0.000 Creating connection with server4:443 with v1 0.080 Setting up connection for downloading https://server4:443/fperrqnsgq at 32:33.748 on ClientConnection[888d3e9c4bf12797/e77bc9a73d75ebbc(V1) with server4/193.167.100.100:443] 0.082 Original destination connection id: 888d3e9c4bf12797 (scid: e77bc9a73d75ebbc) >- CryptoStream[I|ClientHello] 0.274 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.475/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.269 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.314 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ2] CryptoFrame[0,123] 0.331 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.531/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.361 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 132 millis, based on 0.494/Handshake, because peerAwaitingAddressValidation | RTT:45/22 0.358 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 0.314 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) >- CryptoStream[H|Finished] 0.389 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 132 millis, based on 0.522/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:45/22 0.389 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.392 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 0.394 Starting downloading https://server4:443/fperrqnsgq at 32:34.077 on ClientConnection[888d3e9c4bf12797/e77bc9a73d75ebbc(V1) with server4/193.167.100.100:443] 0.399 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 132 millis, based on 0.532/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:45/22 0.399 Discarding pn space Initial because first Handshake message is being sent 0.416 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 132 millis, based on 0.549/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:45/22 0.416 -> Packet A|0|S0|5ea89e6c272d3ab8|47|1 StreamFrame[0(CIB),0,17,fin] 0.548 loss detection timeout handler running Sending probe 0, because no ack since 0.389. Current RTT: 45/22. 0.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.550 (Probe is a handshake retransmit) 0.551 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 265 millis, based on 0.817/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:45/22 0.551 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 0.584 <- (2) Packet H|1|L|46|1 AckFrame[2-1|Δ0] 0.586 probe count not reset on ack because handshake not yet confirmed 0.587 Retransmitting CryptoFrame[0,36] on level Handshake 0.588 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 265 millis, based on 0.854/Handshake, because ackElicitingInFlight | RTT:45/22 0.588 -> Packet H|3|L|80|1 CryptoFrame[0,36] 0.589 Cwnd(-): 6000; inflight: 127 0.589 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 264 millis, based on 0.854/Handshake, because ackElicitingInFlight | RTT:45/22 0.584 <- (2) Packet A|0|S0|e77bc9a73d75ebbc|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 0.584 <- (3) Packet A|1|S0|e77bc9a73d75ebbc|94|3 HandshakeDoneFrame[] NewTokenFrame[b72dad30d1406f8aa2cbc356c33ea29b036e66dc7cfebecd8ec1aa8199a6c6ccf6e662cb3f] NewConnectionIdFrame[1,<0|ddb016972c61ebdf|bf1a5e0c0f61115de0fcb7aa1905ed4f] 0.595 State is set to Confirmed reschedule loss detection timer for PTO over 116 millis, based on 0.712/App, because ackElicitingInFlight | RTT:43/20 reschedule loss detection timer for PTO over -31 millis, based on 0.564/App, because ackElicitingInFlight | RTT:43/20 0.596 loss detection timeout handler running 0.596 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 0.416. Current RTT: 43/20. 0.596 (Probe is retransmit on level App) 0.596 -> Packet A|1|S0|5ea89e6c272d3ab8|32|1 AckFrame[1-0|Δ4] reschedule loss detection timer for PTO over 295 millis, based on 0.893/App, because ackElicitingInFlight | RTT:43/20 0.597 -> Packet PA|2|S0|5ea89e6c272d3ab8|47|1 StreamFrame[0(CIB),0,17,fin] 0.892 loss detection timeout handler running Sending probe 1, because no ack since 0.597. Current RTT: 43/20. 0.893 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 591 millis, based on 1.485/App, because ackElicitingInFlight | RTT:43/20 0.893 -> Packet PA|3|S0|5ea89e6c272d3ab8|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 591 millis, based on 1.486/App, because ackElicitingInFlight | RTT:43/20 0.894 -> Packet PA|4|S0|5ea89e6c272d3ab8|47|1 StreamFrame[0(CIB),0,17,fin] 0.926 <- (4) Packet A|2|S0|e77bc9a73d75ebbc|33|1 AckFrame[4-3,1|Δ0] 0.927 Cwnd(-): 3000; inflight: 0 0.927 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 0.927 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 138 millis, based on 1.067/App, because ackElicitingInFlight | RTT:42/18 0.928 -> Packet A|5|S0|5ea89e6c272d3ab8|47|1 StreamFrame[0(CIB),0,17,fin] 0.927 <- (5) Packet A|3|S0|e77bc9a73d75ebbc|1054|1 StreamFrame[0(CIB),0,1024,fin] 0.930 Finished downloading https://server4:443/fperrqnsgq at 32:34.614 on ClientConnection[888d3e9c4bf12797/e77bc9a73d75ebbc(V1) with server4/193.167.100.100:443] 0.932 Closing ClientConnection[888d3e9c4bf12797/e77bc9a73d75ebbc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.934 Creating connection with server4:443 with v1 0.935 Setting up connection for downloading https://server4:443/slhddpztzb at 32:34.619 on ClientConnection[de91e9b61992dd30/f15f64391cbd8d6f(V1) with server4/193.167.100.100:443] 0.935 Original destination connection id: de91e9b61992dd30 (scid: f15f64391cbd8d6f) >- CryptoStream[I|ClientHello] 0.938 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.138/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.938 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.934 -> Packet A|6|S0|5ea89e6c272d3ab8|36|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ4] 1.138 loss detection timeout handler running Sending probe 0, because no ack since 0.938. Current RTT: 100/25. 1.138 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.138 (Probe is an initial retransmit) 1.139 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.539/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.139 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.174 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 1.174 probe count not reset on ack because handshake not yet confirmed 1.175 Retransmitting CryptoFrame[0,257] on level Initial 1.175 Cwnd(-): 6000; inflight: 0 1.175 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.575/Initial, because peerAwaitingAddressValidation | RTT:100/25 1.175 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 1.379/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.175 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 1.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.174 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) reschedule loss detection timer for PTO over 203 millis, based on 1.383/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.179 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 1.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 1.387/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.182 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.184 Starting downloading https://server4:443/slhddpztzb at 32:34.868 on ClientConnection[de91e9b61992dd30/f15f64391cbd8d6f(V1) with server4/193.167.100.100:443] 1.184 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.184 -> Packet H|1|L|46|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 101 millis, based on 1.286/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.184 Discarding pn space Initial because first Handshake message is being sent 1.185 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.287/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.185 -> Packet A|0|S0|267f032ade5c23b0|47|1 StreamFrame[0(CIB),0,17,fin] 1.188 <- (6) Packet A|4|S0|e77bc9a73d75ebbc|1054|1 StreamFrame[0(CIB),0,1024,fin] 1.189 <- (7) Packet A|5|S0|e77bc9a73d75ebbc|1054|1 StreamFrame[0(CIB),0,1024,fin] 1.190 -> Packet A|7|S0|5ea89e6c272d3ab8|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 1.190 -> Packet A|8|S0|5ea89e6c272d3ab8|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 1.210 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.221 <- (8) Packet A|6|S0|e77bc9a73d75ebbc|30|1 ConnectionCloseFrame[0|1|] 1.286 loss detection timeout handler running Sending probe 0, because no ack since 1.182. Current RTT: 34/17. 1.286 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.286 (Probe is a handshake retransmit) 1.287 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 1.491/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.287 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 1.319 <- (3) Packet H|2|L|46|1 AckFrame[2-1|Δ0] 1.320 probe count not reset on ack because handshake not yet confirmed 1.320 Retransmitting CryptoFrame[0,36] on level Handshake 1.320 Cwnd(-): 3000; inflight: 47 1.320 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 1.320 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 1.320 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 203 millis, based on 1.524/Handshake, because ackElicitingInFlight | RTT:34/13 1.320 -> Packet H|3|L|80|1 CryptoFrame[0,36] 1.319 <- (3) Packet A|0|S0|f15f64391cbd8d6f|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.321 <- (4) Packet A|2|S0|f15f64391cbd8d6f|1054|1 StreamFrame[0(CIB),0,1024,fin] 1.322 Finished downloading https://server4:443/slhddpztzb at 32:35.007 on ClientConnection[de91e9b61992dd30/f15f64391cbd8d6f(V1) with server4/193.167.100.100:443] 1.322 -> Packet A|1|S0|267f032ade5c23b0|33|1 AckFrame[2,0|Δ0] 1.322 Closing ClientConnection[de91e9b61992dd30/f15f64391cbd8d6f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.323 -> Packet A|2|S0|267f032ade5c23b0|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 1.323 Creating connection with server4:443 with v1 1.324 Setting up connection for downloading https://server4:443/yhuevgpeai at 32:35.008 on ClientConnection[963f6f54acf13260/1039a4b6da546a91(V1) with server4/193.167.100.100:443] 1.324 Original destination connection id: 963f6f54acf13260 (scid: 1039a4b6da546a91) >- CryptoStream[I|ClientHello] 1.327 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.527/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.327 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.354 <- (5) Packet A|3|S0|f15f64391cbd8d6f|30|1 ConnectionCloseFrame[0|1|] 1.361 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 1.362 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.562/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.365 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.361 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,729] Padding(249) reschedule loss detection timer for PTO over 101 millis, based on 1.467/Handshake, because peerAwaitingAddressValidation | RTT:34/17 1.365 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 1.369 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.471/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.368 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.369 Starting downloading https://server4:443/yhuevgpeai at 32:35.054 on ClientConnection[963f6f54acf13260/1039a4b6da546a91(V1) with server4/193.167.100.100:443] 1.369 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.472/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.370 Discarding pn space Initial because first Handshake message is being sent 1.370 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.472/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.370 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|713e9050dc8a1b08|47|1 StreamFrame[0(CIB),0,17,fin]] 1.402 <- (2) Packet A|1|S0|1039a4b6da546a91|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b7ee93b1d251f9466110b4621921541aacd83ac7491f83d6d85b894210957182cf9f2cf4e1] NewConnectionIdFrame[1,<0|646a7068db959096|31901070a86c6354cd7f37df740525a6] 1.404 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.506/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.404 State is set to Confirmed reschedule loss detection timer for PTO over 50 millis, based on 1.454/Handshake, because ackElicitingInFlight | RTT:34/13 1.404 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.404 Discarding pn space Handshake because HandshakeDone is received 1.424 -> Packet A|1|S0|713e9050dc8a1b08|32|1 AckFrame[1|Δ19] 1.542 <- (3) Packet A|5|S0|1039a4b6da546a91|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.563 -> Packet A|2|S0|713e9050dc8a1b08|34|1 AckFrame[5,1|Δ19] 1.777 <- (4) Packet A|6|S0|1039a4b6da546a91|1054|1 StreamFrame[0(CIB),0,1024,fin] 1.778 <- (5) Packet A|7|S0|1039a4b6da546a91|544|1 CryptoFrame[0,514] 1.778 Finished downloading https://server4:443/yhuevgpeai at 32:35.463 on ClientConnection[963f6f54acf13260/1039a4b6da546a91(V1) with server4/193.167.100.100:443] 1.778 Closing ClientConnection[963f6f54acf13260/1039a4b6da546a91(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.779 Creating connection with server4:443 with v1 1.780 Setting up connection for downloading https://server4:443/xgwoelnhxm at 32:35.464 on ClientConnection[fdad964e5731cb9a/45d04ffb69674aa8(V1) with server4/193.167.100.100:443] 1.780 Original destination connection id: fdad964e5731cb9a (scid: 45d04ffb69674aa8) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.779 -> Packet A|3|S0|713e9050dc8a1b08|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,1|Δ0] >- CryptoStream[I|ClientHello] 1.783 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.983/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.782 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.800 -> Packet A|4|S0|713e9050dc8a1b08|34|1 AckFrame[7-5,1|Δ19] 1.812 <- (6) Packet A|8|S0|1039a4b6da546a91|30|1 ConnectionCloseFrame[0|1|] 1.982 loss detection timeout handler running Sending probe 0, because no ack since 1.782. Current RTT: 100/25. 1.982 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.982 (Probe is an initial retransmit) 1.983 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.383/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.983 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.018 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 2.018 probe count not reset on ack because handshake not yet confirmed 2.018 Retransmitting CryptoFrame[0,257] on level Initial 2.019 Cwnd(-): 6000; inflight: 0 2.019 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.419/Initial, because peerAwaitingAddressValidation | RTT:100/25 2.019 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 2.223/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.019 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 2.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.018 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,731] Padding(248) reschedule loss detection timer for PTO over 203 millis, based on 2.226/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.022 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 2.025 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 2.229/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.025 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.026 Starting downloading https://server4:443/xgwoelnhxm at 32:35.710 on ClientConnection[fdad964e5731cb9a/45d04ffb69674aa8(V1) with server4/193.167.100.100:443] 2.026 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 2.026 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.128/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.026 Discarding pn space Initial because first Handshake message is being sent 2.027 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.129/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.027 -> Packet A|0|S0|a7969e51de8ea4a1|47|1 StreamFrame[0(CIB),0,17,fin] 2.052 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.057 <- (3) Packet H|2|L|46|1 AckFrame[0|Δ0] 2.058 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.058 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 2.057 <- (3) Packet A|0|S0|45d04ffb69674aa8|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.058 <- (4) Packet A|1|S0|45d04ffb69674aa8|94|3 HandshakeDoneFrame[] NewTokenFrame[b7969fc283cb82c5056b6b399a2399a61ab173ffaeedbfa6dacd7ca103e60b5a18552702dc] NewConnectionIdFrame[1,<0|f242ba8a6bbbeb82|8191048fa5afa729e11dc6e033d6f661] 2.059 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 2.138/App, because ackElicitingInFlight | RTT:34/13 reschedule loss detection timer for PTO over 78 millis, based on 2.138/App, because ackElicitingInFlight | RTT:34/13 2.059 Discarding pn space Handshake because HandshakeDone is received 2.060 -> Packet A|1|S0|a7969e51de8ea4a1|31|1 AckFrame[1-0|Δ0] 2.137 loss detection timeout handler running Sending probe 0, because no ack since 2.027. Current RTT: 34/13. 2.138 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 2.360/App, because ackElicitingInFlight | RTT:34/13 2.138 -> Packet PA|2|S0|a7969e51de8ea4a1|47|1 StreamFrame[0(CIB),0,17,fin] 2.196 <- (5) Packet A|3|S0|45d04ffb69674aa8|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.197 <- (6) Packet A|4|S0|45d04ffb69674aa8|94|3 HandshakeDoneFrame[] NewTokenFrame[b7969fc283cb82c5056b6b399a2399a61ab173ffaeedbfa6dacd7ca103e60b5a18552702dc] NewConnectionIdFrame[1,<0|f242ba8a6bbbeb82|8191048fa5afa729e11dc6e033d6f661] 2.198 -> Packet A|3|S0|a7969e51de8ea4a1|33|1 AckFrame[4-3,1-0|Δ0] 2.230 <- (7) Packet A|5|S0|45d04ffb69674aa8|1054|1 StreamFrame[0(CIB),0,1024,fin] 2.231 Finished downloading https://server4:443/xgwoelnhxm at 32:35.915 on ClientConnection[fdad964e5731cb9a/45d04ffb69674aa8(V1) with server4/193.167.100.100:443] 2.231 Closing ClientConnection[fdad964e5731cb9a/45d04ffb69674aa8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.232 Creating connection with server4:443 with v1 2.232 -> Packet A|4|S0|a7969e51de8ea4a1|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1-0|Δ0] 2.233 Setting up connection for downloading https://server4:443/vprzgikaim at 32:35.917 on ClientConnection[9277ed6eec6db05e/79127c315b8c9aca(V1) with server4/193.167.100.100:443] 2.233 Original destination connection id: 9277ed6eec6db05e (scid: 79127c315b8c9aca) >- CryptoStream[I|ClientHello] 2.235 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.435/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.235 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.354 <- (8) Packet A|6|S0|45d04ffb69674aa8|1054|1 StreamFrame[0(CIB),0,1024,fin] 2.355 -> Packet A|5|S0|a7969e51de8ea4a1|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1-0|Δ0] 2.386 <- (9) Packet A|8|S0|45d04ffb69674aa8|30|1 ConnectionCloseFrame[0|1|] 2.435 loss detection timeout handler running Sending probe 0, because no ack since 2.235. Current RTT: 100/25. 2.435 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.435 (Probe is an initial retransmit) 2.435 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.836/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.435 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.469 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 2.469 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[1-0|Δ0] 2.473 probe count not reset on ack because handshake not yet confirmed 2.474 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.474 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 2.874/Handshake, because peerAwaitingAddressValidation | RTT:100/25 reschedule loss detection timer for PTO over 399 millis, based on 2.874/Handshake, because peerAwaitingAddressValidation | RTT:100/25 2.473 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 2.469 <- (1) Packet H|1|L|983|2 CryptoFrame[0,730] Padding(207) >- CryptoStream[H|Finished] 2.478 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.672/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.478 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.479 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.479 Starting downloading https://server4:443/vprzgikaim at 32:36.163 on ClientConnection[9277ed6eec6db05e/79127c315b8c9aca(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 2.576/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.479 Discarding pn space Initial because first Handshake message is being sent 2.479 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 2.480 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.577/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.479 -> Packet A|0|S0|873c462d11b64cbc|47|1 StreamFrame[0(CIB),0,17,fin] 2.511 <- (2) Packet H|2|L|46|1 AckFrame[1-0|Δ0] 2.512 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.512 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 2.511 <- (2) Packet A|0|S0|79127c315b8c9aca|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.512 <- (3) Packet A|1|S0|79127c315b8c9aca|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b729ec559d6f99e99acddf3f7f1b97193809505e6ed6371facc44847aed4b6e95bf540e86d] NewConnectionIdFrame[1,<0|83c2b5c14c0520c6|8fd6b4b5bacf8eb433aa3e4bd374bd5c] 2.513 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.513 State is set to Confirmed 2.513 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.513 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.514 Discarding pn space Handshake because HandshakeDone is received 2.514 -> Packet A|1|S0|873c462d11b64cbc|32|1 AckFrame[1-0|Δ1] 2.514 <- (4) Packet A|2|S0|79127c315b8c9aca|1054|1 StreamFrame[0(CIB),0,1024,fin] 2.515 Finished downloading https://server4:443/vprzgikaim at 32:36.199 on ClientConnection[9277ed6eec6db05e/79127c315b8c9aca(V1) with server4/193.167.100.100:443] 2.515 Closing ClientConnection[9277ed6eec6db05e/79127c315b8c9aca(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.515 -> Packet A|2|S0|873c462d11b64cbc|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 2.515 Creating connection with server4:443 with v1 2.516 Setting up connection for downloading https://server4:443/tostftnpan at 32:36.201 on ClientConnection[e4b23b3e3cf61377/204dbc526d485a82(V1) with server4/193.167.100.100:443] 2.516 Original destination connection id: e4b23b3e3cf61377 (scid: 204dbc526d485a82) >- CryptoStream[I|ClientHello] 2.518 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.718/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.518 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.547 <- (5) Packet A|3|S0|79127c315b8c9aca|30|1 ConnectionCloseFrame[0|1|] 2.547 <- (6) Packet A|3|S0|79127c315b8c9aca|30|1 ConnectionCloseFrame[0|1|] 2.552 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.553 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.753/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.552 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,730] Padding(249) reschedule loss detection timer for PTO over 101 millis, based on 2.659/Handshake, because peerAwaitingAddressValidation | RTT:34/17 2.557 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 2.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.662/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.560 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.561 Starting downloading https://server4:443/tostftnpan at 32:36.245 on ClientConnection[e4b23b3e3cf61377/204dbc526d485a82(V1) with server4/193.167.100.100:443] 2.561 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 2.562 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.561 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.664/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 101 millis, based on 2.664/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.562 Discarding pn space Initial because first Handshake message is being sent 2.562 -> Packet A|0|S0|d834442c130c084a|47|1 StreamFrame[0(CIB),0,17,fin] 2.593 <- (2) Packet H|1|L|46|1 AckFrame[0|Δ0] 2.594 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.594 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 2.593 <- (2) Packet A|0|S0|204dbc526d485a82|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.594 <- (3) Packet A|1|S0|204dbc526d485a82|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b7ca8a8aac7a1316a97ab901ca5f0ad7d84cd25d2eff4fa177819127354664bbe3b839d972] NewConnectionIdFrame[1,<0|4c1b83a0abb547a6|21af63f8ea7f39f9099fa1d69f55d8e5] 2.595 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.596 State is set to Confirmed 2.596 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.596 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.596 Discarding pn space Handshake because HandshakeDone is received 2.596 -> Packet A|1|S0|d834442c130c084a|32|1 AckFrame[1-0|Δ1] 2.596 <- (4) Packet A|2|S0|204dbc526d485a82|1054|1 StreamFrame[0(CIB),0,1024,fin] 2.597 Finished downloading https://server4:443/tostftnpan at 32:36.281 on ClientConnection[e4b23b3e3cf61377/204dbc526d485a82(V1) with server4/193.167.100.100:443] 2.597 Closing ClientConnection[e4b23b3e3cf61377/204dbc526d485a82(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.598 -> Packet A|2|S0|d834442c130c084a|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 2.598 Creating connection with server4:443 with v1 2.599 Setting up connection for downloading https://server4:443/afmizzulfv at 32:36.283 on ClientConnection[59a79fa919494d0b/8826df861872b6e4(V1) with server4/193.167.100.100:443] 2.599 Original destination connection id: 59a79fa919494d0b (scid: 8826df861872b6e4) >- CryptoStream[I|ClientHello] 2.601 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.801/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.601 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.635 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.636 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.836/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.635 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,730] Padding(249) 2.640 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.742/Handshake, because peerAwaitingAddressValidation | RTT:34/17 2.640 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 2.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.749/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.647 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.750/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.648 Discarding pn space Initial because first Handshake message is being sent 2.648 Starting downloading https://server4:443/afmizzulfv at 32:36.333 on ClientConnection[59a79fa919494d0b/8826df861872b6e4(V1) with server4/193.167.100.100:443] 2.648 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 2.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.751/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.649 -> Packet A|0|S0|f6eda55725801ca2|47|1 StreamFrame[0(CIB),0,17,fin] 2.734 <- (5) Packet A|3|S0|204dbc526d485a82|544|1 CryptoFrame[0,514] 2.734 <- (6) Packet A|4|S0|204dbc526d485a82|94|3 HandshakeDoneFrame[] NewTokenFrame[b7ca8a8aac7a1316a97ab901ca5f0ad7d84cd25d2eff4fa177819127354664bbe3b839d972] NewConnectionIdFrame[1,<0|4c1b83a0abb547a6|21af63f8ea7f39f9099fa1d69f55d8e5] 2.735 -> Packet A|3|S0|d834442c130c084a|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 2.736 -> Packet A|4|S0|d834442c130c084a|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 2.750 loss detection timeout handler running Sending probe 0, because no ack since 2.647. Current RTT: 34/17. 2.750 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.750 (Probe is a handshake retransmit) 2.751 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 2.955/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.750 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 2.954 loss detection timeout handler running Sending probe 1, because no ack since 2.649. Current RTT: 34/17. 