512411c4f0cfe: Extension type: 10 (ack_delay_exponent), length 1, 03 d14512411c4f0cfe: Extension type: 11 (max_ack_delay), length 1, 19 d14512411c4f0cfe: Extension type: 14 (active_connection_id_limit), length 1, 08 d14512411c4f0cfe: Extension type: 15 (hcid), length 8, 3c216366a6db0ae5 d14512411c4f0cfe: Extension type: 17 (version_negotiation), length 12, 00000001000000016b3343cf d14512411c4f0cfe: Extension type: 32 (max_datagram_frame_size), length 4, 80010000 d14512411c4f0cfe: Receiving packet type: 6 (1rtt protected), S0, Q1, d14512411c4f0cfe: <55b4f92f72439446>, Seq: 2 (2), Phi: 0, d14512411c4f0cfe: Decrypted 752 bytes d14512411c4f0cfe: crypto_hs, offset 0, length 89: 0400005500015180... d14512411c4f0cfe: padding, 659 bytes d14512411c4f0cfe: T= 0.286464, cwin: 15811,flight: 1570,nb_ret: 1,rtt_min: 34259,rtt: 34259,rtt_var: 17129,max_ack_delay: 0,state: 10 d14512411c4f0cfe: The session was properly resumed! d14512411c4f0cfe: Zero RTT data is accepted! d14512411c4f0cfe: Negotiated ALPN: hq-interop d14512411c4f0cfe: Sending packet type: 4 (handshake), S0, Q1, Version 1, d14512411c4f0cfe: <3c216366a6db0ae5>, <55b4f92f72439446>, Seq: 0, pl: 80 d14512411c4f0cfe: Prepared 60 bytes d14512411c4f0cfe: ack (nb=0), 1 d14512411c4f0cfe: crypto_hs, offset 0, length 52: 14000030c917ad3e... d14512411c4f0cfe: T= 0.286913, Lost packet type 5, number 0, size 769, DCID <3c216366a6db0ae5>, reason: timer d14512411c4f0cfe: Sending packet type: 6 (1rtt protected), S1, Q1, d14512411c4f0cfe: <3c216366a6db0ae5>, Seq: 2 (2), Phi: 0, d14512411c4f0cfe: Prepared 285 bytes d14512411c4f0cfe: ack (nb=0), 2 d14512411c4f0cfe: new_connection_id[1]: 0x2d7d35389ee92f08, 745fa8c5277dabd34c0b885fc1a4cbc5 d14512411c4f0cfe: new_connection_id[2]: 0x560690973628c441, f8b3c4149dca52d79c28c09f6c57d780 d14512411c4f0cfe: new_connection_id[3]: 0x696f794727b336fd, 46fcf31732417acfd98960716d32f225 d14512411c4f0cfe: new_connection_id[4]: 0x433ca112b1ee17a9, 4819cd38bc80c79e629178101bcacd68 d14512411c4f0cfe: new_connection_id[5]: 0x0c136044ebfe9542, 9dc86d4f81308b299ea992d7a811c104 d14512411c4f0cfe: new_connection_id[6]: 0xd884af47ff09edb5, ee4a2f985d66a2c3cdadc4208081ba8c d14512411c4f0cfe: new_connection_id[7]: 0x579da4679ff8a9ce, 2a602cdceb819c0f7e85bd521b2af364 d14512411c4f0cfe: stream 0, offset 0, length 29, fin = 1: 474554202f636869... d14512411c4f0cfe: padding, 52 bytes d14512411c4f0cfe: T= 0.286913, cwin: 15811,flight: 1201,nb_ret: 2,rtt_min: 34259,rtt: 34259,rtt_var: 17129,max_ack_delay: 0,state: 13 d14512411c4f0cfe: Sending 416 bytes to 193.167.100.100:443 at T=0.286913 (1f99d264) d14512411c4f0cfe: Connection established. Version = 1, I-CID: d14512411c4f0cfe, verified: 1 d14512411c4f0cfe: Receiving 33 bytes from 193.167.100.100:443 at T=0.319040 (1f9a4fe3) d14512411c4f0cfe: Receiving packet type: 6 (1rtt protected), S1, Q1, d14512411c4f0cfe: <55b4f92f72439446>, Seq: 4 (4), Phi: 0, d14512411c4f0cfe: Decrypted 6 bytes d14512411c4f0cfe: ack (nb=0), 1-2 d14512411c4f0cfe: T= 0.319040, cwin: 16875,flight: 0,nb_ret: 2,rtt_min: 32127,rtt: 33992,rtt_var: 13379,max_ack_delay: 0,state: 14 d14512411c4f0cfe: Receiving 1055 bytes from 193.167.100.100:443 at T=0.338369 (1f9a9b64) d14512411c4f0cfe: Receiving packet type: 6 (1rtt protected), S1, Q1, d14512411c4f0cfe: <55b4f92f72439446>, Seq: 5 (5), Phi: 0, d14512411c4f0cfe: Decrypted 1028 bytes d14512411c4f0cfe: stream 0, offset 0, length 1024, fin = 1: 523b30fed0bc85cf... d14512411c4f0cfe: T= 0.338369, cwin: 16875,flight: 0,nb_ret: 2,rtt_min: 32127,rtt: 33992,rtt_var: 13379,max_ack_delay: 0,state: 14 d14512411c4f0cfe: All done, Closing the connection. d14512411c4f0cfe: Sending packet type: 6 (1rtt protected), S0, Q1, d14512411c4f0cfe: <3c216366a6db0ae5>, Seq: 3 (3), Phi: 0, d14512411c4f0cfe: Prepared 10 bytes d14512411c4f0cfe: ack (nb=1), 4-5, 2 d14512411c4f0cfe: application_close, Error 0x0000, Reason length 0 d14512411c4f0cfe: Sending 36 bytes to 193.167.100.100:443 at T=0.338595 (1f9a9c46) d14512411c4f0cfe: Out of 2 zero RTT packets, 1 were acked by the server. d14512411c4f0cfe: Received 1024 bytes in 0.636430 seconds, 0.012872 Mbps. d14512411c4f0cfe: Sent 29 bytes in 0.636430 seconds, 0.000365 Mbps.