0.000 Creating connection with server4:443 with v1 0.081 Setting up connection for downloading https://server4:443/cuxyjrqytp at 31:25.889 on ClientConnection[c1dd57285a8069ae/0c29ba7db088ecf6(V1) with server4/193.167.100.100:443] 0.083 Original destination connection id: c1dd57285a8069ae (scid: 0c29ba7db088ecf6) >- CryptoStream[I|ClientHello] 0.258 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.459/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.254 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.459 loss detection timeout handler running Sending probe 0, because no ack since 0.254. Current RTT: 100/25. 0.460 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.462 (Probe is an initial retransmit) 0.465 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.865/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.465 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.498 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 0.526 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 0.926/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.525 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 0.498 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[1-0|Δ0] 0.529 probe count not reset on ack because handshake not yet confirmed 0.534 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 0.934/Handshake, because peerAwaitingAddressValidation | RTT:100/25 0.498 <- (1) Packet H|1|L|983|2 CryptoFrame[0,731] Padding(206) >- CryptoStream[H|Finished] 0.567 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 0.762/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.567 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.572 Starting downloading https://server4:443/cuxyjrqytp at 31:26.396 on ClientConnection[c1dd57285a8069ae/0c29ba7db088ecf6(V1) with server4/193.167.100.100:443] 0.573 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 0.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.673/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.578 Discarding pn space Initial because first Handshake message is being sent 0.595 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.595 -> Packet A|0|S0|190e26f6d91f066e|47|1 StreamFrame[0(CIB),0,17,fin] 0.601 <- (2) Packet A|1|S0|0c29ba7db088ecf6|94|3 HandshakeDoneFrame[] NewTokenFrame[b71bfbe27f435e2c95b86bb1fca078cce6598b4e57fcb43da02d034bb148efe132ea654c05] NewConnectionIdFrame[1,<0|9a734fd66f1d7da7|a65a7ae7f4e4ddb34a84caea23fd3aca] 0.610 State is set to Confirmed reschedule loss detection timer for PTO over 54 millis, based on 0.664/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 106 millis, based on 0.717/App, because ackElicitingInFlight | RTT:33/16 0.611 Discarding pn space Handshake because HandshakeDone is received 0.629 <- (3) Packet A|2|S0|0c29ba7db088ecf6|1060|2 AckFrame[0|Δ2] StreamFrame[0(CIB),0,1024,fin] 0.630 -> Packet A|1|S0|190e26f6d91f066e|32|1 AckFrame[1|Δ19] 0.631 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 0.633 Finished downloading https://server4:443/cuxyjrqytp at 31:26.457 on ClientConnection[c1dd57285a8069ae/0c29ba7db088ecf6(V1) with server4/193.167.100.100:443] 0.635 Closing ClientConnection[c1dd57285a8069ae/0c29ba7db088ecf6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.637 Creating connection with server4:443 with v1 0.638 Setting up connection for downloading https://server4:443/psxqzagwyz at 31:26.462 on ClientConnection[e0b07163fd4fde1f/be1d789a6b956f50(V1) with server4/193.167.100.100:443] 0.639 Original destination connection id: e0b07163fd4fde1f (scid: be1d789a6b956f50) 0.637 -> Packet A|2|S0|190e26f6d91f066e|36|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ5] >- CryptoStream[I|ClientHello] 0.644 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.844/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.644 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.669 <- (4) Packet A|3|S0|0c29ba7db088ecf6|30|1 ConnectionCloseFrame[0|1|] 0.843 loss detection timeout handler running Sending probe 0, because no ack since 0.644. Current RTT: 100/25. 0.843 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.844 (Probe is an initial retransmit) 0.845 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.245/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.844 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.244 loss detection timeout handler running Sending probe 1, because no ack since 0.844. Current RTT: 100/25. 1.244 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.245 (Probe is an initial retransmit) 1.245 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.045/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.245 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.246 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.047/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.246 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.046 loss detection timeout handler running Sending probe 2, because no ack since 1.246. Current RTT: 100/25. 