2.954 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.954 (Probe is a handshake retransmit) 2.955 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 3.363/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.955 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 2.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 3.364/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.956 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 3.363 loss detection timeout handler running Sending probe 2, because no ack since 2.649. Current RTT: 34/17. 3.363 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.363 (Probe is a handshake retransmit) 3.364 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 4.180/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.364 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 3.365 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 4.181/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.365 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 3.396 <- (2) Packet H|1|L|48|1 AckFrame[6-5,1|Δ0] 3.397 probe count not reset on ack because handshake not yet confirmed 3.397 Retransmitting CryptoFrame[0,36] on level Handshake 3.398 Cwnd(-): 6000; inflight: 47 3.398 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 3.398 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 3.398 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 719 millis, based on 4.118/Handshake, because ackElicitingInFlight | RTT:34/14 3.398 -> Packet H|7|L|80|1 CryptoFrame[0,36] 3.396 <- (2) Packet A|0|S0|8826df861872b6e4|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.397 <- (3) Packet A|1|S0|8826df861872b6e4|94|3 HandshakeDoneFrame[] NewTokenFrame[b7cb9b0ed0921af0f85a94574c2d678174544308e11edc28fec861971452f4178148b6b1f7] NewConnectionIdFrame[1,<0|39a97ee3c3d0680e|cb4944e237de3916a895e2d4b57f2d6b] 3.399 State is set to Confirmed reschedule loss detection timer for PTO over 169 millis, based on 3.569/App, because ackElicitingInFlight | RTT:34/14 reschedule loss detection timer for PTO over -635 millis, based on 2.764/App, because ackElicitingInFlight | RTT:34/14 3.399 Discarding pn space Handshake because HandshakeDone is received 3.399 loss detection timeout handler running Sending probe 0, because no ack since 2.649. Current RTT: 34/14. 3.400 (Probe is retransmit on level App) 3.400 -> Packet A|1|S0|f6eda55725801ca2|31|1 AckFrame[1-0|Δ0] reschedule loss detection timer for PTO over 229 millis, based on 3.630/App, because ackElicitingInFlight | RTT:34/14 3.400 -> Packet PA|2|S0|f6eda55725801ca2|47|1 StreamFrame[0(CIB),0,17,fin] 3.583 <- (4) Packet A|3|S0|8826df861872b6e4|1054|1 StreamFrame[0(CIB),0,1024,fin] 3.584 <- (5) Packet A|4|S0|8826df861872b6e4|1054|1 StreamFrame[0(CIB),0,1024,fin] 3.585 Finished downloading https://server4:443/afmizzulfv at 32:37.269 on ClientConnection[59a79fa919494d0b/8826df861872b6e4(V1) with server4/193.167.100.100:443] 3.585 Closing ClientConnection[59a79fa919494d0b/8826df861872b6e4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.585 -> Packet A|3|S0|f6eda55725801ca2|33|1 AckFrame[4-3,1-0|Δ0] 3.585 -> Packet A|4|S0|f6eda55725801ca2|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1-0|Δ0] 3.585 Creating connection with server4:443 with v1 3.586 Setting up connection for downloading https://server4:443/phqazkfhny at 32:37.271 on ClientConnection[7c34e0b758fb22a8/483743bbd2dcd538(V1) with server4/193.167.100.100:443] 3.586 Original destination connection id: 7c34e0b758fb22a8 (scid: 483743bbd2dcd538) >- CryptoStream[I|ClientHello] 3.589 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.789/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.588 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.623 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 3.624 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.824/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.623 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) reschedule loss detection timer for PTO over 101 millis, based on 3.730/Handshake, because peerAwaitingAddressValidation | RTT:34/17 3.627 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 3.631 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 3.733/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.631 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.632 Starting downloading https://server4:443/phqazkfhny at 32:37.316 on ClientConnection[7c34e0b758fb22a8/483743bbd2dcd538(V1) with server4/193.167.100.100:443] 3.632 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 3.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.632 Discarding pn space Initial because first Handshake message is being sent 3.632 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 3.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.632 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|2a44fd989b6d59bc|47|1 StreamFrame[0(CIB),0,17,fin]] 3.664 <- (2) Packet H|1|L|46|1 AckFrame[0|Δ0] 3.664 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 3.664 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 3.664 <- (2) Packet A|0|S0|483743bbd2dcd538|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.664 <- (3) Packet A|1|S0|483743bbd2dcd538|94|3 HandshakeDoneFrame[] NewTokenFrame[b7eb81a50f3e61d55392eaf01e85276a9fd16b3451eea0bfd4d35c38c2858b6e31ce3d1b51] NewConnectionIdFrame[1,<0|77e39a672da25c77|b24442f1640c835411b34f654479286b] 3.666 State is set to Confirmed reschedule loss detection timer for PTO over 77 millis, based on 3.743/App, because ackElicitingInFlight | RTT:34/13 reschedule loss detection timer for PTO over 77 millis, based on 3.743/App, because ackElicitingInFlight | RTT:34/13 3.666 Discarding pn space Handshake because HandshakeDone is received 3.666 -> Packet A|1|S0|2a44fd989b6d59bc|31|1 AckFrame[1-0|Δ0] 3.743 loss detection timeout handler running Sending probe 0, because no ack since 3.632. Current RTT: 34/13. 3.743 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 3.965/App, because ackElicitingInFlight | RTT:34/13 3.743 -> Packet PA|2|S0|2a44fd989b6d59bc|47|1 StreamFrame[0(CIB),0,17,fin] 3.776 <- (4) Packet A|2|S0|483743bbd2dcd538|1060|2 AckFrame[2|Δ1] StreamFrame[0(CIB),0,1024,fin] 3.777 Cwnd(-): 6000; inflight: 0 3.777 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 3.777 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 98 millis, based on 3.876/App, because ackElicitingInFlight | RTT:34/10 3.777 -> Packet A|3|S0|2a44fd989b6d59bc|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1-0|Δ0] 3.778 Finished downloading https://server4:443/phqazkfhny at 32:37.462 on ClientConnection[7c34e0b758fb22a8/483743bbd2dcd538(V1) with server4/193.167.100.100:443] 3.778 Closing ClientConnection[7c34e0b758fb22a8/483743bbd2dcd538(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.778 Creating connection with server4:443 with v1 3.778 -> Packet A|4|S0|2a44fd989b6d59bc|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 3.779 Setting up connection for downloading https://server4:443/nsnovwuzra at 32:37.463 on ClientConnection[a2e5248ad160f8a8/e7da32a5fc8d59e9(V1) with server4/193.167.100.100:443] 3.779 Original destination connection id: a2e5248ad160f8a8 (scid: e7da32a5fc8d59e9) >- CryptoStream[I|ClientHello] 3.781 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.981/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.781 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.809 <- (5) Packet A|3|S0|483743bbd2dcd538|35|2 AckFrame[4-3|Δ0] ConnectionCloseFrame[0|1|] 3.980 loss detection timeout handler running Sending probe 0, because no ack since 3.781. Current RTT: 100/25. 3.980 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.980 (Probe is an initial retransmit) 3.981 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.381/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.981 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.380 loss detection timeout handler running Sending probe 1, because no ack since 3.981. Current RTT: 100/25. 4.381 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.381 (Probe is an initial retransmit) 4.381 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.181/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.381 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.382 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.182/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.382 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.414 <- (1) Packet I|3|L|49|1 Token=[] AckFrame[3,1-0|Δ0] 4.415 probe count not reset on ack because handshake not yet confirmed 4.493 loss detection timeout handler running 4.493 Cwnd(-): 6000; inflight: 0 4.493 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 4.877/Initial, because peerAwaitingAddressValidation | RTT:32/16 4.813 <- (2) Packet I|4|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 4.813 <- (2) Packet H|2|L|1030|2 CryptoFrame[0,730] Padding(254) 4.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 5.201/Handshake, because peerAwaitingAddressValidation | RTT:32/16 4.817 -> Packet I|4|L|1201|2 Token=[] AckFrame[4-3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 4.820 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 5.204/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.820 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.820 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.820 Starting downloading https://server4:443/nsnovwuzra at 32:38.505 on ClientConnection[a2e5248ad160f8a8/e7da32a5fc8d59e9(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 4.916/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.820 Discarding pn space Initial because first Handshake message is being sent 4.820 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 4.820 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 4.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.917/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.821 -> Packet A|0|S0|4c3a2fc49230938c|47|1 StreamFrame[0(CIB),0,17,fin] 4.852 <- (4) Packet A|1|S0|e7da32a5fc8d59e9|94|3 HandshakeDoneFrame[] NewTokenFrame[b7966bcb1aa50a88f2e4c7b7d4fa0cad42f61ae7b6a5d20cfbbcdf1b3e083aa50617d93c92] NewConnectionIdFrame[1,<0|57ee194f07312383|52f2b4c04bf90b3c7822cae894f3ac75] 4.853 State is set to Confirmed reschedule loss detection timer for PTO over 62 millis, based on 4.916/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 88 millis, based on 4.942/App, because ackElicitingInFlight | RTT:32/16 4.853 Discarding pn space Handshake because HandshakeDone is received 4.872 -> Packet A|1|S0|4c3a2fc49230938c|32|1 AckFrame[1|Δ19] 4.904 <- (5) Packet A|2|S0|e7da32a5fc8d59e9|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 4.924 -> Packet A|2|S0|4c3a2fc49230938c|32|1 AckFrame[2-1|Δ19] 4.941 loss detection timeout handler running Sending probe 0, because no ack since 4.821. Current RTT: 32/16. 4.941 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 5.183/App, because ackElicitingInFlight | RTT:32/16 4.941 -> Packet PA|3|S0|4c3a2fc49230938c|47|1 StreamFrame[0(CIB),0,17,fin] 5.036 <- (6) Packet A|4|S0|e7da32a5fc8d59e9|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 5.037 <- (7) Packet A|5|S0|e7da32a5fc8d59e9|1054|1 StreamFrame[0(CIB),0,1024,fin] 5.037 -> Packet A|4|S0|4c3a2fc49230938c|33|1 AckFrame[5-4,2-1|Δ0] 5.037 Finished downloading https://server4:443/nsnovwuzra at 32:38.722 on ClientConnection[a2e5248ad160f8a8/e7da32a5fc8d59e9(V1) with server4/193.167.100.100:443] 5.038 Closing ClientConnection[a2e5248ad160f8a8/e7da32a5fc8d59e9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.038 -> Packet A|5|S0|4c3a2fc49230938c|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2-1|Δ0] 5.038 Creating connection with server4:443 with v1 5.039 Setting up connection for downloading https://server4:443/ciuzpcrwja at 32:38.723 on ClientConnection[3016931d20dc5edd/8d27dc2da7b0e17b(V1) with server4/193.167.100.100:443] 5.039 Original destination connection id: 3016931d20dc5edd (scid: 8d27dc2da7b0e17b) >- CryptoStream[I|ClientHello] 5.041 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.241/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.041 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.070 <- (8) Packet A|6|S0|e7da32a5fc8d59e9|30|1 ConnectionCloseFrame[0|1|] 5.240 loss detection timeout handler running Sending probe 0, because no ack since 5.041. Current RTT: 100/25. 5.240 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.240 (Probe is an initial retransmit) 5.241 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.641/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.241 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.640 loss detection timeout handler running Sending probe 1, because no ack since 5.241. Current RTT: 100/25. 5.640 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.640 (Probe is an initial retransmit) 5.641 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.441/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.641 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.642 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.442/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.642 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.675 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 5.675 <- (1) Packet I|2|L|49|1 Token=[] AckFrame[3,1|Δ0] 5.678 probe count not reset on ack because handshake not yet confirmed 5.678 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 6.478/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.678 Retransmitting CryptoFrame[0,257] on level Initial 5.678 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 5.678 Cwnd(-): 6000; inflight: 2401 5.679 -> Packet I|5|L|1200|3 Token=[] CryptoFrame[0,257] AckFrame[1|Δ0] Padding(891) 5.675 <- (1) Packet H|1|L|981|2 CryptoFrame[0,731] Padding(204) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.682 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.682 Starting downloading https://server4:443/ciuzpcrwja at 32:39.366 on ClientConnection[3016931d20dc5edd/8d27dc2da7b0e17b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 5.779/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.682 Discarding pn space Initial because first Handshake message is being sent 5.682 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.779/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.682 -> Packet H|0|L|85|2 AckFrame[1|Δ0] CryptoFrame[0,36] 5.683 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.780/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.683 -> Packet A|0|S0|96755c6fa10f467e|47|1 StreamFrame[0(CIB),0,17,fin] 5.779 loss detection timeout handler running Sending probe 0, because no ack since 5.682. Current RTT: 33/16. 5.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.779 (Probe is a handshake retransmit) 5.780 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 5.974/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.779 -> Packet PH|1|L|80|1 CryptoFrame[0,36] 5.812 <- (2) Packet H|2|L|46|1 AckFrame[1|Δ0] 5.813 probe count not reset on ack because handshake not yet confirmed 5.813 Retransmitting CryptoFrame[0,36] on level Handshake 5.813 Cwnd(-): 3000; inflight: 47 5.813 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 5.813 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 5.813 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 161 millis, based on 5.975/Handshake, because ackElicitingInFlight | RTT:33/12 5.813 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[1|Δ0] 5.812 <- (2) Packet A|0|S0|8d27dc2da7b0e17b|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 5.813 <- (3) Packet A|1|S0|8d27dc2da7b0e17b|100|4 AckFrame[0|Δ99] HandshakeDoneFrame[] NewTokenFrame[b7b08ec8258b873097ac4211a66dffe21fe0596928d141a490dddf5cbbbb11a0761af95317] NewConnectionIdFrame[1,<0|cd50eb51dc731e40|18b1c75924092ca92a304a0453268d00] reschedule loss detection timer for PTO over 79 millis, based on 5.894/Handshake, because ackElicitingInFlight | RTT:33/12 5.815 State is set to Confirmed reschedule loss detection timer for PTO over 148 millis, based on 5.963/Handshake, because ackElicitingInFlight | RTT:42/27 5.815 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.815 Discarding pn space Handshake because HandshakeDone is received 5.815 -> Packet A|1|S0|96755c6fa10f467e|31|1 AckFrame[1-0|Δ0] 6.147 <- (4) Packet A|5|S0|8d27dc2da7b0e17b|1054|1 StreamFrame[0(CIB),0,1024,fin] 6.148 Finished downloading https://server4:443/ciuzpcrwja at 32:39.832 on ClientConnection[3016931d20dc5edd/8d27dc2da7b0e17b(V1) with server4/193.167.100.100:443] 6.148 Closing ClientConnection[3016931d20dc5edd/8d27dc2da7b0e17b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.148 -> Packet A|2|S0|96755c6fa10f467e|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,1-0|Δ0] 6.149 Creating connection with server4:443 with v1 6.149 Setting up connection for downloading https://server4:443/ethrexwubn at 32:39.834 on ClientConnection[d1b8794e4712736f/da099f2a69bc89de(V1) with server4/193.167.100.100:443] 6.149 Original destination connection id: d1b8794e4712736f (scid: da099f2a69bc89de) >- CryptoStream[I|ClientHello] 6.151 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.351/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.151 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.180 <- (5) Packet A|7|S0|8d27dc2da7b0e17b|30|1 ConnectionCloseFrame[0|1|] 6.185 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 6.186 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.386/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.185 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 6.189 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.291/Handshake, because peerAwaitingAddressValidation | RTT:34/17 6.188 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.192 Starting downloading https://server4:443/ethrexwubn at 32:39.876 on ClientConnection[d1b8794e4712736f/da099f2a69bc89de(V1) with server4/193.167.100.100:443] 6.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.294/Handshake, because peerAwaitingAddressValidation | RTT:34/17 reschedule loss detection timer for PTO over 101 millis, based on 6.294/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.192 Discarding pn space Initial because first Handshake message is being sent 6.192 -> Packet H|0|L|80|1 CryptoFrame[0,36] 6.193 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.295/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.193 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|33ee8089c1f067f9|47|1 StreamFrame[0(CIB),0,17,fin]] 6.224 <- (2) Packet H|1|L|46|1 AckFrame[0|Δ0] 6.225 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 6.225 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 6.224 <- (2) Packet A|0|S0|da099f2a69bc89de|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.244 -> Packet A|1|S0|33ee8089c1f067f9|32|1 AckFrame[0|Δ19] 6.585 <- (3) Packet A|4|S0|da099f2a69bc89de|94|3 HandshakeDoneFrame[] NewTokenFrame[b791693ffc7913a7583d8c129d92061468e97c415971926b37120cbe1fe97987af7400cdd8] NewConnectionIdFrame[1,<0|aa15aee231023cfb|99c6dfd09f4f0d7b218586aa2446d598] 6.585 State is set to Confirmed reschedule loss detection timer for PTO over -282 millis, based on 6.304/App, because ackElicitingInFlight | RTT:34/13 6.586 loss detection timeout handler running Sending probe 0, because no ack since 6.192. Current RTT: 34/13. reschedule loss detection timer for PTO over -171 millis, based on 6.415/App, because ackElicitingInFlight | RTT:34/13 6.586 Discarding pn space Handshake because HandshakeDone is received 6.586 (Probe is retransmit on level App) 6.585 <- (4) Packet A|5|S0|da099f2a69bc89de|94|3 HandshakeDoneFrame[] NewTokenFrame[b791693ffc7913a7583d8c129d92061468e97c415971926b37120cbe1fe97987af7400cdd8] NewConnectionIdFrame[1,<0|aa15aee231023cfb|99c6dfd09f4f0d7b218586aa2446d598] reschedule loss detection timer for PTO over 221 millis, based on 6.808/App, because ackElicitingInFlight | RTT:34/13 6.586 -> Packet PA|2|S0|33ee8089c1f067f9|47|1 StreamFrame[0(CIB),0,17,fin] 6.586 -> Packet A|3|S0|33ee8089c1f067f9|33|1 AckFrame[5-4,0|Δ0] 6.620 <- (5) Packet A|6|S0|da099f2a69bc89de|1060|2 AckFrame[3-1|Δ2] StreamFrame[0(CIB),0,1024,fin] 6.621 Cwnd(-): 6000; inflight: 0 6.621 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.621 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 110 millis, based on 6.732/App, because ackElicitingInFlight | RTT:34/13 6.621 -> Packet A|4|S0|33ee8089c1f067f9|47|1 StreamFrame[0(CIB),0,17,fin] 6.621 Finished downloading https://server4:443/ethrexwubn at 32:40.306 on ClientConnection[d1b8794e4712736f/da099f2a69bc89de(V1) with server4/193.167.100.100:443] 6.621 Closing ClientConnection[d1b8794e4712736f/da099f2a69bc89de(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.622 -> Packet A|5|S0|33ee8089c1f067f9|35|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 6.622 Creating connection with server4:443 with v1 6.623 Setting up connection for downloading https://server4:443/tknvdgvoyw at 32:40.307 on ClientConnection[d9b69311df73f67f/71970a6f65e9e529(V1) with server4/193.167.100.100:443] 6.623 Original destination connection id: d9b69311df73f67f (scid: 71970a6f65e9e529) >- CryptoStream[I|ClientHello] 6.625 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.825/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.625 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.654 <- (6) Packet A|7|S0|da099f2a69bc89de|30|1 ConnectionCloseFrame[0|1|] 6.659 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 6.660 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.860/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.659 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 6.664 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.766/Handshake, because peerAwaitingAddressValidation | RTT:34/17 6.663 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 6.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.667 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.667 Starting downloading https://server4:443/tknvdgvoyw at 32:40.352 on ClientConnection[d9b69311df73f67f/71970a6f65e9e529(V1) with server4/193.167.100.100:443] 6.667 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 6.668 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.667 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 101 millis, based on 6.770/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.668 -> Packet A|0|S0|debf92213b552abe|47|1 StreamFrame[0(CIB),0,17,fin] 6.700 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 6.700 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 6.700 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 6.700 <- (2) Packet A|0|S0|71970a6f65e9e529|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.701 <- (3) Packet A|1|S0|71970a6f65e9e529|100|4 AckFrame[0|Δ3] HandshakeDoneFrame[] NewTokenFrame[b77fc584659a6611b8d8b4be19d95891a01961b1fcc2ae4f789836761047f32f25f8c6b03b] NewConnectionIdFrame[1,<0|f2ba7731ecf15538|197417d3e4497bacb957e35c89409406] 6.701 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.701 State is set to Confirmed 6.701 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.701 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.701 Discarding pn space Handshake because HandshakeDone is received 6.702 -> Packet A|1|S0|debf92213b552abe|31|1 AckFrame[1-0|Δ0] 6.703 <- (4) Packet A|2|S0|71970a6f65e9e529|1054|1 StreamFrame[0(CIB),0,1024,fin] 6.703 Finished downloading https://server4:443/tknvdgvoyw at 32:40.388 on ClientConnection[d9b69311df73f67f/71970a6f65e9e529(V1) with server4/193.167.100.100:443] 6.703 Closing ClientConnection[d9b69311df73f67f/71970a6f65e9e529(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.704 -> Packet A|2|S0|debf92213b552abe|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 6.704 Creating connection with server4:443 with v1 6.704 Setting up connection for downloading https://server4:443/nsnuovtewe at 32:40.389 on ClientConnection[2cbed3786466dbfa/e0072c55ec9b97ad(V1) with server4/193.167.100.100:443] 6.704 Original destination connection id: 2cbed3786466dbfa (scid: e0072c55ec9b97ad) >- CryptoStream[I|ClientHello] 6.706 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.906/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.706 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.819 <- (5) Packet A|3|S0|71970a6f65e9e529|1054|1 StreamFrame[0(CIB),0,1024,fin] 6.820 -> Packet A|3|S0|debf92213b552abe|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 6.905 loss detection timeout handler running Sending probe 0, because no ack since 6.706. Current RTT: 100/25. 6.905 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.905 (Probe is an initial retransmit) 6.906 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.306/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.906 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.005 <- (6) Packet A|5|S0|71970a6f65e9e529|1054|1 StreamFrame[0(CIB),0,1024,fin] 7.005 -> Packet A|4|S0|debf92213b552abe|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 7.305 loss detection timeout handler running Sending probe 1, because no ack since 6.906. Current RTT: 100/25. 7.305 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.305 (Probe is an initial retransmit) 7.306 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.106/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.306 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.307 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.107/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.307 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.339 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 7.339 <- (1) Packet I|2|L|49|1 Token=[] AckFrame[2,0|Δ0] 7.342 probe count not reset on ack because handshake not yet confirmed 7.343 Cwnd(-): 6000; inflight: 1200 7.343 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.343 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 8.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 799 millis, based on 8.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.342 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 7.339 <- (1) Packet H|1|L|981|2 CryptoFrame[0,729] Padding(206) >- CryptoStream[H|Finished] 7.346 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.346 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.347 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.444/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.347 Discarding pn space Initial because first Handshake message is being sent 7.347 Starting downloading https://server4:443/nsnuovtewe at 32:41.031 on ClientConnection[2cbed3786466dbfa/e0072c55ec9b97ad(V1) with server4/193.167.100.100:443] 7.347 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 7.347 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.444/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.347 -> Packet A|0|S0|7d56311d0753e415|47|1 StreamFrame[0(CIB),0,17,fin] 7.380 <- (2) Packet H|2|L|46|1 AckFrame[1-0|Δ0] 7.380 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 7.380 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 7.380 <- (2) Packet A|0|S0|e0072c55ec9b97ad|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.400 -> Packet A|1|S0|7d56311d0753e415|32|1 AckFrame[0|Δ19] 7.497 <- (3) Packet A|3|S0|e0072c55ec9b97ad|94|3 HandshakeDoneFrame[] NewTokenFrame[b71545940dd1662450789a077b436fd9786018a935cdf819a0334716d9b773e485f9d93df2] NewConnectionIdFrame[1,<0|a86a67d5d88af36b|8817d772e31364aaae364864ee207c4d] 7.498 State is set to Confirmed reschedule loss detection timer for PTO over -28 millis, based on 7.469/App, because ackElicitingInFlight | RTT:33/16 7.498 loss detection timeout handler running reschedule loss detection timer for PTO over -28 millis, based on 7.469/App, because ackElicitingInFlight | RTT:33/16 Sending probe 0, because no ack since 7.347. Current RTT: 33/16. 