2.046 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.046 (Probe is an initial retransmit) 2.047 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 3.647/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.047 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.048 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 3.648/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.048 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.080 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 2.080 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[4-2|Δ0] 2.086 probe count not reset on ack because handshake not yet confirmed 2.086 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 3.686/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.086 -> Packet I|6|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 2.087 Retransmitting CryptoFrame[0,257] on level Initial 2.088 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 3.688/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.088 -> Packet I|7|L|1200|3 Token=[] CryptoFrame[0,257] AckFrame[1|Δ0] Padding(891) 2.088 Cwnd(-): 6000; inflight: 3601 2.089 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 3.689/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.080 <- (1) Packet H|1|L|983|2 CryptoFrame[0,731] Padding(206) >- CryptoStream[H|Finished] 2.094 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 2.870/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.093 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.095 Starting downloading https://server4:443/psxqzagwyz at 31:27.919 on ClientConnection[e0b07163fd4fde1f/be1d789a6b956f50(V1) with server4/193.167.100.100:443] 2.096 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 2.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.096 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.193/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 2.194/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.097 Discarding pn space Initial because first Handshake message is being sent 2.096 -> Packet A|0|S0|b2db6693f9daf361|47|1 StreamFrame[0(CIB),0,17,fin] 2.098 Discarding packet (47 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.126 <- (3) Packet H|2|L|46|1 AckFrame[0|Δ0] 2.127 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.127 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 2.126 <- (3) Packet A|0|S0|be1d789a6b956f50|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.127 <- (4) Packet A|1|S0|be1d789a6b956f50|94|3 HandshakeDoneFrame[] NewTokenFrame[b7e3949c7b949de5ccc1cf352b828a4e99a4b599201e51e6608ef151063de30696b906d0b4] NewConnectionIdFrame[1,<0|579bafdc8570c2fd|c2070ede949bf554917b8b26d32d8f4c] 2.130 State is set to Confirmed reschedule loss detection timer for PTO over 72 millis, based on 2.202/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 72 millis, based on 2.202/App, because ackElicitingInFlight | RTT:33/12 2.130 Discarding pn space Handshake because HandshakeDone is received 2.130 -> Packet A|1|S0|b2db6693f9daf361|32|1 AckFrame[1-0|Δ1] 2.129 <- (5) Packet A|2|S0|be1d789a6b956f50|1060|2 AckFrame[0|Δ1] StreamFrame[0(CIB),0,1024,fin] 2.131 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.131 Finished downloading https://server4:443/psxqzagwyz at 31:27.955 on ClientConnection[e0b07163fd4fde1f/be1d789a6b956f50(V1) with server4/193.167.100.100:443] 2.131 Closing ClientConnection[e0b07163fd4fde1f/be1d789a6b956f50(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.132 Creating connection with server4:443 with v1 2.132 -> Packet A|2|S0|b2db6693f9daf361|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 2.133 Setting up connection for downloading https://server4:443/akctfqldhd at 31:27.957 on ClientConnection[5ac61a15c71e38d8/fc9a3bf0a37de629(V1) with server4/193.167.100.100:443] 2.133 Original destination connection id: 5ac61a15c71e38d8 (scid: fc9a3bf0a37de629) >- CryptoStream[I|ClientHello] 2.136 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.336/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.136 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.335 loss detection timeout handler running Sending probe 0, because no ack since 2.136. Current RTT: 100/25. 2.335 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.336 (Probe is an initial retransmit) 2.336 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.736/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.336 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.370 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 2.370 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[1-0|Δ0] 2.374 probe count not reset on ack because handshake not yet confirmed 2.374 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.374 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 2.774/Handshake, because peerAwaitingAddressValidation | RTT:100/25 reschedule loss detection timer for PTO over 399 millis, based on 2.774/Handshake, because peerAwaitingAddressValidation | RTT:100/25 2.374 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 2.370 <- (1) Packet H|1|L|983|2 CryptoFrame[0,732] Padding(205) >- CryptoStream[H|Finished] 2.