7.498 Discarding pn space Handshake because HandshakeDone is received 7.498 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 7.742/App, because ackElicitingInFlight | RTT:33/16 7.498 -> Packet PA|2|S0|7d56311d0753e415|47|1 StreamFrame[0(CIB),0,17,fin] 7.518 -> Packet A|3|S0|7d56311d0753e415|34|1 AckFrame[3,0|Δ19] 7.741 loss detection timeout handler running Sending probe 1, because no ack since 7.498. Current RTT: 33/16. 7.742 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 8.230/App, because ackElicitingInFlight | RTT:33/16 7.742 -> Packet PA|4|S0|7d56311d0753e415|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 8.231/App, because ackElicitingInFlight | RTT:33/16 7.743 -> Packet PA|5|S0|7d56311d0753e415|47|1 StreamFrame[0(CIB),0,17,fin] 7.775 <- (4) Packet A|4|S0|e0072c55ec9b97ad|1062|2 AckFrame[4-3,1|Δ1] StreamFrame[0(CIB),0,1024,fin] 7.776 Cwnd(-): 3000; inflight: 47 7.776 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 89 millis, based on 7.865/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 105 millis, based on 7.882/App, because ackElicitingInFlight | RTT:33/12 7.776 -> Packet A|6|S0|7d56311d0753e415|47|1 StreamFrame[0(CIB),0,17,fin] 7.776 Finished downloading https://server4:443/nsnuovtewe at 32:41.461 on ClientConnection[2cbed3786466dbfa/e0072c55ec9b97ad(V1) with server4/193.167.100.100:443] 7.776 Closing ClientConnection[2cbed3786466dbfa/e0072c55ec9b97ad(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.777 -> Packet A|7|S0|7d56311d0753e415|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 7.777 Creating connection with server4:443 with v1 7.778 Setting up connection for downloading https://server4:443/dbefoivrfx at 32:41.462 on ClientConnection[02ade40506517dee/5d5501bc3e4e13f9(V1) with server4/193.167.100.100:443] 7.778 Original destination connection id: 02ade40506517dee (scid: 5d5501bc3e4e13f9) >- CryptoStream[I|ClientHello] 7.779 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.979/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.779 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.808 <- (5) Packet A|5|S0|e0072c55ec9b97ad|35|2 AckFrame[7-6|Δ0] ConnectionCloseFrame[0|1|] 7.978 loss detection timeout handler running Sending probe 0, because no ack since 7.779. Current RTT: 100/25. 7.978 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.979 (Probe is an initial retransmit) 7.979 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.379/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.979 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.014 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 8.014 probe count not reset on ack because handshake not yet confirmed 8.014 Retransmitting CryptoFrame[0,257] on level Initial 8.014 Cwnd(-): 6000; inflight: 0 8.014 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.414/Initial, because peerAwaitingAddressValidation | RTT:100/25 8.015 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 8.219/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.015 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 8.017 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.014 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) reschedule loss detection timer for PTO over 203 millis, based on 8.221/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.017 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 8.020 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 8.224/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.020 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.020 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.020 Starting downloading https://server4:443/dbefoivrfx at 32:41.704 on ClientConnection[02ade40506517dee/5d5501bc3e4e13f9(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 8.122/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.020 Discarding pn space Initial because first Handshake message is being sent 8.020 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 8.020 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 8.122/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.020 -> Packet A|0|S0|aa18ef7999335149|47|1 StreamFrame[0(CIB),0,17,fin] 8.048 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.052 <- (3) Packet H|2|L|46|1 AckFrame[1-0|Δ0] 8.053 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 8.053 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 8.052 <- (3) Packet A|0|S0|5d5501bc3e4e13f9|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 8.053 <- (4) Packet A|1|S0|5d5501bc3e4e13f9|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b7c71e0f0f4c0504868c276bd4b5a2b9583cb9503542c45ab069895dcc5ab13a50f28f8069] NewConnectionIdFrame[1,<0|1502c7dfbf82badb|8a435ac29042c578fcfb2dcfe661ceeb] 8.054 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.054 State is set to Confirmed 8.054 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.054 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.054 Discarding pn space Handshake because HandshakeDone is received 8.054 -> Packet A|1|S0|aa18ef7999335149|31|1 AckFrame[1-0|Δ0] 8.054 <- (5) Packet A|2|S0|5d5501bc3e4e13f9|1054|1 StreamFrame[0(CIB),0,1024,fin] 8.055 Finished downloading https://server4:443/dbefoivrfx at 32:41.739 on ClientConnection[02ade40506517dee/5d5501bc3e4e13f9(V1) with server4/193.167.100.100:443] 8.055 Closing ClientConnection[02ade40506517dee/5d5501bc3e4e13f9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.055 -> Packet A|2|S0|aa18ef7999335149|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 8.056 Creating connection with server4:443 with v1 8.056 Setting up connection for downloading https://server4:443/phdzvuwvda at 32:41.741 on ClientConnection[4794034a2bd67452/8eb2315f18c10bc1(V1) with server4/193.167.100.100:443] 8.056 Original destination connection id: 4794034a2bd67452 (scid: 8eb2315f18c10bc1) >- CryptoStream[I|ClientHello] 8.058 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.258/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.058 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.087 <- (6) Packet A|3|S0|5d5501bc3e4e13f9|30|1 ConnectionCloseFrame[0|1|] 8.087 <- (7) Packet A|3|S0|5d5501bc3e4e13f9|30|1 ConnectionCloseFrame[0|1|] 8.257 loss detection timeout handler running Sending probe 0, because no ack since 8.058. Current RTT: 100/25. 8.257 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.257 (Probe is an initial retransmit) 8.258 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.658/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.258 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.657 loss detection timeout handler running Sending probe 1, because no ack since 8.258. Current RTT: 100/25. 8.657 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.657 (Probe is an initial retransmit) 8.658 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.458/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.658 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.659 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.459/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.659 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.691 <- (1) Packet I|3|L|49|1 Token=[] AckFrame[3,1-0|Δ0] 8.691 probe count not reset on ack because handshake not yet confirmed 8.770 loss detection timeout handler running 8.770 Cwnd(-): 6000; inflight: 0 8.770 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 9.154/Initial, because peerAwaitingAddressValidation | RTT:32/16 9.091 <- (2) Packet I|4|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 9.091 <- (2) Packet H|2|L|1030|2 CryptoFrame[0,730] Padding(254) 9.094 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 9.478/Handshake, because peerAwaitingAddressValidation | RTT:32/16 9.094 -> Packet I|4|L|1201|2 Token=[] AckFrame[4-3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 9.097 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 9.481/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.097 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.097 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.097 Starting downloading https://server4:443/phdzvuwvda at 32:42.782 on ClientConnection[4794034a2bd67452/8eb2315f18c10bc1(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 9.193/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.097 Discarding pn space Initial because first Handshake message is being sent 9.097 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 9.097 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.098 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 9.194/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.098 -> Packet A|0|S0|9cc9f17fd2c8ecac|47|1 StreamFrame[0(CIB),0,17,fin] 9.130 <- (4) Packet H|4|L|46|1 AckFrame[1-0|Δ0] 9.131 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 9.131 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 9.130 <- (4) Packet A|0|S0|8eb2315f18c10bc1|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.130 <- (5) Packet A|1|S0|8eb2315f18c10bc1|100|4 AckFrame[0|Δ3] HandshakeDoneFrame[] NewTokenFrame[b796b6d0b5c62c2af4d225df88bb985d70f5cc7b7b266f533f26186dfae5cdc88eb7775c1b] NewConnectionIdFrame[1,<0|6aa60e66ea770e76|fcec38af08351dc5377b9880b4308ebf] 9.131 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.132 State is set to Confirmed 9.132 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.132 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.132 Discarding pn space Handshake because HandshakeDone is received 9.132 -> Packet A|1|S0|9cc9f17fd2c8ecac|31|1 AckFrame[1-0|Δ0] 9.132 <- (6) Packet A|2|S0|8eb2315f18c10bc1|1054|1 StreamFrame[0(CIB),0,1024,fin] 9.133 Finished downloading https://server4:443/phdzvuwvda at 32:42.817 on ClientConnection[4794034a2bd67452/8eb2315f18c10bc1(V1) with server4/193.167.100.100:443] 9.133 Closing ClientConnection[4794034a2bd67452/8eb2315f18c10bc1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.134 -> Packet A|2|S0|9cc9f17fd2c8ecac|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 9.134 Creating connection with server4:443 with v1 9.134 Setting up connection for downloading https://server4:443/iyeymshozk at 32:42.819 on ClientConnection[ae674352cf0f8e29/efbc72003e17f976(V1) with server4/193.167.100.100:443] 9.134 Original destination connection id: ae674352cf0f8e29 (scid: efbc72003e17f976) >- CryptoStream[I|ClientHello] 9.136 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.336/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.136 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.166 <- (7) Packet A|3|S0|8eb2315f18c10bc1|30|1 ConnectionCloseFrame[0|1|] 9.335 loss detection timeout handler running Sending probe 0, because no ack since 9.136. Current RTT: 100/25. 9.335 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.335 (Probe is an initial retransmit) 9.336 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.736/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.336 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.735 loss detection timeout handler running Sending probe 1, because no ack since 9.336. Current RTT: 100/25. 9.735 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.735 (Probe is an initial retransmit) 9.736 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.536/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.736 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.737 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.537/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.737 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.170 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 10.170 <- (1) Packet H|1|L|1030|2 CryptoFrame[0,730] Padding(254) 10.173 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 10.973/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.173 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) >- CryptoStream[H|Finished] 10.176 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 10.976/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.176 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.176 Starting downloading https://server4:443/iyeymshozk at 32:43.861 on ClientConnection[ae674352cf0f8e29/efbc72003e17f976(V1) with server4/193.167.100.100:443] 10.176 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.376/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.176 Discarding pn space Initial because first Handshake message is being sent 10.176 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 10.176 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.177 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.377/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.177 -> Packet A|0|S0|3f62dd56b6a12f32|47|1 StreamFrame[0(CIB),0,17,fin] 10.376 loss detection timeout handler running Sending probe 0, because no ack since 10.176. Current RTT: 100/25. 10.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.376 (Probe is a handshake retransmit) 10.377 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 10.777/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.376 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 10.776 loss detection timeout handler running Sending probe 1, because no ack since 10.177. Current RTT: 100/25. 10.776 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.776 (Probe is a handshake retransmit) 10.776 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 11.576/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.776 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 10.777 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 11.577/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.777 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 10.809 <- (3) Packet H|3|L|48|1 AckFrame[4-3,1|Δ0] 10.810 probe count not reset on ack because handshake not yet confirmed 10.810 Retransmitting CryptoFrame[0,36] on level Handshake 10.810 Cwnd(-): 6000; inflight: 47 10.810 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 10.810 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 10.811 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 10.809 <- (3) Packet A|0|S0|efbc72003e17f976|544|1 CryptoFrame[0,514] reschedule loss detection timer for PTO over 363 millis, based on 11.175/Handshake, because ackElicitingInFlight | RTT:31/15 10.811 -> Packet H|5|L|80|1 CryptoFrame[0,36] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.810 <- (4) Packet A|1|S0|efbc72003e17f976|102|4 AckFrame[0|Δ600] HandshakeDoneFrame[] NewTokenFrame[b792c5be44a87edb539bbe1df42b26bbf2b9e80f2a3534c104f5f392c080e4a8afaa7b0e1f] NewConnectionIdFrame[1,<0|cce85216790c9e21|870524c4024bb4aefa1a8f171ff5a84d] reschedule loss detection timer for PTO over 90 millis, based on 10.902/Handshake, because ackElicitingInFlight | RTT:31/15 10.811 State is set to Confirmed reschedule loss detection timer for PTO over 722 millis, based on 11.534/Handshake, because ackElicitingInFlight | RTT:103/155 10.812 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.812 Discarding pn space Handshake because HandshakeDone is received 10.811 <- (5) Packet A|2|S0|efbc72003e17f976|1054|1 StreamFrame[0(CIB),0,1024,fin] 10.812 -> Packet A|1|S0|3f62dd56b6a12f32|31|1 AckFrame[1-0|Δ0] 10.812 Finished downloading https://server4:443/iyeymshozk at 32:44.497 on ClientConnection[ae674352cf0f8e29/efbc72003e17f976(V1) with server4/193.167.100.100:443] 10.812 Closing ClientConnection[ae674352cf0f8e29/efbc72003e17f976(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.813 -> Packet A|2|S0|3f62dd56b6a12f32|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 10.813 Creating connection with server4:443 with v1 10.814 Setting up connection for downloading https://server4:443/iytpkyeiwv at 32:44.498 on ClientConnection[d71a90d69927a871/bc03abe70e523271(V1) with server4/193.167.100.100:443] 10.814 Original destination connection id: d71a90d69927a871 (scid: bc03abe70e523271) >- CryptoStream[I|ClientHello] 10.815 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.015/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.815 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.849 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 10.850 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.050/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.849 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,731] Padding(248) 10.852 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.954/Handshake, because peerAwaitingAddressValidation | RTT:34/17 10.852 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 10.855 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.957/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.855 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.855 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.855 Starting downloading https://server4:443/iytpkyeiwv at 32:44.540 on ClientConnection[d71a90d69927a871/bc03abe70e523271(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 10.957/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.855 Discarding pn space Initial because first Handshake message is being sent 10.855 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 10.856 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.958/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.856 -> Packet A|0|S0|edb428ee13e0dc61|47|1 StreamFrame[0(CIB),0,17,fin] 10.888 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 10.888 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 10.888 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 10.888 <- (2) Packet A|0|S0|bc03abe70e523271|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.908 -> Packet A|1|S0|edb428ee13e0dc61|32|1 AckFrame[0|Δ19] 10.926 <- (6) Packet A|3|S0|efbc72003e17f976|544|1 CryptoFrame[0,514] 10.926 <- (7) Packet A|4|S0|efbc72003e17f976|94|3 HandshakeDoneFrame[] NewTokenFrame[b792c5be44a87edb539bbe1df42b26bbf2b9e80f2a3534c104f5f392c080e4a8afaa7b0e1f] NewConnectionIdFrame[1,<0|cce85216790c9e21|870524c4024bb4aefa1a8f171ff5a84d] 10.926 -> Packet A|3|S0|3f62dd56b6a12f32|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 10.927 -> Packet A|4|S0|3f62dd56b6a12f32|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 10.959 <- (8) Packet A|5|S0|efbc72003e17f976|30|1 ConnectionCloseFrame[0|1|] 11.006 <- (3) Packet A|3|S0|bc03abe70e523271|94|3 HandshakeDoneFrame[] NewTokenFrame[b7b6b24983c07fc5967d57f58508c9cf2c7c5d5cb5d188431cf24e4e7baa5d2cf8a5e28b80] NewConnectionIdFrame[1,<0|437552e9bacabc4e|1fa5f1450edb2422299e3c205d874677] 11.006 State is set to Confirmed reschedule loss detection timer for PTO over -23 millis, based on 10.983/App, because ackElicitingInFlight | RTT:34/17 11.006 loss detection timeout handler running Sending probe 0, because no ack since 10.855. Current RTT: 34/17. reschedule loss detection timer for PTO over -23 millis, based on 10.983/App, because ackElicitingInFlight | RTT:34/17 11.007 Discarding pn space Handshake because HandshakeDone is received 11.007 (Probe is retransmit on level App) 11.007 <- (4) Packet A|4|S0|bc03abe70e523271|1054|1 StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 253 millis, based on 11.261/App, because ackElicitingInFlight | RTT:34/17 11.007 -> Packet PA|2|S0|edb428ee13e0dc61|47|1 StreamFrame[0(CIB),0,17,fin] 11.008 Finished downloading https://server4:443/iytpkyeiwv at 32:44.692 on ClientConnection[d71a90d69927a871/bc03abe70e523271(V1) with server4/193.167.100.100:443] 11.008 -> Packet A|3|S0|edb428ee13e0dc61|33|1 AckFrame[4-3,0|Δ0] 11.008 Closing ClientConnection[d71a90d69927a871/bc03abe70e523271(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.008 Creating connection with server4:443 with v1 11.008 -> Packet A|4|S0|edb428ee13e0dc61|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,0|Δ0] 11.009 Setting up connection for downloading https://server4:443/dsgfdcnntu at 32:44.693 on ClientConnection[99cdff95760314e2/c80c2ccbfed8dd77(V1) with server4/193.167.100.100:443] 11.009 Original destination connection id: 99cdff95760314e2 (scid: c80c2ccbfed8dd77) >- CryptoStream[I|ClientHello] 11.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.211/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.011 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.040 <- (5) Packet A|5|S0|bc03abe70e523271|35|2 AckFrame[4-0|Δ0] ConnectionCloseFrame[0|1|] 11.210 loss detection timeout handler running Sending probe 0, because no ack since 11.011. Current RTT: 100/25. 11.210 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.210 (Probe is an initial retransmit) 11.211 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.611/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.210 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.244 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 11.244 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[1-0|Δ0] 11.247 probe count not reset on ack because handshake not yet confirmed 11.247 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.247 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 11.647/Handshake, because peerAwaitingAddressValidation | RTT:100/25 reschedule loss detection timer for PTO over 399 millis, based on 11.647/Handshake, because peerAwaitingAddressValidation | RTT:100/25 11.247 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 11.244 <- (1) Packet H|1|L|983|2 CryptoFrame[0,729] Padding(208) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.250 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.250 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.250 Starting downloading https://server4:443/dsgfdcnntu at 32:44.934 on ClientConnection[99cdff95760314e2/c80c2ccbfed8dd77(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 193 millis, based on 11.444/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.250 -> Packet H|0|L|80|1 CryptoFrame[0,36] reschedule loss detection timer for PTO over 96 millis, based on 11.347/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.250 Discarding pn space Initial because first Handshake message is being sent 11.250 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 11.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.348/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.251 -> Packet A|0|S0|ec506fb03220c8d8|47|1 StreamFrame[0(CIB),0,17,fin] 11.347 loss detection timeout handler running Sending probe 0, because no ack since 11.250. Current RTT: 33/16. 11.347 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.347 (Probe is a handshake retransmit) 11.348 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.542/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.347 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 11.380 <- (2) Packet H|2|L|46|1 AckFrame[2|Δ0] 11.381 probe count not reset on ack because handshake not yet confirmed 11.381 Retransmitting CryptoFrame[0,36] on level Handshake 11.381 Cwnd(-): 6000; inflight: 47 11.381 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 11.381 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 11.381 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 161 millis, based on 11.543/Handshake, because ackElicitingInFlight | RTT:33/12 11.380 <- (2) Packet A|0|S0|c80c2ccbfed8dd77|544|1 CryptoFrame[0,514] 11.381 -> Packet H|3|L|85|2 CryptoFrame[0,36] AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 11.381 <- (3) Packet A|1|S0|c80c2ccbfed8dd77|100|4 AckFrame[0|Δ97] HandshakeDoneFrame[] NewTokenFrame[b71a8f4dfa0919572c3894c9060dba450135070c4793c9766816c150d91c2736a8dc79adb6] NewConnectionIdFrame[1,<0|3490f9586d9c78b2|e8f66e451e7ec692d9ed708e889ea2fd] reschedule loss detection timer for PTO over 80 millis, based on 11.462/Handshake, because ackElicitingInFlight | RTT:33/12 11.382 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 11.531/Handshake, because ackElicitingInFlight | RTT:42/27 11.382 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.382 Discarding pn space Handshake because HandshakeDone is received 11.382 -> Packet A|1|S0|ec506fb03220c8d8|31|1 AckFrame[1-0|Δ0] 11.382 <- (4) Packet A|2|S0|c80c2ccbfed8dd77|1054|1 StreamFrame[0(CIB),0,1024,fin] 11.383 Finished downloading https://server4:443/dsgfdcnntu at 32:45.067 on ClientConnection[99cdff95760314e2/c80c2ccbfed8dd77(V1) with server4/193.167.100.100:443] 11.383 Closing ClientConnection[99cdff95760314e2/c80c2ccbfed8dd77(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.383 -> Packet A|2|S0|ec506fb03220c8d8|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 11.384 Creating connection with server4:443 with v1 11.384 Setting up connection for downloading https://server4:443/jmqcnnkhqt at 32:45.068 on ClientConnection[d9587747fe8ebec4/0f92b2a6a9c3ab87(V1) with server4/193.167.100.100:443] 11.384 Original destination connection id: d9587747fe8ebec4 (scid: 0f92b2a6a9c3ab87) >- CryptoStream[I|ClientHello] 11.385 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.585/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.385 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.414 <- (5) Packet A|3|S0|c80c2ccbfed8dd77|30|1 ConnectionCloseFrame[0|1|] 11.585 loss detection timeout handler running Sending probe 0, because no ack since 11.385. Current RTT: 100/25. 11.585 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.585 (Probe is an initial retransmit) 11.586 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.986/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.585 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.619 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 11.619 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[1-0|Δ0] 11.622 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.622 probe count not reset on ack because handshake not yet confirmed reschedule loss detection timer for PTO over 399 millis, based on 12.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.622 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 11.622 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 12.022/Handshake, because peerAwaitingAddressValidation | RTT:100/25 11.619 <- (1) Packet H|1|L|983|2 CryptoFrame[0,730] Padding(207) >- CryptoStream[H|Finished] 11.625 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.819/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.625 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.626 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.626 Starting downloading https://server4:443/jmqcnnkhqt at 32:45.310 on ClientConnection[d9587747fe8ebec4/0f92b2a6a9c3ab87(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 11.723/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.626 Discarding pn space Initial because first Handshake message is being sent 11.627 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.724/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.626 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|a26530c16fb6f354|47|1 StreamFrame[0(CIB),0,17,fin]] 11.658 <- (2) Packet H|2|L|46|1 AckFrame[0|Δ0] 11.658 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 11.659 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 11.658 <- (2) Packet A|0|S0|0f92b2a6a9c3ab87|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 11.658 <- (3) Packet A|1|S0|0f92b2a6a9c3ab87|94|3 HandshakeDoneFrame[] NewTokenFrame[b74722a160388825c8f09a758cf8e2ec18c8ec950d69abc123e2172a751ab9b7a3c6b19cb2] NewConnectionIdFrame[1,<0|7e1ec62455f5b022|1d1da344ee48f5453746553cc963893a] 11.659 State is set to Confirmed reschedule loss detection timer for PTO over 72 millis, based on 11.732/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 72 millis, based on 11.732/App, because ackElicitingInFlight | RTT:33/12 11.660 Discarding pn space Handshake because HandshakeDone is received 11.660 -> Packet A|1|S0|a26530c16fb6f354|31|1 AckFrame[1-0|Δ0] 11.732 loss detection timeout handler running Sending probe 0, because no ack since 11.626. Current RTT: 33/12. 11.732 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 211 millis, based on 11.944/App, because ackElicitingInFlight | RTT:33/12 11.732 -> Packet PA|2|S0|a26530c16fb6f354|47|1 StreamFrame[0(CIB),0,17,fin] 11.882 <- (4) Packet A|3|S0|0f92b2a6a9c3ab87|1054|1 StreamFrame[0(CIB),0,1024,fin] 11.883 Finished downloading https://server4:443/jmqcnnkhqt at 32:45.567 on ClientConnection[d9587747fe8ebec4/0f92b2a6a9c3ab87(V1) with server4/193.167.100.100:443] 11.883 <- (5) Packet A|4|S0|0f92b2a6a9c3ab87|1054|1 StreamFrame[0(CIB),0,1024,fin] 11.883 Closing ClientConnection[d9587747fe8ebec4/0f92b2a6a9c3ab87(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.883 Receiving frame for non-existent stream 0 11.883 -> Packet A|3|S0|a26530c16fb6f354|37|2 AckFrame[4-3,1-0|Δ0] ConnectionCloseFrame[0|0|] 11.884 Creating connection with server4:443 with v1 11.884 Setting up connection for downloading https://server4:443/wewemcaitw at 32:45.569 on ClientConnection[979cb4acc3ed0ad2/a892c71163b90acb(V1) with server4/193.167.100.100:443] 11.884 Original destination connection id: 979cb4acc3ed0ad2 (scid: a892c71163b90acb) >- CryptoStream[I|ClientHello] 11.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.086/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.886 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.921 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 11.922 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.122/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.921 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 11.924 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.026/Handshake, because peerAwaitingAddressValidation | RTT:34/17 11.924 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 11.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.029/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.927 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.927 Starting downloading https://server4:443/wewemcaitw at 32:45.611 on ClientConnection[979cb4acc3ed0ad2/a892c71163b90acb(V1) with server4/193.167.100.100:443] 11.927 -> Packet H|1|L|46|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 101 millis, based on 12.029/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.927 Discarding pn space Initial because first Handshake message is being sent 11.928 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.030/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.927 -> Packet A|0|S0|411faa9a1d9f1b94|47|1 StreamFrame[0(CIB),0,17,fin] 12.029 loss detection timeout handler running Sending probe 0, because no ack since 11.927. Current RTT: 34/17. 12.029 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.029 (Probe is a handshake retransmit) 12.029 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 12.233/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.029 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 12.062 <- (2) Packet H|1|L|46|1 AckFrame[2-1|Δ0] 12.062 probe count not reset on ack because handshake not yet confirmed 12.063 Retransmitting CryptoFrame[0,36] on level Handshake 12.063 Cwnd(-): 6000; inflight: 47 12.063 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 12.063 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 12.063 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 171 millis, based on 12.235/Handshake, because ackElicitingInFlight | RTT:34/13 12.063 -> Packet H|3|L|80|1 CryptoFrame[0,36] 12.062 <- (2) Packet A|0|S0|a892c71163b90acb|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.062 <- (3) Packet A|1|S0|a892c71163b90acb|100|4 AckFrame[0|Δ104] HandshakeDoneFrame[] NewTokenFrame[b72c9e7a7ef948b536ae17b0b9970ba8f3f13f5e6eb23fd3f240ab38949681767e002db726] NewConnectionIdFrame[1,<0|c98528ccdec89c41|2d4c375bb76981e6c0005774a04c79ea] reschedule loss detection timer for PTO over 85 millis, based on 12.149/Handshake, because ackElicitingInFlight | RTT:34/13 12.064 State is set to Confirmed reschedule loss detection timer for PTO over 158 millis, based on 12.222/Handshake, because ackElicitingInFlight | RTT:43/29 12.064 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.064 Discarding pn space Handshake because HandshakeDone is received 12.064 -> Packet A|1|S0|411faa9a1d9f1b94|31|1 AckFrame[1-0|Δ0] 12.080 <- (6) Packet A|5|S0|0f92b2a6a9c3ab87|1054|1 StreamFrame[0(CIB),0,1024,fin] 12.081 -> Packet A|4|S0|a26530c16fb6f354|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1-0|Δ0] 12.112 <- (7) Packet A|7|S0|0f92b2a6a9c3ab87|30|1 ConnectionCloseFrame[0|1|] 12.180 <- (4) Packet A|3|S0|a892c71163b90acb|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.180 <- (5) Packet A|4|S0|a892c71163b90acb|94|3 HandshakeDoneFrame[] NewTokenFrame[b72c9e7a7ef948b536ae17b0b9970ba8f3f13f5e6eb23fd3f240ab38949681767e002db726] NewConnectionIdFrame[1,<0|c98528ccdec89c41|2d4c375bb76981e6c0005774a04c79ea] 12.180 -> Packet A|2|S0|411faa9a1d9f1b94|33|1 AckFrame[4-3,1-0|Δ0] 12.380 <- (6) Packet A|5|S0|a892c71163b90acb|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.400 -> Packet A|3|S0|411faa9a1d9f1b94|34|1 AckFrame[5-3,1-0|Δ19] 12.742 <- (7) Packet A|8|S0|a892c71163b90acb|94|3 HandshakeDoneFrame[] NewTokenFrame[b72c9e7a7ef948b536ae17b0b9970ba8f3f13f5e6eb23fd3f240ab38949681767e002db726] NewConnectionIdFrame[1,<0|c98528ccdec89c41|2d4c375bb76981e6c0005774a04c79ea] 12.762 -> Packet A|4|S0|411faa9a1d9f1b94|36|1 AckFrame[8,5-3,1-0|Δ19] 12.795 <- (8) Packet A|9|S0|a892c71163b90acb|1054|1 StreamFrame[0(CIB),0,1024,fin] 12.796 Finished downloading https://server4:443/wewemcaitw at 32:46.480 on ClientConnection[979cb4acc3ed0ad2/a892c71163b90acb(V1) with server4/193.167.100.100:443] 12.796 Closing ClientConnection[979cb4acc3ed0ad2/a892c71163b90acb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.797 Creating connection with server4:443 with v1 12.797 -> Packet A|5|S0|411faa9a1d9f1b94|39|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,5-3,1-0|Δ0] 12.797 Setting up connection for downloading https://server4:443/giofubyusu at 32:46.482 on ClientConnection[7e327090d7cc3e46/14bb54d443b9dd63(V1) with server4/193.167.100.100:443] 12.797 Original destination connection id: 7e327090d7cc3e46 (scid: 14bb54d443b9dd63) >- CryptoStream[I|ClientHello] 12.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.999/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.799 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.833 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 12.834 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.034/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.833 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 12.836 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.939/Handshake, because peerAwaitingAddressValidation | RTT:34/17 12.836 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 12.839 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.941/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.839 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.839 Starting downloading https://server4:443/giofubyusu at 32:46.524 on ClientConnection[7e327090d7cc3e46/14bb54d443b9dd63(V1) with server4/193.167.100.100:443] 12.839 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.941/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.839 Discarding pn space Initial because first Handshake message is being sent 12.839 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 12.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.942/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.840 -> Packet A|0|S0|f6283abc237582e7|47|1 StreamFrame[0(CIB),0,17,fin] 12.872 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 12.872 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 12.872 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 12.872 <- (2) Packet A|0|S0|14bb54d443b9dd63|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.872 <- (3) Packet A|1|S0|14bb54d443b9dd63|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b72f0a83c676a84001263ba9600723dd6182c69899c14eaf31e1e85d9f61e6f3a7ddae301f] NewConnectionIdFrame[1,<0|4db21ba2e2ab0d19|7af0da68108dc99245afc9b49bc13f2d] 12.873 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.873 State is set to Confirmed 12.873 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.873 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.873 Discarding pn space Handshake because HandshakeDone is received 12.873 -> Packet A|1|S0|f6283abc237582e7|31|1 AckFrame[1-0|Δ0] 12.874 <- (4) Packet A|2|S0|14bb54d443b9dd63|1054|1 StreamFrame[0(CIB),0,1024,fin] 12.874 Finished downloading https://server4:443/giofubyusu at 32:46.559 on ClientConnection[7e327090d7cc3e46/14bb54d443b9dd63(V1) with server4/193.167.100.100:443] 12.874 Closing ClientConnection[7e327090d7cc3e46/14bb54d443b9dd63(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.875 Creating connection with server4:443 with v1 12.875 -> Packet A|2|S0|f6283abc237582e7|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 12.876 Setting up connection for downloading https://server4:443/ikmxuaoymb at 32:46.560 on ClientConnection[e11c2f7893aa8c90/1b9648ffd8a9aa5d(V1) with server4/193.167.100.100:443] 12.876 Original destination connection id: e11c2f7893aa8c90 (scid: 1b9648ffd8a9aa5d) >- CryptoStream[I|ClientHello] 12.877 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.077/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.877 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.913 <- (9) Packet A|10|S0|a892c71163b90acb|1054|1 StreamFrame[0(CIB),0,1024,fin] 12.913 -> Packet A|6|S0|411faa9a1d9f1b94|39|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,5-3,1-0|Δ0] 12.914 <- (10) Packet A|11|S0|a892c71163b90acb|1054|1 StreamFrame[0(CIB),0,1024,fin] 12.914 -> Packet A|7|S0|411faa9a1d9f1b94|39|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,5-3,1-0|Δ0] 12.945 <- (11) Packet A|12|S0|a892c71163b90acb|30|1 ConnectionCloseFrame[0|1|] 12.986 <- (5) Packet A|3|S0|14bb54d443b9dd63|1054|1 StreamFrame[0(CIB),0,1024,fin] 12.986 -> Packet A|3|S0|f6283abc237582e7|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 13.018 <- (6) Packet A|5|S0|14bb54d443b9dd63|30|1 ConnectionCloseFrame[0|1|] 13.076 loss detection timeout handler running Sending probe 0, because no ack since 12.877. Current RTT: 100/25. 13.076 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.076 (Probe is an initial retransmit) 13.076 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.476/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.076 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.111 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 13.112 probe count not reset on ack because handshake not yet confirmed 13.112 Retransmitting CryptoFrame[0,257] on level Initial 13.112 Cwnd(-): 6000; inflight: 0 13.112 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.512/Initial, because peerAwaitingAddressValidation | RTT:100/25 13.112 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 13.316/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.112 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 13.114 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 13.318/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.111 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,729] Padding(249) 13.114 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 13.117 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 13.321/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.117 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.117 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.117 Starting downloading https://server4:443/ikmxuaoymb at 32:46.802 on ClientConnection[e11c2f7893aa8c90/1b9648ffd8a9aa5d(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 13.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.117 Discarding pn space Initial because first Handshake message is being sent 13.117 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 13.118 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.220/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.118 -> Packet A|0|S0|711fae4cca93f098|47|1 StreamFrame[0(CIB),0,17,fin] 13.219 loss detection timeout handler running Sending probe 0, because no ack since 13.117. Current RTT: 34/17. 13.219 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.219 (Probe is a handshake retransmit) 13.219 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 13.424/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.219 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 13.252 <- (2) Packet A|1|S0|1b9648ffd8a9aa5d|94|3 HandshakeDoneFrame[] NewTokenFrame[b729744058d14d54b17854b82746db19aec314aa76d653209a79543373fbb91956d3099d33] NewConnectionIdFrame[1,<0|f932ee08f155334f|a6fc9de809f07e0e798f6b7e330f4e71] 13.252 State is set to Confirmed reschedule loss detection timer for PTO over 119 millis, based on 13.372/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -7 millis, based on 13.245/App, because ackElicitingInFlight | RTT:34/17 13.253 Discarding pn space Handshake because HandshakeDone is received 13.253 loss detection timeout handler running Sending probe 0, because no ack since 13.118. Current RTT: 34/17. 13.253 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 13.507/App, because ackElicitingInFlight | RTT:34/17 13.253 -> Packet PA|1|S0|711fae4cca93f098|47|1 StreamFrame[0(CIB),0,17,fin] 13.272 -> Packet A|2|S0|711fae4cca93f098|32|1 AckFrame[1|Δ19] 13.392 <- (3) Packet A|2|S0|1b9648ffd8a9aa5d|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 13.412 -> Packet A|3|S0|711fae4cca93f098|32|1 AckFrame[2-1|Δ19] 13.506 loss detection timeout handler running Sending probe 1, because no ack since 13.253. Current RTT: 34/17. 13.506 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 14.014/App, because ackElicitingInFlight | RTT:34/17 13.506 -> Packet PA|4|S0|711fae4cca93f098|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 14.015/App, because ackElicitingInFlight | RTT:34/17 13.507 -> Packet PA|5|S0|711fae4cca93f098|47|1 StreamFrame[0(CIB),0,17,fin] 13.539 <- (4) Packet A|4|S0|1b9648ffd8a9aa5d|31|1 AckFrame[5-3|Δ0] 13.539 Cwnd(-): 3000; inflight: 0 13.539 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.539 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 114 millis, based on 13.654/App, because ackElicitingInFlight | RTT:34/14 13.539 -> Packet A|6|S0|711fae4cca93f098|47|1 StreamFrame[0(CIB),0,17,fin] 13.540 <- (5) Packet A|5|S0|1b9648ffd8a9aa5d|1054|1 StreamFrame[0(CIB),0,1024,fin] 13.541 Finished downloading https://server4:443/ikmxuaoymb at 32:47.225 on ClientConnection[e11c2f7893aa8c90/1b9648ffd8a9aa5d(V1) with server4/193.167.100.100:443] 13.541 Closing ClientConnection[e11c2f7893aa8c90/1b9648ffd8a9aa5d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.541 -> Packet A|7|S0|711fae4cca93f098|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 13.541 Creating connection with server4:443 with v1 13.542 Setting up connection for downloading https://server4:443/logpneshke at 32:47.226 on ClientConnection[e00eeb709e4c3ed4/990818efae0f961d(V1) with server4/193.167.100.100:443] 13.542 Original destination connection id: e00eeb709e4c3ed4 (scid: 990818efae0f961d) >- CryptoStream[I|ClientHello] 13.544 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.744/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.543 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.743 loss detection timeout handler running Sending probe 0, because no ack since 13.543. Current RTT: 100/25. 13.743 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.743 (Probe is an initial retransmit) 13.743 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.143/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.743 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.777 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 13.777 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[1-0|Δ0] 13.779 probe count not reset on ack because handshake not yet confirmed 13.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 14.179/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.779 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) reschedule loss detection timer for PTO over 399 millis, based on 14.179/Handshake, because peerAwaitingAddressValidation | RTT:100/25 13.777 <- (1) Packet H|1|L|983|2 CryptoFrame[0,730] Padding(207) >- CryptoStream[H|Finished] 13.782 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.976/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.782 -> Packet H|0|L|80|1 CryptoFrame[0,36] 13.782 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.782 Starting downloading https://server4:443/logpneshke at 32:47.467 on ClientConnection[e00eeb709e4c3ed4/990818efae0f961d(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 13.879/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.782 Discarding pn space Initial because first Handshake message is being sent 13.782 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 13.783 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.783 -> Packet A|0|S0|f5286fca45a72dd9|47|1 StreamFrame[0(CIB),0,17,fin] 13.879 loss detection timeout handler running Sending probe 0, because no ack since 13.782. Current RTT: 33/16. 13.879 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.879 (Probe is a handshake retransmit) 13.880 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.074/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.880 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 13.913 <- (2) Packet A|1|S0|990818efae0f961d|94|3 HandshakeDoneFrame[] NewTokenFrame[b7742fa45d143f60a7a6a8c079e298ba2275ff8af8c872109533bf0d372a11cd7f44f8caf7] NewConnectionIdFrame[1,<0|52c25be587ecebdf|a1c13a9ea17410f39ae5f0752418aea1] 13.913 State is set to Confirmed reschedule loss detection timer for PTO over 113 millis, based on 14.027/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -8 millis, based on 13.905/App, because ackElicitingInFlight | RTT:33/16 13.913 Discarding pn space Handshake because HandshakeDone is received 13.913 loss detection timeout handler running Sending probe 0, because no ack since 13.783. Current RTT: 33/16. 13.913 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 14.158/App, because ackElicitingInFlight | RTT:33/16 13.914 -> Packet PA|1|S0|f5286fca45a72dd9|47|1 StreamFrame[0(CIB),0,17,fin] 13.933 -> Packet A|2|S0|f5286fca45a72dd9|32|1 AckFrame[1|Δ19] 13.946 <- (3) Packet A|2|S0|990818efae0f961d|1060|2 AckFrame[1|Δ1] StreamFrame[0(CIB),0,1024,fin] 13.947 Cwnd(-): 6000; inflight: 0 13.947 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.947 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 105 millis, based on 14.053/App, because ackElicitingInFlight | RTT:33/12 13.947 -> Packet A|3|S0|f5286fca45a72dd9|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] 13.947 Finished downloading https://server4:443/logpneshke at 32:47.632 on ClientConnection[e00eeb709e4c3ed4/990818efae0f961d(V1) with server4/193.167.100.100:443] 13.947 Closing ClientConnection[e00eeb709e4c3ed4/990818efae0f961d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.948 -> Packet A|4|S0|f5286fca45a72dd9|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 13.948 Creating connection with server4:443 with v1 13.949 Setting up connection for downloading https://server4:443/gnymsgtwny at 32:47.633 on ClientConnection[93878d310aeb9ca0/916814041f5d201b(V1) with server4/193.167.100.100:443] 13.949 Original destination connection id: 93878d310aeb9ca0 (scid: 916814041f5d201b) >- CryptoStream[I|ClientHello] 13.951 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.151/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.950 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.965 <- (4) Packet A|3|S0|990818efae0f961d|544|1 CryptoFrame[0,514] 13.965 -> Packet A|5|S0|f5286fca45a72dd9|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 14.150 loss detection timeout handler running Sending probe 0, because no ack since 13.950. Current RTT: 100/25. 14.150 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.150 (Probe is an initial retransmit) 14.150 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.551/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.150 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.550 loss detection timeout handler running Sending probe 1, because no ack since 14.150. Current RTT: 100/25. 14.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.550 (Probe is an initial retransmit) 14.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.350/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.550 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.351/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.551 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.584 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 14.584 <- (1) Packet I|2|L|49|1 Token=[] AckFrame[2,0|Δ0] 14.587 probe count not reset on ack because handshake not yet confirmed 14.587 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 15.387/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.587 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 14.587 Cwnd(-): 6000; inflight: 2401 14.587 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 15.387/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.584 <- (1) Packet H|1|L|981|2 CryptoFrame[0,731] Padding(204) >- CryptoStream[H|Finished] 14.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 14.978/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.590 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.687/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.590 Starting downloading https://server4:443/gnymsgtwny at 32:48.274 on ClientConnection[93878d310aeb9ca0/916814041f5d201b(V1) with server4/193.167.100.100:443] 14.590 Discarding pn space Initial because first Handshake message is being sent 14.591 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.688/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.591 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|fff197fedaf57ee2|47|1 StreamFrame[0(CIB),0,17,fin]] 14.623 <- (2) Packet A|1|S0|916814041f5d201b|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b7e9e80991547aa5201f8ae439a1422ebc97c182851f01c814ddf1a479566e479dc4e18654] NewConnectionIdFrame[1,<0|0b1a9f453c9a7274|f76b3914e3badcab53870d25835f9104] 14.624 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.721/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.624 State is set to Confirmed reschedule loss detection timer for PTO over 46 millis, based on 14.671/Handshake, because ackElicitingInFlight | RTT:33/12 14.624 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.624 Discarding pn space Handshake because HandshakeDone is received 14.643 -> Packet A|1|S0|fff197fedaf57ee2|32|1 AckFrame[1|Δ19] 14.675 <- (3) Packet A|3|S0|916814041f5d201b|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 14.695 -> Packet A|2|S0|fff197fedaf57ee2|34|1 AckFrame[3,1|Δ19] 14.763 <- (4) Packet A|5|S0|916814041f5d201b|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 14.782 -> Packet A|3|S0|fff197fedaf57ee2|36|1 AckFrame[5,3,1|Δ19] 14.815 <- (5) Packet A|6|S0|916814041f5d201b|1054|1 StreamFrame[0(CIB),0,1024,fin] 14.815 Finished downloading https://server4:443/gnymsgtwny at 32:48.500 on ClientConnection[93878d310aeb9ca0/916814041f5d201b(V1) with server4/193.167.100.100:443] 14.815 Closing ClientConnection[93878d310aeb9ca0/916814041f5d201b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.815 -> Packet A|4|S0|fff197fedaf57ee2|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3,1|Δ0] 14.816 Creating connection with server4:443 with v1 14.816 Setting up connection for downloading https://server4:443/iqwweikrkj at 32:48.501 on ClientConnection[475395068b36084d/ab193219897b4a4a(V1) with server4/193.167.100.100:443] 14.816 Original destination connection id: 475395068b36084d (scid: ab193219897b4a4a) >- CryptoStream[I|ClientHello] 14.818 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.018/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.818 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.847 <- (6) Packet A|7|S0|916814041f5d201b|30|1 ConnectionCloseFrame[0|1|] 14.852 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 14.853 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.053/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.852 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,729] Padding(249) 14.855 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 14.957/Handshake, because peerAwaitingAddressValidation | RTT:34/17 14.855 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 14.