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.572/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.378 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.379 Starting downloading https://server4:443/akctfqldhd at 31:28.203 on ClientConnection[5ac61a15c71e38d8/fc9a3bf0a37de629(V1) with server4/193.167.100.100:443] 2.379 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.476/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.379 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 2.380 Discarding pn space Initial because first Handshake message is being sent 2.380 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.477/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.380 -> Packet A|0|S0|94f95b99b805a546|47|1 StreamFrame[0(CIB),0,17,fin] 2.411 <- (2) Packet H|2|L|46|1 AckFrame[1-0|Δ0] 2.413 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.413 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 2.411 <- (2) Packet A|0|S0|fc9a3bf0a37de629|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.412 <- (3) Packet A|1|S0|fc9a3bf0a37de629|94|3 HandshakeDoneFrame[] NewTokenFrame[b73dd15c42995e6020890a668c93352f65834704ee39750aaa916903379d615310cba46514] NewConnectionIdFrame[1,<0|13578e667463a373|af6166778ce5c636667c1af44bf9a272] 2.414 State is set to Confirmed reschedule loss detection timer for PTO over 87 millis, based on 2.502/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 87 millis, based on 2.502/App, because ackElicitingInFlight | RTT:33/16 2.415 Discarding pn space Handshake because HandshakeDone is received 2.415 -> Packet A|1|S0|94f95b99b805a546|32|1 AckFrame[1-0|Δ1] 2.502 loss detection timeout handler running Sending probe 0, because no ack since 2.380. Current RTT: 33/16. 2.502 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 2.747/App, because ackElicitingInFlight | RTT:33/16 2.503 -> Packet PA|2|S0|94f95b99b805a546|47|1 StreamFrame[0(CIB),0,17,fin] 2.537 <- (4) Packet A|2|S0|fc9a3bf0a37de629|1060|2 AckFrame[2-1|Δ1] StreamFrame[0(CIB),0,1024,fin] 2.538 Cwnd(-): 6000; inflight: 0 2.538 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.538 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 2.538 Finished downloading https://server4:443/akctfqldhd at 31:28.363 on ClientConnection[5ac61a15c71e38d8/fc9a3bf0a37de629(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 105 millis, based on 2.644/App, because ackElicitingInFlight | RTT:33/12 2.539 Closing ClientConnection[5ac61a15c71e38d8/fc9a3bf0a37de629(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.538 -> Packet A|3|S0|94f95b99b805a546|47|1 StreamFrame[0(CIB),0,17,fin] 2.539 Creating connection with server4:443 with v1 2.539 -> Packet A|4|S0|94f95b99b805a546|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 2.540 Setting up connection for downloading https://server4:443/fliwoousnd at 31:28.364 on ClientConnection[cb1978b3355695ad/1545f0adf05b8105(V1) with server4/193.167.100.100:443] 2.540 Original destination connection id: cb1978b3355695ad (scid: 1545f0adf05b8105) >- CryptoStream[I|ClientHello] 2.542 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.742/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.542 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.741 loss detection timeout handler running Sending probe 0, because no ack since 2.542. Current RTT: 100/25. 2.742 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.742 (Probe is an initial retransmit) 2.743 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.143/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.742 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.776 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 2.776 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[1-0|Δ0] 2.780 probe count not reset on ack because handshake not yet confirmed 2.780 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 3.180/Handshake, because peerAwaitingAddressValidation | RTT:100/25 2.780 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 3.181/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.780 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 2.776 <- (1) Packet H|1|L|983|2 CryptoFrame[0,731] Padding(206) >- CryptoStream[H|Finished] 2.784 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.978/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.784 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.785 Starting downloading https://server4:443/fliwoousnd at 31:28.609 on ClientConnection[cb1978b3355695ad/1545f0adf05b8105(V1) with server4/193.167.100.100:443] 2.785 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 2.785 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.883/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.786 Discarding pn space Initial because first Handshake message is being sent 2.786 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.883/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.786 -> Packet A|0|S0|68900d79aca2a37e|47|1 StreamFrame[0(CIB),0,17,fin] 2.882 loss detection timeout handler running Sending probe 0, because no ack since 2.784. Current RTT: 33/16. 