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 14.959/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.857 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 14.959/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.857 Starting downloading https://server4:443/iqwweikrkj at 32:48.542 on ClientConnection[475395068b36084d/ab193219897b4a4a(V1) with server4/193.167.100.100:443] 14.857 Discarding pn space Initial because first Handshake message is being sent 14.857 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 14.858 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 14.960/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.858 -> Packet A|0|S0|cfa60f9986d02e0b|47|1 StreamFrame[0(CIB),0,17,fin] 14.890 <- (2) Packet A|1|S0|ab193219897b4a4a|100|4 AckFrame[0|Δ2] HandshakeDoneFrame[] NewTokenFrame[b7fa81add7939c20d6dc65266f364264854eedb329c02e23098500cf29aaebc34280f65a28] NewConnectionIdFrame[1,<0|a160a63b3b87a00b|3951b3bcf1c9d792803228172b2c4a39] 14.891 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 14.993/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.891 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 14.943/Handshake, because ackElicitingInFlight | RTT:34/13 14.891 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.891 Discarding pn space Handshake because HandshakeDone is received 14.892 <- (3) Packet A|2|S0|ab193219897b4a4a|1054|1 StreamFrame[0(CIB),0,1024,fin] 14.893 -> Packet A|1|S0|cfa60f9986d02e0b|32|1 AckFrame[2-1|Δ1] 14.893 Finished downloading https://server4:443/iqwweikrkj at 32:48.577 on ClientConnection[475395068b36084d/ab193219897b4a4a(V1) with server4/193.167.100.100:443] 14.893 Closing ClientConnection[475395068b36084d/ab193219897b4a4a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.893 -> Packet A|2|S0|cfa60f9986d02e0b|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 14.893 Creating connection with server4:443 with v1 14.894 Setting up connection for downloading https://server4:443/ebhyyjuwle at 32:48.578 on ClientConnection[ad6ac9fde39e6ff9/8520f5e43549ffb2(V1) with server4/193.167.100.100:443] 14.894 Original destination connection id: ad6ac9fde39e6ff9 (scid: 8520f5e43549ffb2) >- CryptoStream[I|ClientHello] 14.895 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.095/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.895 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.929 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.930 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.130/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.929 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,730] Padding(249) 14.932 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.034/Handshake, because peerAwaitingAddressValidation | RTT:34/17 14.932 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 14.933 <- (4) Packet A|3|S0|ab193219897b4a4a|544|1 CryptoFrame[0,514] 14.933 -> Packet A|3|S0|cfa60f9986d02e0b|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] >- CryptoStream[H|Finished] 14.935 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.037/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.935 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.935 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.935 Starting downloading https://server4:443/ebhyyjuwle at 32:48.620 on ClientConnection[ad6ac9fde39e6ff9/8520f5e43549ffb2(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 15.037/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.936 Discarding pn space Initial because first Handshake message is being sent 14.935 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 14.936 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.038/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.936 -> Packet A|0|S0|6b48563da7e32bd4|47|1 StreamFrame[0(CIB),0,17,fin] 14.964 <- (5) Packet A|4|S0|ab193219897b4a4a|30|1 ConnectionCloseFrame[0|1|] 14.968 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 14.968 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 14.968 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 14.968 <- (2) Packet A|0|S0|8520f5e43549ffb2|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 14.969 <- (3) Packet A|1|S0|8520f5e43549ffb2|100|4 AckFrame[0|Δ2] HandshakeDoneFrame[] NewTokenFrame[b76b3ee9a0387738c6b48a1575922219e5ab763c9347904ae4bbaf1f427f0283ebc2228d31] NewConnectionIdFrame[1,<0|7b7d1445c106e864|569984a93f260f10d4e1b2fc23517a08] 14.969 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.969 State is set to Confirmed 14.969 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.969 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.969 Discarding pn space Handshake because HandshakeDone is received 14.969 -> Packet A|1|S0|6b48563da7e32bd4|31|1 AckFrame[1-0|Δ0] 15.110 <- (4) Packet A|4|S0|8520f5e43549ffb2|1054|1 StreamFrame[0(CIB),0,1024,fin] 15.111 Finished downloading https://server4:443/ebhyyjuwle at 32:48.795 on ClientConnection[ad6ac9fde39e6ff9/8520f5e43549ffb2(V1) with server4/193.167.100.100:443] 15.111 Closing ClientConnection[ad6ac9fde39e6ff9/8520f5e43549ffb2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.111 Creating connection with server4:443 with v1 15.111 -> Packet A|2|S0|6b48563da7e32bd4|37|2 ConnectionCloseFrame[0|0|] AckFrame[4,1-0|Δ0] 15.112 Setting up connection for downloading https://server4:443/jfqklxuxtk at 32:48.796 on ClientConnection[b8c2ac91dde8d1eb/4f7beff536eddbbe(V1) with server4/193.167.100.100:443] 15.112 Original destination connection id: b8c2ac91dde8d1eb (scid: 4f7beff536eddbbe) >- CryptoStream[I|ClientHello] 15.113 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.313/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.113 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.143 <- (5) Packet A|5|S0|8520f5e43549ffb2|30|1 ConnectionCloseFrame[0|1|] 15.147 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.148 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.348/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.150 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.147 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,730] Padding(249) reschedule loss detection timer for PTO over 101 millis, based on 15.252/Handshake, because peerAwaitingAddressValidation | RTT:34/17 15.150 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 15.152 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.254/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.152 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.152 Starting downloading https://server4:443/jfqklxuxtk at 32:48.837 on ClientConnection[b8c2ac91dde8d1eb/4f7beff536eddbbe(V1) with server4/193.167.100.100:443] 15.152 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.254/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.152 Discarding pn space Initial because first Handshake message is being sent 15.152 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 15.153 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.255/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.153 -> Packet A|0|S0|fa15f59da7057abe|47|1 StreamFrame[0(CIB),0,17,fin] 15.254 loss detection timeout handler running Sending probe 0, because no ack since 15.152. Current RTT: 34/17. 15.254 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.254 (Probe is a handshake retransmit) 15.254 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 15.458/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.254 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 15.287 <- (2) Packet H|1|L|46|1 AckFrame[2|Δ0] 15.287 probe count not reset on ack because handshake not yet confirmed 15.287 Retransmitting CryptoFrame[0,36] on level Handshake 15.287 Cwnd(-): 6000; inflight: 47 15.287 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.287 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 15.287 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 171 millis, based on 15.459/Handshake, because ackElicitingInFlight | RTT:34/13 15.287 <- (2) Packet A|0|S0|4f7beff536eddbbe|544|1 CryptoFrame[0,514] 15.287 -> Packet H|3|L|85|2 CryptoFrame[0,36] AckFrame[0|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.287 <- (3) Packet A|1|S0|4f7beff536eddbbe|94|3 HandshakeDoneFrame[] NewTokenFrame[b707853770d8315be19eab717d1d7002582cef537d886be82e890df8e69296e1a666f70d55] NewConnectionIdFrame[1,<0|8267fb0f592a4925|2f13094057a00574c762e61a5b9049d2] 15.288 State is set to Confirmed reschedule loss detection timer for PTO over 86 millis, based on 15.375/App, because ackElicitingInFlight | RTT:34/13 reschedule loss detection timer for PTO over -24 millis, based on 15.264/App, because ackElicitingInFlight | RTT:34/13 15.288 loss detection timeout handler running 15.288 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 15.153. Current RTT: 34/13. 15.288 (Probe is retransmit on level App) 15.289 -> Packet A|1|S0|fa15f59da7057abe|31|1 AckFrame[1-0|Δ0] reschedule loss detection timer for PTO over 221 millis, based on 15.511/App, because ackElicitingInFlight | RTT:34/13 15.289 -> Packet PA|2|S0|fa15f59da7057abe|47|1 StreamFrame[0(CIB),0,17,fin] 15.322 <- (4) Packet A|2|S0|4f7beff536eddbbe|1060|2 AckFrame[2|Δ1] StreamFrame[0(CIB),0,1024,fin] 15.322 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.322 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 98 millis, based on 15.421/App, because ackElicitingInFlight | RTT:34/10 15.322 -> Packet A|3|S0|fa15f59da7057abe|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1-0|Δ0] 15.323 Finished downloading https://server4:443/jfqklxuxtk at 32:49.007 on ClientConnection[b8c2ac91dde8d1eb/4f7beff536eddbbe(V1) with server4/193.167.100.100:443] 15.323 Closing ClientConnection[b8c2ac91dde8d1eb/4f7beff536eddbbe(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.323 Creating connection with server4:443 with v1 15.323 -> Packet A|4|S0|fa15f59da7057abe|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 15.324 Setting up connection for downloading https://server4:443/smrtmukavm at 32:49.008 on ClientConnection[96425f8cfe30ed92/66a365dee36b7ebe(V1) with server4/193.167.100.100:443] 15.324 Original destination connection id: 96425f8cfe30ed92 (scid: 66a365dee36b7ebe) >- CryptoStream[I|ClientHello] 15.325 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.525/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.325 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.375 <- (5) Packet A|3|S0|4f7beff536eddbbe|32|1 AckFrame[3-2|Δ22] 15.376 -> Packet A|5|S0|fa15f59da7057abe|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 15.420 <- (6) Packet A|4|S0|4f7beff536eddbbe|1054|1 StreamFrame[0(CIB),0,1024,fin] 15.421 -> Packet A|6|S0|fa15f59da7057abe|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 15.452 <- (7) Packet A|6|S0|4f7beff536eddbbe|30|1 ConnectionCloseFrame[0|1|] 15.525 loss detection timeout handler running Sending probe 0, because no ack since 15.325. Current RTT: 100/25. 15.525 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.525 (Probe is an initial retransmit) 15.525 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.925/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.525 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.924 loss detection timeout handler running Sending probe 1, because no ack since 15.525. Current RTT: 100/25. 15.924 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.925 (Probe is an initial retransmit) 15.925 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.725/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.925 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.926 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.726/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.926 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.725 loss detection timeout handler running Sending probe 2, because no ack since 15.926. Current RTT: 100/25. 16.725 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.725 (Probe is an initial retransmit) 16.726 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 18.326/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.725 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.727 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 18.327/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.726 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.759 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[5-2|Δ0] 16.759 probe count not reset on ack because handshake not yet confirmed 16.759 Retransmitting CryptoFrame[0,257] on level Initial 16.759 Cwnd(-): 6000; inflight: 0 16.759 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 18.359/Initial, because peerAwaitingAddressValidation | RTT:100/25 16.759 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 17.528/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.759 -> Packet I|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.957 <- (2) Packet I|3|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 16.957 <- (2) Packet H|1|L|1030|2 CryptoFrame[0,729] Padding(255) 16.960 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 17.728/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.960 -> Packet I|7|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1153) >- CryptoStream[H|Finished] 16.963 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 17.731/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.963 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.963 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 17.059/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.963 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 16.963 Starting downloading https://server4:443/smrtmukavm at 32:50.648 on ClientConnection[96425f8cfe30ed92/66a365dee36b7ebe(V1) with server4/193.167.100.100:443] 16.963 Discarding pn space Initial because first Handshake message is being sent 16.964 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.964 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 17.060/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.964 -> Packet A|0|S0|f2abe16408543866|47|1 StreamFrame[0(CIB),0,17,fin] 16.995 <- (4) Packet H|3|L|46|1 AckFrame[1-0|Δ0] 16.996 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 16.996 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 16.995 <- (4) Packet A|0|S0|66a365dee36b7ebe|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 16.998 <- (5) Packet A|2|S0|66a365dee36b7ebe|1054|1 StreamFrame[0(CIB),0,1024,fin] 16.998 Finished downloading https://server4:443/smrtmukavm at 32:50.683 on ClientConnection[96425f8cfe30ed92/66a365dee36b7ebe(V1) with server4/193.167.100.100:443] 16.998 -> Packet A|1|S0|f2abe16408543866|34|1 AckFrame[2,0|Δ1] 16.998 Closing ClientConnection[96425f8cfe30ed92/66a365dee36b7ebe(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.999 -> Packet A|2|S0|f2abe16408543866|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 16.999 Creating connection with server4:443 with v1 17.000 Setting up connection for downloading https://server4:443/txrzoxwixk at 32:50.684 on ClientConnection[ed448eb3564d24cb/bb8821f41e4c3140(V1) with server4/193.167.100.100:443] 17.000 Original destination connection id: ed448eb3564d24cb (scid: bb8821f41e4c3140) >- CryptoStream[I|ClientHello] 17.001 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.201/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.001 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.036 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 17.036 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.236/Initial, because peerAwaitingAddressValidation | RTT:100/25 17.037 <- (6) Packet A|3|S0|66a365dee36b7ebe|94|3 HandshakeDoneFrame[] NewTokenFrame[b7fb5ca3e267085c1c98ddf80201dfcd046b8efbc1c191768430e956457bf8da486c909b81] NewConnectionIdFrame[1,<0|1401fec4b11ebe45|28befa0e56c90340f8b9d54a0fbc8eaf] 17.038 -> Packet A|3|S0|f2abe16408543866|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] -< CryptoStream[I|ServerHello] 17.038 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.036 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,730] Padding(249) reschedule loss detection timer for PTO over 101 millis, based on 17.141/Handshake, because peerAwaitingAddressValidation | RTT:34/17 17.038 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 17.041 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.041 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.041 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.041 Starting downloading https://server4:443/txrzoxwixk at 32:50.726 on ClientConnection[ed448eb3564d24cb/bb8821f41e4c3140(V1) with server4/193.167.100.100:443] 17.041 Discarding pn space Initial because first Handshake message is being sent 17.041 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 17.042 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.144/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.042 -> Packet A|0|S0|b237b02f11823d8d|47|1 StreamFrame[0(CIB),0,17,fin] 17.073 <- (2) Packet H|1|L|46|1 AckFrame[0|Δ0] 17.074 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 17.074 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 17.073 <- (2) Packet A|0|S0|bb8821f41e4c3140|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 17.074 <- (3) Packet A|1|S0|bb8821f41e4c3140|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b7e8bcdb87a481ff1cb3c036a8850dc8be2949788ae99ff5f378f28fd044249196ccfecf54] NewConnectionIdFrame[1,<0|e473a426512ccad2|8e6bb1352cba574db2bb806ab48e1034] 17.075 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.075 State is set to Confirmed 17.075 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.075 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.075 Discarding pn space Handshake because HandshakeDone is received 17.075 -> Packet A|1|S0|b237b02f11823d8d|31|1 AckFrame[1-0|Δ0] 17.076 <- (4) Packet A|2|S0|bb8821f41e4c3140|1054|1 StreamFrame[0(CIB),0,1024,fin] 17.076 Finished downloading https://server4:443/txrzoxwixk at 32:50.760 on ClientConnection[ed448eb3564d24cb/bb8821f41e4c3140(V1) with server4/193.167.100.100:443] 17.076 Closing ClientConnection[ed448eb3564d24cb/bb8821f41e4c3140(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.076 -> Packet A|2|S0|b237b02f11823d8d|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 17.077 Creating connection with server4:443 with v1 17.077 Setting up connection for downloading https://server4:443/tmcsvhcdkz at 32:50.761 on ClientConnection[1f7f8ef34bda800f/c2c263c76c7e77aa(V1) with server4/193.167.100.100:443] 17.077 Original destination connection id: 1f7f8ef34bda800f (scid: c2c263c76c7e77aa) >- CryptoStream[I|ClientHello] 17.078 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.278/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.078 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.108 <- (5) Packet A|3|S0|bb8821f41e4c3140|30|1 ConnectionCloseFrame[0|1|] 17.112 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 17.112 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.313/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.112 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 17.115 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.217/Handshake, because peerAwaitingAddressValidation | RTT:34/17 17.114 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 17.117 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.116 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.117 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.117 Discarding pn space Initial because first Handshake message is being sent 17.117 Starting downloading https://server4:443/tmcsvhcdkz at 32:50.801 on ClientConnection[1f7f8ef34bda800f/c2c263c76c7e77aa(V1) with server4/193.167.100.100:443] 17.117 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 17.117 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.117 -> Packet A|0|S0|763323e9181d909a|47|1 StreamFrame[0(CIB),0,17,fin] 17.149 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 17.150 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 17.150 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 17.149 <- (2) Packet A|0|S0|c2c263c76c7e77aa|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 17.150 <- (3) Packet A|1|S0|c2c263c76c7e77aa|94|3 HandshakeDoneFrame[] NewTokenFrame[b7d0f5ba1b35760df74b373ec2c6995acc26f15603a602d2b08cebdfc002917eed927574b3] NewConnectionIdFrame[1,<0|b1f705e643680fa8|a6a18840355c370da59a7b320cb29500] 17.150 State is set to Confirmed reschedule loss detection timer for PTO over 93 millis, based on 17.244/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 93 millis, based on 17.244/App, because ackElicitingInFlight | RTT:34/17 17.150 Discarding pn space Handshake because HandshakeDone is received 17.151 -> Packet A|1|S0|763323e9181d909a|31|1 AckFrame[1-0|Δ0] 17.243 loss detection timeout handler running Sending probe 0, because no ack since 17.117. Current RTT: 34/17. 17.244 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 17.498/App, because ackElicitingInFlight | RTT:34/17 17.244 -> Packet PA|2|S0|763323e9181d909a|47|1 StreamFrame[0(CIB),0,17,fin] 17.265 <- (4) Packet A|3|S0|c2c263c76c7e77aa|94|3 HandshakeDoneFrame[] NewTokenFrame[b7d0f5ba1b35760df74b373ec2c6995acc26f15603a602d2b08cebdfc002917eed927574b3] NewConnectionIdFrame[1,<0|b1f705e643680fa8|a6a18840355c370da59a7b320cb29500] 17.284 -> Packet A|3|S0|763323e9181d909a|34|1 AckFrame[3,1-0|Δ19] 17.497 loss detection timeout handler running Sending probe 1, because no ack since 17.244. Current RTT: 34/17. 17.497 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 18.005/App, because ackElicitingInFlight | RTT:34/17 17.497 -> Packet PA|4|S0|763323e9181d909a|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 18.007/App, because ackElicitingInFlight | RTT:34/17 17.499 -> Packet PA|5|S0|763323e9181d909a|47|1 StreamFrame[0(CIB),0,17,fin] 17.531 <- (5) Packet A|5|S0|c2c263c76c7e77aa|1054|1 StreamFrame[0(CIB),0,1024,fin] 17.532 Finished downloading https://server4:443/tmcsvhcdkz at 32:51.216 on ClientConnection[1f7f8ef34bda800f/c2c263c76c7e77aa(V1) with server4/193.167.100.100:443] 17.532 Closing ClientConnection[1f7f8ef34bda800f/c2c263c76c7e77aa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.532 Creating connection with server4:443 with v1 17.532 -> Packet A|6|S0|763323e9181d909a|39|2 ConnectionCloseFrame[0|0|] AckFrame[5,3,1-0|Δ0] 17.533 Setting up connection for downloading https://server4:443/hwvaiiecaa at 32:51.217 on ClientConnection[af8e5e3af370ebc9/543443ccde806f2e(V1) with server4/193.167.100.100:443] 17.533 Original destination connection id: af8e5e3af370ebc9 (scid: 543443ccde806f2e) >- CryptoStream[I|ClientHello] 17.534 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.734/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.534 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.733 loss detection timeout handler running Sending probe 0, because no ack since 17.534. Current RTT: 100/25. 17.733 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.733 (Probe is an initial retransmit) 17.734 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.134/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.734 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.133 loss detection timeout handler running Sending probe 1, because no ack since 17.734. Current RTT: 100/25. 18.133 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.133 (Probe is an initial retransmit) 18.133 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.933/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.133 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.134 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.934/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.134 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.169 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[3|Δ1] CryptoFrame[0,123] 18.169 probe count not reset on ack because handshake not yet confirmed 18.169 Retransmitting CryptoFrame[0,257] on level Initial 18.169 Cwnd(-): 6000; inflight: 1200 18.169 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 18.169 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 18.172 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 18.174 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.174 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.276/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.174 Discarding pn space Initial because first Handshake message is being sent 18.174 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 18.175 Starting downloading https://server4:443/hwvaiiecaa at 32:51.859 on ClientConnection[af8e5e3af370ebc9/543443ccde806f2e(V1) with server4/193.167.100.100:443] 18.175 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.277/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.175 -> Packet A|0|S0|121f26e1c7048fdb|47|1 StreamFrame[0(CIB),0,17,fin] 18.207 <- (2) Packet H|2|L|46|1 AckFrame[1-0|Δ0] 18.208 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 18.208 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 18.207 <- (2) Packet A|0|S0|543443ccde806f2e|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 18.209 <- (3) Packet A|1|S0|543443ccde806f2e|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b7a234a298ef9c5a3798940651055bc0a4f212060d53ea7a3e9c3626c446dfc731299991f0] NewConnectionIdFrame[1,<0|b5d32e7c6300644e|dd30ae705e7b930263480c4e12ba9998] 18.209 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.209 State is set to Confirmed 18.209 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.209 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.209 Discarding pn space Handshake because HandshakeDone is received 18.209 -> Packet A|1|S0|121f26e1c7048fdb|31|1 AckFrame[1-0|Δ0] 18.347 <- (4) Packet A|3|S0|543443ccde806f2e|1054|1 StreamFrame[0(CIB),0,1024,fin] 18.347 Finished downloading https://server4:443/hwvaiiecaa at 32:52.032 on ClientConnection[af8e5e3af370ebc9/543443ccde806f2e(V1) with server4/193.167.100.100:443] 18.347 Closing ClientConnection[af8e5e3af370ebc9/543443ccde806f2e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.348 <- (5) Packet A|4|S0|543443ccde806f2e|1054|1 StreamFrame[0(CIB),0,1024,fin] 18.348 -> Packet A|2|S0|121f26e1c7048fdb|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 18.348 -> Packet A|3|S0|121f26e1c7048fdb|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 18.348 Creating connection with server4:443 with v1 18.349 Setting up connection for downloading https://server4:443/qwakosfdhl at 32:52.033 on ClientConnection[4916ebe0a3cbe674/e1ac4b658d2e1e46(V1) with server4/193.167.100.100:443] 18.349 Original destination connection id: 4916ebe0a3cbe674 (scid: e1ac4b658d2e1e46) >- CryptoStream[I|ClientHello] 18.350 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.550/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.350 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.380 <- (6) Packet A|5|S0|543443ccde806f2e|30|1 ConnectionCloseFrame[0|1|] 18.549 loss detection timeout handler running Sending probe 0, because no ack since 18.350. Current RTT: 100/25. 18.549 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.550 (Probe is an initial retransmit) 18.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.950/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.550 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.949 loss detection timeout handler running Sending probe 1, because no ack since 18.550. Current RTT: 100/25. 18.949 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.949 (Probe is an initial retransmit) 18.950 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.750/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.950 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.951 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.751/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.951 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.985 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 18.985 probe count not reset on ack because handshake not yet confirmed 18.985 Retransmitting CryptoFrame[0,257] on level Initial 18.986 Cwnd(-): 6000; inflight: 0 18.986 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.786/Initial, because peerAwaitingAddressValidation | RTT:100/25 18.986 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 19.394/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.986 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 18.988 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 19.396/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.985 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,729] Padding(250) 18.988 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 18.991 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 19.399/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.991 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.991 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.991 Starting downloading https://server4:443/qwakosfdhl at 32:52.676 on ClientConnection[4916ebe0a3cbe674/e1ac4b658d2e1e46(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 19.093/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.992 Discarding pn space Initial because first Handshake message is being sent 18.991 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 18.992 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.094/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.992 -> Packet A|0|S0|aa2cc9a118fe74c9|47|1 StreamFrame[0(CIB),0,17,fin] 19.024 <- (2) Packet A|1|S0|e1ac4b658d2e1e46|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b775c024abf71e56a722f4e45510347bb54c9caa09e0c2a57c185903c6ec64c0094852c0b7] NewConnectionIdFrame[1,<0|d8d79d8fabc65742|a291d7351a5b09674e75794499fb56eb] 19.025 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.127/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.025 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 19.077/Handshake, because ackElicitingInFlight | RTT:34/13 19.025 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.025 Discarding pn space Handshake because HandshakeDone is received 19.026 <- (3) Packet A|2|S0|e1ac4b658d2e1e46|1054|1 StreamFrame[0(CIB),0,1024,fin] 19.027 -> Packet A|1|S0|aa2cc9a118fe74c9|32|1 AckFrame[2-1|Δ1] 19.027 Finished downloading https://server4:443/qwakosfdhl at 32:52.711 on ClientConnection[4916ebe0a3cbe674/e1ac4b658d2e1e46(V1) with server4/193.167.100.100:443] 19.027 Closing ClientConnection[4916ebe0a3cbe674/e1ac4b658d2e1e46(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.027 -> Packet A|2|S0|aa2cc9a118fe74c9|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 19.027 Creating connection with server4:443 with v1 19.028 Setting up connection for downloading https://server4:443/keggajgxkj at 32:52.712 on ClientConnection[8c1df812bd20b0e9/a41e14078d62c280(V1) with server4/193.167.100.100:443] 19.028 Original destination connection id: 8c1df812bd20b0e9 (scid: a41e14078d62c280) >- CryptoStream[I|ClientHello] 19.029 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.229/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.029 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.059 <- (4) Packet A|3|S0|e1ac4b658d2e1e46|30|1 ConnectionCloseFrame[0|1|] 19.059 <- (5) Packet A|3|S0|e1ac4b658d2e1e46|30|1 ConnectionCloseFrame[0|1|] 19.228 loss detection timeout handler running Sending probe 0, because no ack since 19.029. Current RTT: 100/25. 19.228 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.228 (Probe is an initial retransmit) 19.229 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.629/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.229 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.263 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 19.264 probe count not reset on ack because handshake not yet confirmed 19.264 Retransmitting CryptoFrame[0,257] on level Initial 19.264 Cwnd(-): 6000; inflight: 0 19.264 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.664/Initial, because peerAwaitingAddressValidation | RTT:100/25 19.264 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 19.468/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.264 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 19.263 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,729] Padding(249) 19.266 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 19.471/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.266 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 19.269 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 19.473/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.269 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.269 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.269 Starting downloading https://server4:443/keggajgxkj at 32:52.953 on ClientConnection[8c1df812bd20b0e9/a41e14078d62c280(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 19.371/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.269 Discarding pn space Initial because first Handshake message is being sent 19.269 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 19.269 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.371/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.269 -> Packet A|0|S0|9306c5f3f4ddda41|47|1 StreamFrame[0(CIB),0,17,fin] 19.301 <- (2) Packet H|1|L|46|1 AckFrame[0|Δ0] 19.302 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 19.302 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 19.301 <- (2) Packet A|0|S0|a41e14078d62c280|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 19.321 -> Packet A|1|S0|9306c5f3f4ddda41|32|1 AckFrame[0|Δ19] 19.435 <- (3) Packet A|2|S0|a41e14078d62c280|94|3 HandshakeDoneFrame[] NewTokenFrame[b73a8abbaf6eb959b81040d44849804e737a9ae934af6ac614465e9d1a2631b1f1c658bebe] NewConnectionIdFrame[1,<0|5372e33d3acffae2|b6d6c445c5d283be29f0061b832a2052] 19.436 State is set to Confirmed reschedule loss detection timer for PTO over -55 millis, based on 19.380/App, because ackElicitingInFlight | RTT:34/13 19.436 loss detection timeout handler running Sending probe 0, because no ack since 19.269. Current RTT: 34/13. reschedule loss detection timer for PTO over -55 millis, based on 19.380/App, because ackElicitingInFlight | RTT:34/13 19.436 Discarding pn space Handshake because HandshakeDone is received 19.436 (Probe is retransmit on level App) 19.436 <- (4) Packet A|3|S0|a41e14078d62c280|94|3 HandshakeDoneFrame[] NewTokenFrame[b73a8abbaf6eb959b81040d44849804e737a9ae934af6ac614465e9d1a2631b1f1c658bebe] NewConnectionIdFrame[1,<0|5372e33d3acffae2|b6d6c445c5d283be29f0061b832a2052] reschedule loss detection timer for PTO over 221 millis, based on 19.658/App, because ackElicitingInFlight | RTT:34/13 19.436 -> Packet PA|2|S0|9306c5f3f4ddda41|47|1 StreamFrame[0(CIB),0,17,fin] 19.437 -> Packet A|3|S0|9306c5f3f4ddda41|33|1 AckFrame[3-2,0|Δ0] 19.469 <- (5) Packet A|4|S0|a41e14078d62c280|1060|2 AckFrame[2-1|Δ1] StreamFrame[0(CIB),0,1024,fin] 19.470 Cwnd(-): 3000; inflight: 0 19.470 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.470 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 98 millis, based on 19.569/App, because ackElicitingInFlight | RTT:34/10 19.470 -> Packet A|4|S0|9306c5f3f4ddda41|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3-2|Δ0] 19.470 Finished downloading https://server4:443/keggajgxkj at 32:53.155 on ClientConnection[8c1df812bd20b0e9/a41e14078d62c280(V1) with server4/193.167.100.100:443] 19.470 Closing ClientConnection[8c1df812bd20b0e9/a41e14078d62c280(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.471 -> Packet A|5|S0|9306c5f3f4ddda41|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 19.471 Creating connection with server4:443 with v1 19.472 Setting up connection for downloading https://server4:443/rspithyvna at 32:53.156 on ClientConnection[c671548d9c0ec40f/ddcc8c00c8307e79(V1) with server4/193.167.100.100:443] 19.472 Original destination connection id: c671548d9c0ec40f (scid: ddcc8c00c8307e79) >- CryptoStream[I|ClientHello] 19.473 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.673/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.473 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.507 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 19.508 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.708/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.507 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 19.510 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.612/Handshake, because peerAwaitingAddressValidation | RTT:34/17 19.510 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 19.512 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.614/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.512 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.513 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.513 Starting downloading https://server4:443/rspithyvna at 32:53.197 on ClientConnection[c671548d9c0ec40f/ddcc8c00c8307e79(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 19.615/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.513 Discarding pn space Initial because first Handshake message is being sent 19.513 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 19.513 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.615/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.513 -> Packet A|0|S0|363daad9aee4db6f|47|1 StreamFrame[0(CIB),0,17,fin] 19.545 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 19.546 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 19.546 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 19.545 <- (2) Packet A|0|S0|ddcc8c00c8307e79|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 19.565 -> Packet A|1|S0|363daad9aee4db6f|32|1 AckFrame[0|Δ19] 19.659 <- (3) Packet A|2|S0|ddcc8c00c8307e79|94|3 HandshakeDoneFrame[] NewTokenFrame[b780cd70f5d621e2a50e433646d36f27db947f6e5673a8346e380e68885c828d39db7dd2fe] NewConnectionIdFrame[1,<0|22aa9069cdb86060|494db2282346b649c1e029603f91d9a1] 19.660 State is set to Confirmed reschedule loss detection timer for PTO over -19 millis, based on 19.640/App, because ackElicitingInFlight | RTT:34/17 19.660 loss detection timeout handler running reschedule loss detection timer for PTO over -19 millis, based on 19.640/App, because ackElicitingInFlight | RTT:34/17 19.660 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 19.513. Current RTT: 34/17. 19.660 (Probe is retransmit on level App) 19.660 <- (4) Packet A|3|S0|ddcc8c00c8307e79|94|3 HandshakeDoneFrame[] NewTokenFrame[b780cd70f5d621e2a50e433646d36f27db947f6e5673a8346e380e68885c828d39db7dd2fe] NewConnectionIdFrame[1,<0|22aa9069cdb86060|494db2282346b649c1e029603f91d9a1] reschedule loss detection timer for PTO over 253 millis, based on 19.914/App, because ackElicitingInFlight | RTT:34/17 19.660 -> Packet PA|2|S0|363daad9aee4db6f|54|2 AckFrame[3-2,0|Δ0] StreamFrame[0(CIB),0,17,fin] 19.664 <- (6) Packet A|6|S0|a41e14078d62c280|94|3 HandshakeDoneFrame[] NewTokenFrame[b73a8abbaf6eb959b81040d44849804e737a9ae934af6ac614465e9d1a2631b1f1c658bebe] NewConnectionIdFrame[1,<0|5372e33d3acffae2|b6d6c445c5d283be29f0061b832a2052] 19.664 -> Packet A|6|S0|9306c5f3f4ddda41|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 19.693 <- (5) Packet A|4|S0|ddcc8c00c8307e79|1060|2 AckFrame[2-1|Δ1] StreamFrame[0(CIB),0,1024,fin] 19.694 Cwnd(-): 6000; inflight: 0 19.694 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.694 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 19.805/App, because ackElicitingInFlight | RTT:34/13 19.694 -> Packet A|3|S0|363daad9aee4db6f|47|1 StreamFrame[0(CIB),0,17,fin] 19.695 Finished downloading https://server4:443/rspithyvna at 32:53.379 on ClientConnection[c671548d9c0ec40f/ddcc8c00c8307e79(V1) with server4/193.167.100.100:443] 19.695 Closing ClientConnection[c671548d9c0ec40f/ddcc8c00c8307e79(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.695 -> Packet A|4|S0|363daad9aee4db6f|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 19.695 Creating connection with server4:443 with v1 19.696 Setting up connection for downloading https://server4:443/snnsnsbuwx at 32:53.380 on ClientConnection[4e069b471d527073/04425c078bfe75af(V1) with server4/193.167.100.100:443] 19.696 Original destination connection id: 4e069b471d527073 (scid: 04425c078bfe75af) >- CryptoStream[I|ClientHello] 19.697 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.897/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.697 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.726 <- (6) Packet A|5|S0|ddcc8c00c8307e79|35|2 AckFrame[4-3|Δ0] ConnectionCloseFrame[0|1|] 19.731 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 19.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.931/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.731 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 19.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.836/Handshake, because peerAwaitingAddressValidation | RTT:34/17 19.733 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 19.736 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.838/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.736 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.736 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.838/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.736 Discarding pn space Initial because first Handshake message is being sent 19.736 Starting downloading https://server4:443/snnsnsbuwx at 32:53.421 on ClientConnection[4e069b471d527073/04425c078bfe75af(V1) with server4/193.167.100.100:443] 19.736 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 19.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.839/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.737 -> Packet A|0|S0|3383e2b07caf3731|47|1 StreamFrame[0(CIB),0,17,fin] 19.838 loss detection timeout handler running Sending probe 0, because no ack since 19.736. Current RTT: 34/17. 19.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.838 (Probe is a handshake retransmit) 19.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 20.042/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.838 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 20.042 loss detection timeout handler running Sending probe 1, because no ack since 19.737. Current RTT: 34/17. 20.042 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.042 (Probe is a handshake retransmit) 20.042 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 20.450/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.042 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 20.043 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 20.451/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.043 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 20.075 <- (2) Packet H|1|L|48|1 AckFrame[4-3,1|Δ0] 20.075 probe count not reset on ack because handshake not yet confirmed 20.075 Retransmitting CryptoFrame[0,36] on level Handshake 20.075 Cwnd(-): 6000; inflight: 47 20.075 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 20.075 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 20.075 <- (2) Packet A|0|S0|04425c078bfe75af|544|1 CryptoFrame[0,514] 20.075 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 359 millis, based on 20.435/Handshake, because ackElicitingInFlight | RTT:34/14 20.075 -> Packet H|5|L|80|1 CryptoFrame[0,36] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 20.075 <- (3) Packet A|1|S0|04425c078bfe75af|94|3 HandshakeDoneFrame[] NewTokenFrame[b7bc6819930fc0ef0eb4ab60df044c9c88f8f7f8ba35b6365fec1ff674a67315e715f8d027] NewConnectionIdFrame[1,<0|3ac875c74c0264a2|07682326de233770901a437386f4f941] 20.076 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 20.197/App, because ackElicitingInFlight | RTT:34/14 reschedule loss detection timer for PTO over -224 millis, based on 19.852/App, because ackElicitingInFlight | RTT:34/14 20.076 Discarding pn space Handshake because HandshakeDone is received 20.076 loss detection timeout handler running Sending probe 0, because no ack since 19.737. Current RTT: 34/14. 20.076 (Probe is retransmit on level App) 20.076 -> Packet A|1|S0|3383e2b07caf3731|31|1 AckFrame[1-0|Δ0] reschedule loss detection timer for PTO over 229 millis, based on 20.306/App, because ackElicitingInFlight | RTT:34/14 20.076 -> Packet PA|2|S0|3383e2b07caf3731|47|1 StreamFrame[0(CIB),0,17,fin] 20.232 <- (4) Packet A|3|S0|04425c078bfe75af|1054|1 StreamFrame[0(CIB),0,1024,fin] 20.233 Finished downloading https://server4:443/snnsnsbuwx at 32:53.917 on ClientConnection[4e069b471d527073/04425c078bfe75af(V1) with server4/193.167.100.100:443] 20.233 Closing ClientConnection[4e069b471d527073/04425c078bfe75af(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.233 <- (5) Packet A|4|S0|04425c078bfe75af|1054|1 StreamFrame[0(CIB),0,1024,fin] 20.233 -> Packet A|3|S0|3383e2b07caf3731|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 20.234 -> Packet A|4|S0|3383e2b07caf3731|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 20.234 Creating connection with server4:443 with v1 20.234 Setting up connection for downloading https://server4:443/wntnasnmps at 32:53.919 on ClientConnection[e8bdd6cff12c6c53/4d47110d6467a73c(V1) with server4/193.167.100.100:443] 20.234 Original destination connection id: e8bdd6cff12c6c53 (scid: 4d47110d6467a73c) >- CryptoStream[I|ClientHello] 20.236 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.436/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.235 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.265 <- (6) Packet A|6|S0|04425c078bfe75af|30|1 ConnectionCloseFrame[0|1|] 20.435 loss detection timeout handler running Sending probe 0, because no ack since 20.235. Current RTT: 100/25. 20.435 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.435 (Probe is an initial retransmit) 20.435 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.835/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.435 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.834 loss detection timeout handler running Sending probe 1, because no ack since 20.435. Current RTT: 100/25. 20.835 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.835 (Probe is an initial retransmit) 20.835 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.635/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.835 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.836 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.636/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.836 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.635 loss detection timeout handler running Sending probe 2, because no ack since 20.836. Current RTT: 100/25. 21.635 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.635 (Probe is an initial retransmit) 21.636 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 23.236/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.635 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.637 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 23.237/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.636 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.670 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 21.670 <- (1) Packet I|2|L|49|1 Token=[] AckFrame[5,2|Δ0] 21.673 probe count not reset on ack because handshake not yet confirmed 21.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 23.273/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.673 -> Packet I|6|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 21.673 Retransmitting CryptoFrame[0,257] on level Initial 21.673 Cwnd(-): 6000; inflight: 2401 21.673 -> Packet I|7|L|1200|3 Token=[] CryptoFrame[0,257] AckFrame[1|Δ0] Padding(891) 21.670 <- (1) Packet H|1|L|981|2 CryptoFrame[0,729] Padding(206) >- CryptoStream[H|Finished] 21.675 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.676 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.676 Starting downloading https://server4:443/wntnasnmps at 32:55.360 on ClientConnection[e8bdd6cff12c6c53/4d47110d6467a73c(V1) with server4/193.167.100.100:443] 21.676 Discarding pn space Initial because first Handshake message is being sent 21.676 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 21.676 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.676 -> Packet A|0|S0|99d7d444e7d1495d|47|1 StreamFrame[0(CIB),0,17,fin] 21.772 loss detection timeout handler running Sending probe 0, because no ack since 21.675. Current RTT: 33/16. 21.772 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.773 (Probe is a handshake retransmit) 21.773 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.967/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.773 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 21.805 <- (2) Packet H|2|L|46|1 AckFrame[2-1|Δ0] 21.806 probe count not reset on ack because handshake not yet confirmed 21.806 Retransmitting CryptoFrame[0,36] on level Handshake 21.806 Cwnd(-): 3000; inflight: 47 21.806 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 21.806 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 21.806 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 161 millis, based on 21.968/Handshake, because ackElicitingInFlight | RTT:33/12 21.805 <- (2) Packet A|0|S0|4d47110d6467a73c|544|1 CryptoFrame[0,514] 21.806 -> Packet H|3|L|80|1 CryptoFrame[0,36] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 21.807 <- (3) Packet A|2|S0|4d47110d6467a73c|1054|1 StreamFrame[0(CIB),0,1024,fin] 21.808 -> Packet A|1|S0|99d7d444e7d1495d|34|1 AckFrame[2,0|Δ1] 21.808 Finished downloading https://server4:443/wntnasnmps at 32:55.492 on ClientConnection[e8bdd6cff12c6c53/4d47110d6467a73c(V1) with server4/193.167.100.100:443] 21.808 Closing ClientConnection[e8bdd6cff12c6c53/4d47110d6467a73c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.808 -> Packet A|2|S0|99d7d444e7d1495d|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 21.809 Creating connection with server4:443 with v1 21.809 Setting up connection for downloading https://server4:443/ameatpxmru at 32:55.494 on ClientConnection[14f2e3d277121a09/e4a20c27d43090e4(V1) with server4/193.167.100.100:443] 21.809 Original destination connection id: 14f2e3d277121a09 (scid: e4a20c27d43090e4) >- CryptoStream[I|ClientHello] 21.811 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.011/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.811 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.953 <- (4) Packet A|4|S0|4d47110d6467a73c|94|3 HandshakeDoneFrame[] NewTokenFrame[b7903c58091d6dad5397485a0eb6dda18d13a1c12b8e1db16d1ea85d25274270a8e4f7430b] NewConnectionIdFrame[1,<0|e97ed0c45de38834|9de1acfd3eed7fb008b9dd72b8570b29] 21.954 -> Packet A|3|S0|99d7d444e7d1495d|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 22.010 loss detection timeout handler running Sending probe 0, because no ack since 21.811. Current RTT: 100/25. 22.010 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.010 (Probe is an initial retransmit) 22.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.411/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.010 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.045 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 22.046 probe count not reset on ack because handshake not yet confirmed 22.046 Retransmitting CryptoFrame[0,257] on level Initial 22.046 Cwnd(-): 6000; inflight: 0 22.046 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.446/Initial, because peerAwaitingAddressValidation | RTT:100/25 22.046 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 22.250/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.046 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 22.048 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.045 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) reschedule loss detection timer for PTO over 203 millis, based on 22.252/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.048 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 22.051 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 22.255/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.051 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.051 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.051 Starting downloading https://server4:443/ameatpxmru at 32:55.736 on ClientConnection[14f2e3d277121a09/e4a20c27d43090e4(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 22.153/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.051 Discarding pn space Initial because first Handshake message is being sent 22.052 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 22.052 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.154/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.052 -> Packet A|0|S0|d98a91d05e791064|47|1 StreamFrame[0(CIB),0,17,fin] 22.086 <- (2) Packet A|2|S0|e4a20c27d43090e4|1054|1 StreamFrame[0(CIB),0,1024,fin] 22.087 Finished downloading https://server4:443/ameatpxmru at 32:55.771 on ClientConnection[14f2e3d277121a09/e4a20c27d43090e4(V1) with server4/193.167.100.100:443] 22.087 Closing ClientConnection[14f2e3d277121a09/e4a20c27d43090e4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.087 -> Packet A|1|S0|d98a91d05e791064|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 22.088 Creating connection with server4:443 with v1 22.088 Setting up connection for downloading https://server4:443/oslpcmacgs at 32:55.773 on ClientConnection[90048e52c8bb7a8f/3a2a0a8df2a03b01(V1) with server4/193.167.100.100:443] 22.088 Original destination connection id: 90048e52c8bb7a8f (scid: 3a2a0a8df2a03b01) >- CryptoStream[I|ClientHello] 22.090 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.290/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.089 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.119 <- (3) Packet A|3|S0|e4a20c27d43090e4|30|1 ConnectionCloseFrame[0|1|] 22.119 <- (4) Packet A|3|S0|e4a20c27d43090e4|30|1 ConnectionCloseFrame[0|1|] 22.124 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 22.124 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.324/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.124 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 22.127 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.229/Handshake, because peerAwaitingAddressValidation | RTT:34/17 22.127 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 22.129 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.231/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.129 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.129 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.231/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.129 Discarding pn space Initial because first Handshake message is being sent 22.129 Starting downloading https://server4:443/oslpcmacgs at 32:55.814 on ClientConnection[90048e52c8bb7a8f/3a2a0a8df2a03b01(V1) with server4/193.167.100.100:443] 22.129 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 22.130 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.232/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.130 -> Packet A|0|S0|81b9fcd1b1d9802f|47|1 StreamFrame[0(CIB),0,17,fin] 22.162 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 22.163 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 22.163 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 22.162 <- (2) Packet A|0|S0|3a2a0a8df2a03b01|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.182 -> Packet A|1|S0|81b9fcd1b1d9802f|32|1 AckFrame[0|Δ19] 22.280 <- (3) Packet A|3|S0|3a2a0a8df2a03b01|94|3 HandshakeDoneFrame[] NewTokenFrame[b71586ac4bdf2af5e955a17f4b11f6897d75e5e79bbadd9f71aa43dd03e5c6dff494207c50] NewConnectionIdFrame[1,<0|d323c883f96e2df3|0c4eb9925aa7acbdf8b00061c1759228] 22.280 State is set to Confirmed reschedule loss detection timer for PTO over -23 millis, based on 22.257/App, because ackElicitingInFlight | RTT:34/17 22.280 loss detection timeout handler running Sending probe 0, because no ack since 22.129. Current RTT: 34/17. reschedule loss detection timer for PTO over -23 millis, based on 22.257/App, because ackElicitingInFlight | RTT:34/17 22.280 Discarding pn space Handshake because HandshakeDone is received 22.280 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 22.535/App, because ackElicitingInFlight | RTT:34/17 22.281 -> Packet PA|2|S0|81b9fcd1b1d9802f|47|1 StreamFrame[0(CIB),0,17,fin] 22.300 -> Packet A|3|S0|81b9fcd1b1d9802f|34|1 AckFrame[3,0|Δ19] 22.314 <- (4) Packet A|4|S0|3a2a0a8df2a03b01|1060|2 AckFrame[2-1|Δ1] StreamFrame[0(CIB),0,1024,fin] 22.314 Cwnd(-): 6000; inflight: 0 22.314 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.314 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 110 millis, based on 22.425/App, because ackElicitingInFlight | RTT:34/13 22.314 -> Packet A|4|S0|81b9fcd1b1d9802f|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 22.314 Finished downloading https://server4:443/oslpcmacgs at 32:55.999 on ClientConnection[90048e52c8bb7a8f/3a2a0a8df2a03b01(V1) with server4/193.167.100.100:443] 22.315 Closing ClientConnection[90048e52c8bb7a8f/3a2a0a8df2a03b01(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.315 -> Packet A|5|S0|81b9fcd1b1d9802f|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 22.315 Creating connection with server4:443 with v1 22.316 Setting up connection for downloading https://server4:443/upqziizjjw at 32:56.000 on ClientConnection[272e5fcf341fae65/c49690511ce5d672(V1) with server4/193.167.100.100:443] 22.316 Original destination connection id: 272e5fcf341fae65 (scid: c49690511ce5d672) >- CryptoStream[I|ClientHello] 22.317 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.517/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.317 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.351 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.352 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.552/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.351 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,729] Padding(250) 22.354 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.456/Handshake, because peerAwaitingAddressValidation | RTT:34/17 22.354 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 22.356 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.458/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.356 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.357 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.357 Starting downloading https://server4:443/upqziizjjw at 32:56.041 on ClientConnection[272e5fcf341fae65/c49690511ce5d672(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 22.459/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.357 Discarding pn space Initial because first Handshake message is being sent 22.357 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 22.357 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.459/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.357 -> Packet A|0|S0|19ef4ad2c25c5df2|47|1 StreamFrame[0(CIB),0,17,fin] 22.458 loss detection timeout handler running Sending probe 0, because no ack since 22.356. Current RTT: 34/17. 