2.882 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.883 (Probe is a handshake retransmit) 2.883 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.077/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.883 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 2.916 <- (2) Packet H|2|L|46|1 AckFrame[2-1|Δ0] 2.916 probe count not reset on ack because handshake not yet confirmed 2.916 Retransmitting CryptoFrame[0,36] on level Handshake 2.917 Cwnd(-): 6000; inflight: 47 2.917 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.917 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 2.917 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 161 millis, based on 3.079/Handshake, because ackElicitingInFlight | RTT:33/12 2.917 -> Packet H|3|L|80|1 CryptoFrame[0,36] 2.916 <- (2) Packet A|0|S0|1545f0adf05b8105|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.916 <- (3) Packet A|1|S0|1545f0adf05b8105|100|4 AckFrame[0|Δ99] HandshakeDoneFrame[] NewTokenFrame[b7e64e179ffa584e58bf497213d2918c0a3595f64227b8e4d33da3a105971f1da15ae1db2a] NewConnectionIdFrame[1,<0|27802f9c4844267d|ee967a5ac9c870bf7c63f46bee7e34f8] reschedule loss detection timer for PTO over 79 millis, based on 2.998/Handshake, because ackElicitingInFlight | RTT:33/12 2.918 State is set to Confirmed reschedule loss detection timer for PTO over 148 millis, based on 3.067/Handshake, because ackElicitingInFlight | RTT:42/27 2.919 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.919 Discarding pn space Handshake because HandshakeDone is received 2.919 -> Packet A|1|S0|68900d79aca2a37e|32|1 AckFrame[1-0|Δ1] 2.918 <- (4) Packet A|2|S0|1545f0adf05b8105|1054|1 StreamFrame[0(CIB),0,1024,fin] 2.920 Finished downloading https://server4:443/fliwoousnd at 31:28.744 on ClientConnection[cb1978b3355695ad/1545f0adf05b8105(V1) with server4/193.167.100.100:443] 2.920 Closing ClientConnection[cb1978b3355695ad/1545f0adf05b8105(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.920 -> Packet A|2|S0|68900d79aca2a37e|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 2.920 Creating connection with server4:443 with v1 2.921 Setting up connection for downloading https://server4:443/jrovnidivj at 31:28.745 on ClientConnection[4eba14caaca68c37/ff9e360a73264dda(V1) with server4/193.167.100.100:443] 2.921 Original destination connection id: 4eba14caaca68c37 (scid: ff9e360a73264dda) >- CryptoStream[I|ClientHello] 2.923 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.123/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.923 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.040 <- (5) Packet A|3|S0|1545f0adf05b8105|1054|1 StreamFrame[0(CIB),0,1024,fin] 3.042 -> Packet A|3|S0|68900d79aca2a37e|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 3.122 loss detection timeout handler running Sending probe 0, because no ack since 2.923. Current RTT: 100/25. 3.122 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.122 (Probe is an initial retransmit) 3.123 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.523/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.123 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.158 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 3.158 probe count not reset on ack because handshake not yet confirmed 3.159 Retransmitting CryptoFrame[0,257] on level Initial 3.159 Cwnd(-): 6000; inflight: 0 3.159 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.559/Initial, because peerAwaitingAddressValidation | RTT:100/25 3.159 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 3.363/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.159 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 3.163 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 3.367/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.158 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 3.162 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 3.166 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 3.370/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.166 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.167 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.167 Starting downloading https://server4:443/jrovnidivj at 31:28.991 on ClientConnection[4eba14caaca68c37/ff9e360a73264dda(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 3.269/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.167 Discarding pn space Initial because first Handshake message is being sent 3.167 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 3.168 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 3.270/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.168 -> Packet A|0|S0|83cbfe1d88d79c38|47|1 StreamFrame[0(CIB),0,17,fin] 3.224 <- (6) Packet A|5|S0|1545f0adf05b8105|1054|1 StreamFrame[0(CIB),0,1024,fin] 3.225 -> Packet A|4|S0|68900d79aca2a37e|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 3.225 <- (7) Packet A|6|S0|1545f0adf05b8105|1054|1 StreamFrame[0(CIB),0,1024,fin] 3.269 loss detection timeout handler running Sending probe 0, because no ack since 3.166. Current RTT: 34/17. 3.269 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.269 (Probe is a handshake retransmit) 3.270 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 3.474/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.270 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 3.473 loss detection timeout handler running Sending probe 1, because no ack since 3.168. Current RTT: 34/17. 3.473 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.473 (Probe is a handshake retransmit) 3.474 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 3.882/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.474 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 3.475 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 3.883/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.475 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 3.882 loss detection timeout handler running Sending probe 2, because no ack since 3.168. Current RTT: 34/17. 