22.458 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.458 (Probe is a handshake retransmit) 22.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 22.663/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.458 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 22.528 <- (2) Packet A|2|S0|c49690511ce5d672|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.528 <- (3) Packet A|3|S0|c49690511ce5d672|94|3 HandshakeDoneFrame[] NewTokenFrame[b7c77c94e40a868d34e32d9a43d7295b3f7169519d47aa266130b28a120d7821f3aedd73c5] NewConnectionIdFrame[1,<0|9b21f8a00ba3f2dd|bc3719dbe6b3f4aa1b68565260bc25fe] 22.529 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 22.611/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -45 millis, based on 22.484/App, because ackElicitingInFlight | RTT:34/17 22.529 Discarding pn space Handshake because HandshakeDone is received 22.529 loss detection timeout handler running Sending probe 0, because no ack since 22.357. Current RTT: 34/17. 22.529 (Probe is retransmit on level App) 22.529 -> Packet A|1|S0|19ef4ad2c25c5df2|31|1 AckFrame[3-2|Δ0] reschedule loss detection timer for PTO over 253 millis, based on 22.784/App, because ackElicitingInFlight | RTT:34/17 22.530 -> Packet PA|2|S0|19ef4ad2c25c5df2|47|1 StreamFrame[0(CIB),0,17,fin] 22.783 loss detection timeout handler running Sending probe 1, because no ack since 22.530. Current RTT: 34/17. 22.783 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 23.291/App, because ackElicitingInFlight | RTT:34/17 22.783 -> Packet PA|3|S0|19ef4ad2c25c5df2|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 23.292/App, because ackElicitingInFlight | RTT:34/17 22.784 -> Packet PA|4|S0|19ef4ad2c25c5df2|47|1 StreamFrame[0(CIB),0,17,fin] 22.817 <- (4) Packet A|4|S0|c49690511ce5d672|1062|2 AckFrame[4,1|Δ1] StreamFrame[0(CIB),0,1024,fin] 22.818 Cwnd(-): 6000; inflight: 47 22.818 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 22.818 -> Packet A|5|S0|19ef4ad2c25c5df2|47|1 StreamFrame[0(CIB),0,17,fin] 22.819 Finished downloading https://server4:443/upqziizjjw at 32:56.503 on ClientConnection[272e5fcf341fae65/c49690511ce5d672(V1) with server4/193.167.100.100:443] 22.819 Closing ClientConnection[272e5fcf341fae65/c49690511ce5d672(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.819 -> Packet A|6|S0|19ef4ad2c25c5df2|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 22.819 Creating connection with server4:443 with v1 22.820 Setting up connection for downloading https://server4:443/rdsosrbeci at 32:56.504 on ClientConnection[fcaa1805b33406f1/941e3368f2f69d22(V1) with server4/193.167.100.100:443] 22.820 Original destination connection id: fcaa1805b33406f1 (scid: 941e3368f2f69d22) >- CryptoStream[I|ClientHello] 22.821 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.021/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.821 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.855 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 22.856 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.056/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.858 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.855 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) reschedule loss detection timer for PTO over 101 millis, based on 22.960/Handshake, because peerAwaitingAddressValidation | RTT:34/17 22.858 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 22.860 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.962/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.860 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.861 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.861 Discarding pn space Initial because first Handshake message is being sent 22.861 Starting downloading https://server4:443/rdsosrbeci at 32:56.545 on ClientConnection[fcaa1805b33406f1/941e3368f2f69d22(V1) with server4/193.167.100.100:443] 22.861 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 22.861 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.861 -> Packet A|0|S0|9e38f635762e6f0d|47|1 StreamFrame[0(CIB),0,17,fin] 22.871 <- (5) Packet A|5|S0|c49690511ce5d672|34|1 AckFrame[5-4,1|Δ22] 22.871 -> Packet A|7|S0|19ef4ad2c25c5df2|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 22.893 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 22.894 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 22.894 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 22.893 <- (2) Packet A|0|S0|941e3368f2f69d22|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.894 <- (3) Packet A|1|S0|941e3368f2f69d22|100|4 AckFrame[0|Δ2] HandshakeDoneFrame[] NewTokenFrame[b729967cef73d94bf3fd6a4a8582e51aebd28349816ee67a050ce908bbd0c683f964a2170c] NewConnectionIdFrame[1,<0|3a23c1744410b7ea|18f50acc78af303b0255cc3b3e538e20] 22.895 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.895 State is set to Confirmed 22.895 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.895 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.895 Discarding pn space Handshake because HandshakeDone is received 22.895 -> Packet A|1|S0|9e38f635762e6f0d|31|1 AckFrame[1-0|Δ0] 22.896 <- (4) Packet A|2|S0|941e3368f2f69d22|1054|1 StreamFrame[0(CIB),0,1024,fin] 22.896 Finished downloading https://server4:443/rdsosrbeci at 32:56.581 on ClientConnection[fcaa1805b33406f1/941e3368f2f69d22(V1) with server4/193.167.100.100:443] 22.896 Closing ClientConnection[fcaa1805b33406f1/941e3368f2f69d22(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.897 -> Packet A|2|S0|9e38f635762e6f0d|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 22.897 Creating connection with server4:443 with v1 22.897 Setting up connection for downloading https://server4:443/uwqzczacly at 32:56.582 on ClientConnection[404e6f61f0167494/4887838e888f520a(V1) with server4/193.167.100.100:443] 22.897 Original destination connection id: 404e6f61f0167494 (scid: 4887838e888f520a) >- CryptoStream[I|ClientHello] 22.899 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.099/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.899 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.928 <- (5) Packet A|3|S0|941e3368f2f69d22|30|1 ConnectionCloseFrame[0|1|] 22.933 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 22.933 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.133/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.933 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 22.935 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.037/Handshake, because peerAwaitingAddressValidation | RTT:34/17 22.935 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 22.938 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.040/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.938 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.041/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.939 Starting downloading https://server4:443/uwqzczacly at 32:56.623 on ClientConnection[404e6f61f0167494/4887838e888f520a(V1) with server4/193.167.100.100:443] 22.939 Discarding pn space Initial because first Handshake message is being sent 22.939 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 22.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.041/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.939 -> Packet A|0|S0|b9a8c7b5616c43cd|47|1 StreamFrame[0(CIB),0,17,fin] 22.940 <- (6) Packet A|6|S0|c49690511ce5d672|1054|1 StreamFrame[0(CIB),0,1024,fin] 22.941 -> Packet A|8|S0|19ef4ad2c25c5df2|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 23.040 loss detection timeout handler running Sending probe 0, because no ack since 22.938. Current RTT: 34/17. 23.040 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.040 (Probe is a handshake retransmit) 23.041 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 23.245/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.040 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 23.073 <- (2) Packet H|1|L|46|1 AckFrame[2-1|Δ0] 23.073 probe count not reset on ack because handshake not yet confirmed 23.073 Retransmitting CryptoFrame[0,36] on level Handshake 23.073 Cwnd(-): 6000; inflight: 47 23.073 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 23.073 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 23.074 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 171 millis, based on 23.245/Handshake, because ackElicitingInFlight | RTT:34/13 23.073 -> Packet H|3|L|80|1 CryptoFrame[0,36] 23.073 <- (2) Packet A|0|S0|4887838e888f520a|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 23.073 <- (3) Packet A|1|S0|4887838e888f520a|94|3 HandshakeDoneFrame[] NewTokenFrame[b7dde07d39ca9a1f95b0e49e5ebabae9ef7deb2b9567aff6d5ee859b8b04ba7dc7114dee5c] NewConnectionIdFrame[1,<0|2133be05da69154a|36273cad7b946d730c9742059da71d4e] 23.074 State is set to Confirmed reschedule loss detection timer for PTO over 86 millis, based on 23.161/App, because ackElicitingInFlight | RTT:34/13 reschedule loss detection timer for PTO over -24 millis, based on 23.050/App, because ackElicitingInFlight | RTT:34/13 23.074 loss detection timeout handler running 23.074 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 22.939. Current RTT: 34/13. 23.074 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 23.296/App, because ackElicitingInFlight | RTT:34/13 23.074 -> Packet PA|1|S0|b9a8c7b5616c43cd|52|2 AckFrame[1-0|Δ0] StreamFrame[0(CIB),0,17,fin] 23.150 <- (7) Packet A|8|S0|c49690511ce5d672|1054|1 StreamFrame[0(CIB),0,1024,fin] 23.150 <- (8) Packet A|9|S0|c49690511ce5d672|1054|1 StreamFrame[0(CIB),0,1024,fin] 23.151 -> Packet A|9|S0|19ef4ad2c25c5df2|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 23.212 <- (4) Packet A|2|S0|4887838e888f520a|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 23.232 -> Packet A|2|S0|b9a8c7b5616c43cd|32|1 AckFrame[2-0|Δ19] 23.296 loss detection timeout handler running Sending probe 1, because no ack since 23.074. Current RTT: 34/13. 23.296 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 443 millis, based on 23.740/App, because ackElicitingInFlight | RTT:34/13 23.296 -> Packet PA|3|S0|b9a8c7b5616c43cd|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 443 millis, based on 23.741/App, because ackElicitingInFlight | RTT:34/13 23.297 -> Packet PA|4|S0|b9a8c7b5616c43cd|47|1 StreamFrame[0(CIB),0,17,fin] 23.329 <- (5) Packet A|4|S0|4887838e888f520a|1060|2 AckFrame[3-2|Δ1] StreamFrame[0(CIB),0,1024,fin] 23.330 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 23.330 Cwnd(-): 3000; inflight: 47 reschedule loss detection timer for PTO over 77 millis, based on 23.408/App, because ackElicitingInFlight | RTT:34/13 reschedule loss detection timer for PTO over 98 millis, based on 23.429/App, because ackElicitingInFlight | RTT:34/10 23.330 -> Packet A|5|S0|b9a8c7b5616c43cd|47|1 StreamFrame[0(CIB),0,17,fin] 23.330 Finished downloading https://server4:443/uwqzczacly at 32:57.015 on ClientConnection[404e6f61f0167494/4887838e888f520a(V1) with server4/193.167.100.100:443] 23.330 Closing ClientConnection[404e6f61f0167494/4887838e888f520a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.331 -> Packet A|6|S0|b9a8c7b5616c43cd|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 23.331 Creating connection with server4:443 with v1 23.332 Setting up connection for downloading https://server4:443/vrboelvrom at 32:57.016 on ClientConnection[7b6ead7eccddc538/05b2cf62b821ec23(V1) with server4/193.167.100.100:443] 23.332 Original destination connection id: 7b6ead7eccddc538 (scid: 05b2cf62b821ec23) >- CryptoStream[I|ClientHello] 23.334 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.534/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.333 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.353 <- (6) Packet A|5|S0|4887838e888f520a|1054|1 StreamFrame[0(CIB),0,1024,fin] 23.353 -> Packet A|7|S0|b9a8c7b5616c43cd|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 23.354 <- (7) Packet A|6|S0|4887838e888f520a|1054|1 StreamFrame[0(CIB),0,1024,fin] 23.354 -> Packet A|8|S0|b9a8c7b5616c43cd|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 23.362 <- (8) Packet A|7|S0|4887838e888f520a|35|2 AckFrame[6-5|Δ0] ConnectionCloseFrame[0|1|] 23.368 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 23.368 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.568/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.368 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 23.371 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.474/Handshake, because peerAwaitingAddressValidation | RTT:34/17 23.371 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 23.374 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.476/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.374 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.374 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.476/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.374 Starting downloading https://server4:443/vrboelvrom at 32:57.059 on ClientConnection[7b6ead7eccddc538/05b2cf62b821ec23(V1) with server4/193.167.100.100:443] 23.374 Discarding pn space Initial because first Handshake message is being sent 23.374 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 23.375 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.477/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.375 -> Packet A|0|S0|27a739433c6df252|47|1 StreamFrame[0(CIB),0,17,fin] 23.407 <- (2) Packet A|1|S0|05b2cf62b821ec23|94|3 HandshakeDoneFrame[] NewTokenFrame[b7a0cfda441300bbc34ac45ecd1cb8b160becde5d447b9283ec41646d82ff2798b7b24704a] NewConnectionIdFrame[1,<0|3aeda0aeca1b4831|dcf0875f901c03b8601c882087e35372] 23.407 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 23.476/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 94 millis, based on 23.502/App, because ackElicitingInFlight | RTT:34/17 23.407 Discarding pn space Handshake because HandshakeDone is received 23.427 -> Packet A|1|S0|27a739433c6df252|32|1 AckFrame[1|Δ19] 23.501 loss detection timeout handler running Sending probe 0, because no ack since 23.375. Current RTT: 34/17. 23.502 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 23.756/App, because ackElicitingInFlight | RTT:34/17 23.502 -> Packet PA|2|S0|27a739433c6df252|47|1 StreamFrame[0(CIB),0,17,fin] 23.535 <- (3) Packet A|2|S0|05b2cf62b821ec23|1060|2 AckFrame[2|Δ1] StreamFrame[0(CIB),0,1024,fin] 23.536 Cwnd(-): 6000; inflight: 0 23.536 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 23.536 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 23.647/App, because ackElicitingInFlight | RTT:34/13 23.536 -> Packet A|3|S0|27a739433c6df252|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] 23.536 Finished downloading https://server4:443/vrboelvrom at 32:57.221 on ClientConnection[7b6ead7eccddc538/05b2cf62b821ec23(V1) with server4/193.167.100.100:443] 23.536 Closing ClientConnection[7b6ead7eccddc538/05b2cf62b821ec23(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.537 -> Packet A|4|S0|27a739433c6df252|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 23.537 Creating connection with server4:443 with v1 23.537 Setting up connection for downloading https://server4:443/fzrwekvwxc at 32:57.222 on ClientConnection[d1dd549ded95e8c3/4b59e7538ef33c6a(V1) with server4/193.167.100.100:443] 23.538 Original destination connection id: d1dd549ded95e8c3 (scid: 4b59e7538ef33c6a) >- CryptoStream[I|ClientHello] 23.539 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.739/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.539 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.568 <- (4) Packet A|3|S0|05b2cf62b821ec23|30|1 ConnectionCloseFrame[0|1|] 23.574 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 23.574 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.774/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.574 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,731] Padding(248) 23.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.678/Handshake, because peerAwaitingAddressValidation | RTT:34/17 23.576 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 23.578 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.680/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.578 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.579 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.681/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.579 Discarding pn space Initial because first Handshake message is being sent 23.579 Starting downloading https://server4:443/fzrwekvwxc at 32:57.263 on ClientConnection[d1dd549ded95e8c3/4b59e7538ef33c6a(V1) with server4/193.167.100.100:443] 23.579 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 23.579 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.681/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.579 -> Packet A|0|S0|531b0c34fad6e54b|47|1 StreamFrame[0(CIB),0,17,fin] 23.680 loss detection timeout handler running Sending probe 0, because no ack since 23.578. Current RTT: 34/17. 23.680 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.680 (Probe is a handshake retransmit) 23.681 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 23.885/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.680 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 23.713 <- (2) Packet H|1|L|46|1 AckFrame[2|Δ0] 23.713 probe count not reset on ack because handshake not yet confirmed 23.714 Retransmitting CryptoFrame[0,36] on level Handshake 23.714 Cwnd(-): 6000; inflight: 47 23.714 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 23.714 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 23.714 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 171 millis, based on 23.886/Handshake, because ackElicitingInFlight | RTT:34/13 23.714 -> Packet H|3|L|85|2 CryptoFrame[0,36] AckFrame[0|Δ0] 23.713 <- (2) Packet A|0|S0|4b59e7538ef33c6a|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 23.713 <- (3) Packet A|1|S0|4b59e7538ef33c6a|94|3 HandshakeDoneFrame[] NewTokenFrame[b750cddd161c0c5f3704640a5141a8b3c97224e7b94e2801098076cdd9b995849f52aeed58] NewConnectionIdFrame[1,<0|3b15e9fc89a46a78|31e96e49f3eaddb6a8963ad347b1b797] 23.714 State is set to Confirmed reschedule loss detection timer for PTO over 86 millis, based on 23.801/App, because ackElicitingInFlight | RTT:34/13 reschedule loss detection timer for PTO over -24 millis, based on 23.690/App, because ackElicitingInFlight | RTT:34/13 23.715 Discarding pn space Handshake because HandshakeDone is received 23.715 loss detection timeout handler running Sending probe 0, because no ack since 23.579. Current RTT: 34/13. 23.715 (Probe is retransmit on level App) 23.715 -> Packet A|1|S0|531b0c34fad6e54b|31|1 AckFrame[1-0|Δ0] reschedule loss detection timer for PTO over 221 millis, based on 23.937/App, because ackElicitingInFlight | RTT:34/13 23.715 -> Packet PA|2|S0|531b0c34fad6e54b|47|1 StreamFrame[0(CIB),0,17,fin] 23.748 <- (4) Packet A|2|S0|4b59e7538ef33c6a|1060|2 AckFrame[2-1|Δ2] StreamFrame[0(CIB),0,1024,fin] 23.749 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 110 millis, based on 23.860/App, because ackElicitingInFlight | RTT:34/13 reschedule loss detection timer for PTO over 110 millis, based on 23.860/App, because ackElicitingInFlight | RTT:34/13 23.749 -> Packet A|3|S0|531b0c34fad6e54b|47|1 StreamFrame[0(CIB),0,17,fin] 23.749 Finished downloading https://server4:443/fzrwekvwxc at 32:57.434 on ClientConnection[d1dd549ded95e8c3/4b59e7538ef33c6a(V1) with server4/193.167.100.100:443] 23.749 Closing ClientConnection[d1dd549ded95e8c3/4b59e7538ef33c6a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.750 -> Packet A|4|S0|531b0c34fad6e54b|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 23.750 Creating connection with server4:443 with v1 23.750 Setting up connection for downloading https://server4:443/siujzxxtnc at 32:57.435 on ClientConnection[73b64d8b7679296d/9c3c08d5b9ef5b12(V1) with server4/193.167.100.100:443] 23.751 Original destination connection id: 73b64d8b7679296d (scid: 9c3c08d5b9ef5b12) >- CryptoStream[I|ClientHello] 23.752 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.952/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.752 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.786 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 23.787 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.987/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.786 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 23.789 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.891/Handshake, because peerAwaitingAddressValidation | RTT:34/17 23.789 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 23.791 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.893/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.791 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.791 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.893/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.791 Discarding pn space Initial because first Handshake message is being sent 23.791 Starting downloading https://server4:443/siujzxxtnc at 32:57.476 on ClientConnection[73b64d8b7679296d/9c3c08d5b9ef5b12(V1) with server4/193.167.100.100:443] 23.791 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 23.792 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.894/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.792 -> Packet A|0|S0|8723ea5eff6075bc|47|1 StreamFrame[0(CIB),0,17,fin] 23.801 <- (5) Packet A|3|S0|4b59e7538ef33c6a|32|1 AckFrame[3-1|Δ21] 23.802 -> Packet A|5|S0|531b0c34fad6e54b|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 23.824 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 23.824 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 23.824 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 23.824 <- (2) Packet A|0|S0|9c3c08d5b9ef5b12|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 23.844 -> Packet A|1|S0|8723ea5eff6075bc|32|1 AckFrame[0|Δ19] 23.866 <- (6) Packet A|4|S0|4b59e7538ef33c6a|1054|1 StreamFrame[0(CIB),0,1024,fin] 23.867 -> Packet A|6|S0|531b0c34fad6e54b|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 23.867 <- (7) Packet A|5|S0|4b59e7538ef33c6a|1054|1 StreamFrame[0(CIB),0,1024,fin] 23.963 <- (3) Packet A|3|S0|9c3c08d5b9ef5b12|94|3 HandshakeDoneFrame[] NewTokenFrame[b77ba03bd45cefd2c7fad857a7f5bc52277637a0a147cce6470c644b5af784128467dadd46] NewConnectionIdFrame[1,<0|bdae6fc49a793224|a84ddf5ab9e99889a9ee17af8d5894dd] 23.964 State is set to Confirmed reschedule loss detection timer for PTO over -45 millis, based on 23.919/App, because ackElicitingInFlight | RTT:34/17 23.964 loss detection timeout handler running Sending probe 0, because no ack since 23.791. Current RTT: 34/17. reschedule loss detection timer for PTO over 81 millis, based on 24.046/App, because ackElicitingInFlight | RTT:34/17 23.964 Discarding pn space Handshake because HandshakeDone is received 23.964 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 24.218/App, because ackElicitingInFlight | RTT:34/17 23.964 -> Packet PA|2|S0|8723ea5eff6075bc|47|1 StreamFrame[0(CIB),0,17,fin] 23.984 -> Packet A|3|S0|8723ea5eff6075bc|34|1 AckFrame[3,0|Δ19] 24.016 <- (4) Packet A|5|S0|9c3c08d5b9ef5b12|1059|2 AckFrame[3-0|Δ0] StreamFrame[0(CIB),0,1024,fin] 24.016 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.017 Finished downloading https://server4:443/siujzxxtnc at 32:57.701 on ClientConnection[73b64d8b7679296d/9c3c08d5b9ef5b12(V1) with server4/193.167.100.100:443] 24.017 Closing ClientConnection[73b64d8b7679296d/9c3c08d5b9ef5b12(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.017 -> Packet A|4|S0|8723ea5eff6075bc|35|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 24.018 Creating connection with server4:443 with v1 24.018 Setting up connection for downloading https://server4:443/ewaujzryww at 32:57.703 on ClientConnection[235e1d5222250ec6/6b614e5c720348b7(V1) with server4/193.167.100.100:443] 24.018 Original destination connection id: 235e1d5222250ec6 (scid: 6b614e5c720348b7) >- CryptoStream[I|ClientHello] 24.019 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.219/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.019 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.219 loss detection timeout handler running Sending probe 0, because no ack since 24.019. Current RTT: 100/25. 24.219 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.219 (Probe is an initial retransmit) 24.219 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.619/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.219 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.323 <- (5) Packet A|9|S0|9c3c08d5b9ef5b12|1054|1 StreamFrame[0(CIB),0,1024,fin] 24.323 -> Packet A|5|S0|8723ea5eff6075bc|35|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 24.618 loss detection timeout handler running Sending probe 1, because no ack since 24.219. Current RTT: 100/25. 24.618 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.618 (Probe is an initial retransmit) 24.619 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 25.419/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.618 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.620 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 25.420/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.620 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.419 loss detection timeout handler running Sending probe 2, because no ack since 24.620. Current RTT: 100/25. 25.419 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.419 (Probe is an initial retransmit) 25.419 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 27.019/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.419 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.420 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 27.020/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.420 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.452 <- (1) Packet I|1|L|47|1 Token=[] AckFrame[4-2|Δ0] 25.452 probe count not reset on ack because handshake not yet confirmed 25.452 Retransmitting CryptoFrame[0,257] on level Initial 25.452 Cwnd(-): 6000; inflight: 1200 25.452 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 27.052/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.452 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.452 <- (2) Packet I|2|L|47|1 Token=[] AckFrame[5-2|Δ0] reschedule loss detection timer for PTO over 767 millis, based on 26.221/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 25.452 -> Packet I|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.453 probe count not reset on ack because handshake not yet confirmed 25.453 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 26.221/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 25.484 <- (3) Packet I|3|L|47|1 Token=[] AckFrame[6-2|Δ0] 25.485 probe count not reset on ack because handshake not yet confirmed 25.485 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 26.125/Initial, because peerAwaitingAddressValidation | RTT:32/12 25.651 <- (4) Packet I|4|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 25.651 <- (4) Packet H|1|L|1030|2 CryptoFrame[0,729] Padding(255) 25.654 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 543 millis, based on 26.198/Handshake, because peerAwaitingAddressValidation | RTT:32/9 25.653 -> Packet I|7|L|1201|2 Token=[] AckFrame[4-1|Δ0] Padding(1153) >- CryptoStream[H|Finished] 25.656 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 543 millis, based on 26.200/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 25.656 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.656 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 67 millis, based on 25.724/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 25.656 Discarding pn space Initial because first Handshake message is being sent 25.656 Starting downloading https://server4:443/ewaujzryww at 32:59.340 on ClientConnection[235e1d5222250ec6/6b614e5c720348b7(V1) with server4/193.167.100.100:443] 25.656 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 25.656 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 25.656 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 67 millis, based on 25.724/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 25.656 -> Packet A|0|S0|fac2678167374daf|47|1 StreamFrame[0(CIB),0,17,fin] 25.689 <- (6) Packet H|3|L|46|1 AckFrame[1-0|Δ0] 25.689 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 25.689 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 25.689 <- (6) Packet A|0|S0|6b614e5c720348b7|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 25.691 <- (7) Packet A|2|S0|6b614e5c720348b7|1054|1 StreamFrame[0(CIB),0,1024,fin] 25.691 -> Packet A|1|S0|fac2678167374daf|34|1 AckFrame[2,0|Δ1] 25.691 Finished downloading https://server4:443/ewaujzryww at 32:59.376 on ClientConnection[235e1d5222250ec6/6b614e5c720348b7(V1) with server4/193.167.100.100:443] 25.691 Closing ClientConnection[235e1d5222250ec6/6b614e5c720348b7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.692 -> Packet A|2|S0|fac2678167374daf|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 25.692 Creating connection with server4:443 with v1 25.693 Setting up connection for downloading https://server4:443/gdqlcojqho at 32:59.377 on ClientConnection[a3a912ea57c77fa3/b638cdc2098cfb1e(V1) with server4/193.167.100.100:443] 25.693 Original destination connection id: a3a912ea57c77fa3 (scid: b638cdc2098cfb1e) >- CryptoStream[I|ClientHello] 25.694 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.894/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.694 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.723 <- (8) Packet A|3|S0|6b614e5c720348b7|30|1 ConnectionCloseFrame[0|1|] 25.893 loss detection timeout handler running Sending probe 0, because no ack since 25.694. Current RTT: 100/25. 25.893 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.893 (Probe is an initial retransmit) 25.894 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.294/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.893 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.293 loss detection timeout handler running Sending probe 1, because no ack since 25.893. Current RTT: 100/25. 26.293 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.293 (Probe is an initial retransmit) 26.293 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.093/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.293 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.294 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.094/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.294 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.327 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 26.327 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[2-1|Δ0] 26.329 probe count not reset on ack because handshake not yet confirmed 26.329 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 27.129/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.329 Retransmitting CryptoFrame[0,257] on level Initial 26.329 Cwnd(-): 6000; inflight: 2401 26.329 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 26.329 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 27.129/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.330 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.327 <- (1) Packet H|1|L|983|2 CryptoFrame[0,730] Padding(207) reschedule loss detection timer for PTO over 387 millis, based on 26.718/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.329 -> Packet I|5|L|1200|3 Token=[] CryptoFrame[0,257] AckFrame[1|Δ0] Padding(891) >- CryptoStream[H|Finished] 26.332 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 26.720/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.332 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.332 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.429/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.332 Discarding pn space Initial because first Handshake message is being sent 26.332 Starting downloading https://server4:443/gdqlcojqho at 33:00.017 on ClientConnection[a3a912ea57c77fa3/b638cdc2098cfb1e(V1) with server4/193.167.100.100:443] 26.332 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 26.332 Discarding packet (47 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.333 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.430/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.332 -> Packet A|0|S0|55acf32a74efaa1b|47|1 StreamFrame[0(CIB),0,17,fin] 26.362 Discarding packet (49 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.429 loss detection timeout handler running Sending probe 0, because no ack since 26.332. Current RTT: 33/16. 26.429 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.429 (Probe is a handshake retransmit) 26.429 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 26.623/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.429 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 26.622 loss detection timeout handler running Sending probe 1, because no ack since 26.332. Current RTT: 33/16. 26.622 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.622 (Probe is a handshake retransmit) 26.623 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 27.011/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.622 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 26.624 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 27.012/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.623 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 27.011 loss detection timeout handler running Sending probe 2, because no ack since 26.332. Current RTT: 33/16. 27.011 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.011 (Probe is a handshake retransmit) 27.011 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 27.787/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.011 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 27.012 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 27.788/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.012 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 27.044 <- (4) Packet H|2|L|48|1 AckFrame[5,1|Δ0] 27.044 probe count not reset on ack because handshake not yet confirmed 27.045 Retransmitting CryptoFrame[0,36] on level Handshake 27.045 Cwnd(-): 3000; inflight: 127 27.045 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 743 millis, based on 27.788/Handshake, because ackElicitingInFlight | RTT:33/16 27.045 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 647 millis, based on 27.693/Handshake, because ackElicitingInFlight | RTT:33/12 27.045 -> Packet H|7|L|80|1 CryptoFrame[0,36] 27.044 <- (4) Packet A|0|S0|b638cdc2098cfb1e|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 27.046 <- (5) Packet A|2|S0|b638cdc2098cfb1e|1054|1 StreamFrame[0(CIB),0,1024,fin] 27.047 -> Packet A|1|S0|55acf32a74efaa1b|34|1 AckFrame[2,0|Δ1] 27.047 Finished downloading https://server4:443/gdqlcojqho at 33:00.731 on ClientConnection[a3a912ea57c77fa3/b638cdc2098cfb1e(V1) with server4/193.167.100.100:443] 27.047 Closing ClientConnection[a3a912ea57c77fa3/b638cdc2098cfb1e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.047 -> Packet A|2|S0|55acf32a74efaa1b|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 27.047 Creating connection with server4:443 with v1 27.048 Setting up connection for downloading https://server4:443/kizyumdakc at 33:00.732 on ClientConnection[a2fe21e0a2b72f56/8528945d22b08510(V1) with server4/193.167.100.100:443] 27.048 Original destination connection id: a2fe21e0a2b72f56 (scid: 8528945d22b08510) >- CryptoStream[I|ClientHello] 27.049 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.249/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.049 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.078 <- (6) Packet A|3|S0|b638cdc2098cfb1e|30|1 ConnectionCloseFrame[0|1|] 27.083 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 27.084 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.284/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.083 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 27.086 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.188/Handshake, because peerAwaitingAddressValidation | RTT:34/17 27.086 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 27.090 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.192/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.090 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.091 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.193/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.091 Discarding pn space Initial because first Handshake message is being sent 27.091 Starting downloading https://server4:443/kizyumdakc at 33:00.775 on ClientConnection[a2fe21e0a2b72f56/8528945d22b08510(V1) with server4/193.167.100.100:443] 27.091 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 27.091 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.193/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.091 -> Packet A|0|S0|418044a833a8d48a|47|1 StreamFrame[0(CIB),0,17,fin] 27.192 loss detection timeout handler running Sending probe 0, because no ack since 27.090. Current RTT: 34/17. 27.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.192 (Probe is a handshake retransmit) 27.193 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 27.397/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.193 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 27.396 loss detection timeout handler running Sending probe 1, because no ack since 27.091. Current RTT: 34/17. 27.396 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.396 (Probe is a handshake retransmit) 27.396 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 27.804/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.396 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 27.397 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 27.805/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.397 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 27.429 <- (2) Packet H|1|L|46|1 AckFrame[4-3|Δ0] 27.430 probe count not reset on ack because handshake not yet confirmed 27.430 Retransmitting CryptoFrame[0,36] on level Handshake 27.430 Cwnd(-): 6000; inflight: 47 27.430 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 27.430 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 27.430 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 343 millis, based on 27.774/Handshake, because ackElicitingInFlight | RTT:34/13 27.430 -> Packet H|5|L|85|2 CryptoFrame[0,36] AckFrame[0|Δ0] 27.429 <- (2) Packet A|0|S0|8528945d22b08510|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 27.430 <- (3) Packet A|1|S0|8528945d22b08510|102|4 AckFrame[0|Δ307] HandshakeDoneFrame[] NewTokenFrame[b76f2ea286c1cb4c85aeae39c65724c5b596562dd25661698b4481731bcdad63e28271e6a0] NewConnectionIdFrame[1,<0|f04a140a668dcfdf|2c9776d8b4bf7bb7906c03301cb1702e] reschedule loss detection timer for PTO over 85 millis, based on 27.516/Handshake, because ackElicitingInFlight | RTT:34/13 27.431 State is set to Confirmed reschedule loss detection timer for PTO over 388 millis, based on 27.819/Handshake, because ackElicitingInFlight | RTT:69/80 27.431 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.431 Discarding pn space Handshake because HandshakeDone is received 27.431 -> Packet A|1|S0|418044a833a8d48a|31|1 AckFrame[1-0|Δ0] 27.432 <- (4) Packet A|2|S0|8528945d22b08510|1054|1 StreamFrame[0(CIB),0,1024,fin] 27.432 Finished downloading https://server4:443/kizyumdakc at 33:01.116 on ClientConnection[a2fe21e0a2b72f56/8528945d22b08510(V1) with server4/193.167.100.100:443] 27.432 Closing ClientConnection[a2fe21e0a2b72f56/8528945d22b08510(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.432 -> Packet A|2|S0|418044a833a8d48a|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 27.433 Creating connection with server4:443 with v1 27.433 Setting up connection for downloading https://server4:443/tanczuwqha at 33:01.117 on ClientConnection[da939de0722687d1/5ffa0b310afab42f(V1) with server4/193.167.100.100:443] 27.433 Original destination connection id: da939de0722687d1 (scid: 5ffa0b310afab42f) >- CryptoStream[I|ClientHello] 27.434 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.634/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.434 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.464 <- (5) Packet A|3|S0|8528945d22b08510|30|1 ConnectionCloseFrame[0|1|] 27.633 loss detection timeout handler running Sending probe 0, because no ack since 27.434. Current RTT: 100/25. 27.633 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.633 (Probe is an initial retransmit) 27.634 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.034/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.634 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.668 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 27.669 probe count not reset on ack because handshake not yet confirmed 27.669 Retransmitting CryptoFrame[0,257] on level Initial 27.669 Cwnd(-): 6000; inflight: 0 27.669 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.069/Initial, because peerAwaitingAddressValidation | RTT:100/25 27.669 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 27.873/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.669 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 27.668 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 27.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 27.875/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.671 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 27.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 27.877/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.673 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.775/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.673 Discarding pn space Initial because first Handshake message is being sent 27.673 Starting downloading https://server4:443/tanczuwqha at 33:01.357 on ClientConnection[da939de0722687d1/5ffa0b310afab42f(V1) with server4/193.167.100.100:443] 27.673 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 27.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.775/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.673 -> Packet A|0|S0|81c8eef1cb8d6192|47|1 StreamFrame[0(CIB),0,17,fin] 27.702 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 27.775 loss detection timeout handler running Sending probe 0, because no ack since 27.673. Current RTT: 34/17. 27.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.775 (Probe is a handshake retransmit) 27.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 27.979/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.775 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 27.807 <- (3) Packet H|2|L|46|1 AckFrame[2|Δ0] 27.807 probe count not reset on ack because handshake not yet confirmed 27.807 Retransmitting CryptoFrame[0,36] on level Handshake 27.808 Cwnd(-): 3000; inflight: 47 27.808 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 27.808 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 27.808 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 171 millis, based on 27.980/Handshake, because ackElicitingInFlight | RTT:34/13 27.808 -> Packet H|3|L|85|2 CryptoFrame[0,36] AckFrame[0|Δ0] 27.807 <- (3) Packet A|0|S0|5ffa0b310afab42f|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 27.827 -> Packet A|1|S0|81c8eef1cb8d6192|32|1 AckFrame[0|Δ19] 27.941 <- (4) Packet A|2|S0|5ffa0b310afab42f|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 27.941 <- (5) Packet A|3|S0|5ffa0b310afab42f|94|3 HandshakeDoneFrame[] NewTokenFrame[b723eb70c9882cabd245f85f1d59e54d64ccc36465379e47ce2ba2d9f4f82143e1281fc02c] NewConnectionIdFrame[1,<0|b9f1b4fd5bd0b6c7|2250b80cc8097b86c99723bf356faaab] 27.941 State is set to Confirmed reschedule loss detection timer for PTO over -45 millis, based on 27.895/App, because ackElicitingInFlight | RTT:34/13 27.941 loss detection timeout handler running Sending probe 1, because no ack since 27.673. Current RTT: 34/13. reschedule loss detection timer for PTO over -157 millis, based on 27.784/App, because ackElicitingInFlight | RTT:34/13 27.941 Discarding pn space Handshake because HandshakeDone is received 27.941 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 28.164/App, because ackElicitingInFlight | RTT:34/13 27.942 -> Packet PA|2|S0|81c8eef1cb8d6192|54|2 AckFrame[3-2,0|Δ0] StreamFrame[0(CIB),0,17,fin] 28.163 loss detection timeout handler running Sending probe 1, because no ack since 27.942. Current RTT: 34/13. 28.163 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 443 millis, based on 28.607/App, because ackElicitingInFlight | RTT:34/13 28.163 -> Packet PA|3|S0|81c8eef1cb8d6192|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 443 millis, based on 28.608/App, because ackElicitingInFlight | RTT:34/13 28.164 -> Packet PA|4|S0|81c8eef1cb8d6192|47|1 StreamFrame[0(CIB),0,17,fin] 28.173 <- (6) Packet A|4|S0|5ffa0b310afab42f|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 28.173 <- (7) Packet A|5|S0|5ffa0b310afab42f|94|3 HandshakeDoneFrame[] NewTokenFrame[b723eb70c9882cabd245f85f1d59e54d64ccc36465379e47ce2ba2d9f4f82143e1281fc02c] NewConnectionIdFrame[1,<0|b9f1b4fd5bd0b6c7|2250b80cc8097b86c99723bf356faaab] 28.173 -> Packet A|5|S0|81c8eef1cb8d6192|33|1 AckFrame[5-2,0|Δ0] 28.195 <- (8) Packet A|6|S0|5ffa0b310afab42f|31|1 AckFrame[4-3|Δ0] 28.196 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 28.196 Cwnd(-): 2400; inflight: 0 28.196 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 102 millis, based on 28.299/App, because ackElicitingInFlight | RTT:34/11 28.196 -> Packet A|6|S0|81c8eef1cb8d6192|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5-2,0|Δ0] 28.196 <- (9) Packet A|7|S0|5ffa0b310afab42f|1054|1 StreamFrame[0(CIB),0,1024,fin] 28.197 Finished downloading https://server4:443/tanczuwqha at 33:01.881 on ClientConnection[da939de0722687d1/5ffa0b310afab42f(V1) with server4/193.167.100.100:443] 28.197 Closing ClientConnection[da939de0722687d1/5ffa0b310afab42f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.197 -> Packet A|7|S0|81c8eef1cb8d6192|37|2 ConnectionCloseFrame[0|0|] AckFrame[7-2,0|Δ0] 28.198 Creating connection with server4:443 with v1 28.198 Setting up connection for downloading https://server4:443/dqbsqfsvhy at 33:01.882 on ClientConnection[dcaded0fa0de3130/e765ce5e0c4fff4e(V1) with server4/193.167.100.100:443] 28.198 Original destination connection id: dcaded0fa0de3130 (scid: e765ce5e0c4fff4e) >- CryptoStream[I|ClientHello] 28.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.399/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.199 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.229 <- (10) Packet A|8|S0|5ffa0b310afab42f|30|1 ConnectionCloseFrame[0|1|] 28.398 loss detection timeout handler running Sending probe 0, because no ack since 28.199. Current RTT: 100/25. 28.399 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.399 (Probe is an initial retransmit) 28.399 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.799/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.399 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.798 loss detection timeout handler running Sending probe 1, because no ack since 28.399. Current RTT: 100/25. 28.798 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.798 (Probe is an initial retransmit) 28.798 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 29.598/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.798 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 29.599/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.799 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.831 <- (1) Packet I|3|L|49|1 Token=[] AckFrame[3,1-0|Δ0] 28.832 probe count not reset on ack because handshake not yet confirmed 28.910 loss detection timeout handler running 28.910 Cwnd(-): 6000; inflight: 0 28.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 29.294/Initial, because peerAwaitingAddressValidation | RTT:32/16 29.294 loss detection timeout handler running Sending probe 2, because no ack since 28.799. Current RTT: 32/16. 29.294 Sending probe because peer awaiting address validation 29.294 (Probe is Initial ping, because there is no Initial data to retransmit) 29.294 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 30.062/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 29.294 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 30.062 loss detection timeout handler running Sending probe 3, because no ack since 29.294. Current RTT: 32/16. 30.062 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.062 (Probe is Initial ping, because there is no Initial data to retransmit) 30.062 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1535 millis, based on 31.598/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 30.062 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 30.063 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1535 millis, based on 31.599/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 30.063 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 30.095 <- (2) Packet I|7|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 30.098 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1535 millis, based on 31.634/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 30.095 <- (2) Packet H|4|L|1030|2 CryptoFrame[0,730] Padding(254) 30.098 -> Packet I|7|L|1201|2 Token=[] AckFrame[7,3|Δ0] Padding(1151) >- CryptoStream[H|Finished] 30.100 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1535 millis, based on 31.636/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 30.100 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.100 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.100 Starting downloading https://server4:443/dqbsqfsvhy at 33:03.784 on ClientConnection[dcaded0fa0de3130/e765ce5e0c4fff4e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 30.196/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 30.100 Discarding pn space Initial because first Handshake message is being sent 30.100 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 30.100 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.100 Discarding packet (49 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.100 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 30.196/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 30.100 -> Packet A|0|S0|0852659c162078d0|47|1 StreamFrame[0(CIB),0,17,fin] 30.133 <- (5) Packet A|1|S0|e765ce5e0c4fff4e|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b7813c31d7c44c0782fd7127bfc34f3b0406ecc2f9c1686167e4d34dcea5f9ae5dac4873e5] NewConnectionIdFrame[1,<0|3e8509dcf881685f|8cd70ac2f3d9590792aaec8f0094f025] 30.134 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 30.230/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 30.134 State is set to Confirmed reschedule loss detection timer for PTO over 45 millis, based on 30.180/Handshake, because ackElicitingInFlight | RTT:32/12 30.134 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 30.134 Discarding pn space Handshake because HandshakeDone is received 30.135 <- (6) Packet A|2|S0|e765ce5e0c4fff4e|1054|1 StreamFrame[0(CIB),0,1024,fin] 30.135 -> Packet A|1|S0|0852659c162078d0|32|1 AckFrame[2-1|Δ1] 30.135 Finished downloading https://server4:443/dqbsqfsvhy at 33:03.820 on ClientConnection[dcaded0fa0de3130/e765ce5e0c4fff4e(V1) with server4/193.167.100.100:443] 30.135 Closing ClientConnection[dcaded0fa0de3130/e765ce5e0c4fff4e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.136 -> Packet A|2|S0|0852659c162078d0|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 30.136 Creating connection with server4:443 with v1 30.136 Setting up connection for downloading https://server4:443/czluwrhzvq at 33:03.821 on ClientConnection[34dc473cac9edaee/b9d8abb40d9b287e(V1) with server4/193.167.100.100:443] 30.137 Original destination connection id: 34dc473cac9edaee (scid: b9d8abb40d9b287e) >- CryptoStream[I|ClientHello] 30.138 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.338/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.137 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.172 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 30.173 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.373/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 30.172 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,729] Padding(249) 30.174 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 30.276/Handshake, because peerAwaitingAddressValidation | RTT:34/17 30.174 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 30.177 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 30.279/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 30.177 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.177 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 30.279/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 30.177 Starting downloading https://server4:443/czluwrhzvq at 33:03.862 on ClientConnection[34dc473cac9edaee/b9d8abb40d9b287e(V1) with server4/193.167.100.100:443] 30.177 Discarding pn space Initial because first Handshake message is being sent 30.177 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 30.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 30.280/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 30.178 -> Packet A|0|S0|86d0f9d7d8e9e43b|47|1 StreamFrame[0(CIB),0,17,fin] 30.211 <- (2) Packet A|1|S0|b9d8abb40d9b287e|100|4 AckFrame[0|Δ2] HandshakeDoneFrame[] NewTokenFrame[b7ec970686994a31cb9b1dffd6b229dc74f5b93876b69d5d18aa04fe12cc975602bad28614] NewConnectionIdFrame[1,<0|220ab68fe6cbe0c8|c899581932320a07c957e02d5fe5ff57] 30.212 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 30.314/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 30.212 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 30.263/Handshake, because ackElicitingInFlight | RTT:34/13 30.212 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 30.212 Discarding pn space Handshake because HandshakeDone is received 30.213 <- (3) Packet A|2|S0|b9d8abb40d9b287e|1054|1 StreamFrame[0(CIB),0,1024,fin] 30.213 -> Packet A|1|S0|86d0f9d7d8e9e43b|32|1 AckFrame[2-1|Δ1] 30.213 Finished downloading https://server4:443/czluwrhzvq at 33:03.898 on ClientConnection[34dc473cac9edaee/b9d8abb40d9b287e(V1) with server4/193.167.100.100:443] 30.213 Closing ClientConnection[34dc473cac9edaee/b9d8abb40d9b287e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.213 -> Packet A|2|S0|86d0f9d7d8e9e43b|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0]