3.882 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.883 (Probe is a handshake retransmit) 3.883 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 4.699/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.883 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 3.884 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 4.700/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.884 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 4.222 <- (2) Packet A|2|S0|ff9e360a73264dda|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 4.222 <- (3) Packet A|3|S0|ff9e360a73264dda|94|3 HandshakeDoneFrame[] NewTokenFrame[b7fae0e6e5f9a4e0310d00c96316ca4682c1d01457a504baa2542abeb6ff4a4c7079583a46] NewConnectionIdFrame[1,<0|007be5f7c1ea5994|52b6f5110d71b6bc4fbbf6eba17b775f] 4.224 State is set to Confirmed reschedule loss detection timer for PTO over -40 millis, based on 4.184/App, because ackElicitingInFlight | RTT:34/17 4.224 loss detection timeout handler running Sending probe 3, because no ack since 3.168. Current RTT: 34/17. reschedule loss detection timer for PTO over -929 millis, based on 3.295/App, because ackElicitingInFlight | RTT:34/17 4.224 (Probe is retransmit on level App) 4.224 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 253 millis, based on 4.478/App, because ackElicitingInFlight | RTT:34/17 4.224 -> Packet PA|1|S0|83cbfe1d88d79c38|47|1 StreamFrame[0(CIB),0,17,fin] 4.225 -> Packet A|2|S0|83cbfe1d88d79c38|32|1 AckFrame[3-2|Δ1] 4.257 <- (4) Packet A|4|S0|ff9e360a73264dda|1060|2 AckFrame[1|Δ1] StreamFrame[0(CIB),0,1024,fin] 4.258 Cwnd(-): 3000; inflight: 0 4.258 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 4.258 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 4.370/App, because ackElicitingInFlight | RTT:34/13 4.259 Finished downloading https://server4:443/jrovnidivj at 31:30.083 on ClientConnection[4eba14caaca68c37/ff9e360a73264dda(V1) with server4/193.167.100.100:443] 4.259 -> Packet A|3|S0|83cbfe1d88d79c38|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3-2|Δ0] 4.259 Closing ClientConnection[4eba14caaca68c37/ff9e360a73264dda(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.260 Creating connection with server4:443 with v1 4.260 -> Packet A|4|S0|83cbfe1d88d79c38|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 4.260 Setting up connection for downloading https://server4:443/btjyjsgwuv at 31:30.085 on ClientConnection[db8338364542f0cd/b76c9019ca618d2f(V1) with server4/193.167.100.100:443] 4.261 Original destination connection id: db8338364542f0cd (scid: b76c9019ca618d2f) >- CryptoStream[I|ClientHello] 4.263 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.463/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.263 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.297 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 4.298 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.498/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.297 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) reschedule loss detection timer for PTO over 101 millis, based on 4.403/Handshake, because peerAwaitingAddressValidation | RTT:34/17 4.301 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 4.304 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.406/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.304 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.305 Starting downloading https://server4:443/btjyjsgwuv at 31:30.129 on ClientConnection[db8338364542f0cd/b76c9019ca618d2f(V1) with server4/193.167.100.100:443] 4.305 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.407/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.305 Discarding pn space Initial because first Handshake message is being sent 4.305 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.407/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.305 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|3c2605dcb8844c23|47|1 StreamFrame[0(CIB),0,17,fin]] 4.336 <- (2) Packet H|1|L|46|1 AckFrame[0|Δ0] 4.337 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 4.337 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 4.336 <- (2) Packet A|0|S0|b76c9019ca618d2f|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 4.357 -> Packet A|1|S0|3c2605dcb8844c23|32|1 AckFrame[0|Δ19] 4.472 <- (3) Packet A|2|S0|b76c9019ca618d2f|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 4.473 <- (4) Packet A|3|S0|b76c9019ca618d2f|94|3 HandshakeDoneFrame[] NewTokenFrame[b772aed6980c639704ab92cabbf08f6ac0cf023fa39a76cc02c4d88a825903b73e08cc7fcb] NewConnectionIdFrame[1,<0|3f23c3e803fc0bae|4fcab9ca5056cd52617e0c4073235477] 4.476 State is set to Confirmed reschedule loss detection timer for PTO over -59 millis, based on 4.416/App, because ackElicitingInFlight | RTT:34/13 4.476 loss detection timeout handler running reschedule loss detection timer for PTO over -59 millis, based on 4.416/App, because ackElicitingInFlight | RTT:34/13 4.476 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 4.305. Current RTT: 34/13. 4.476 (Probe is retransmit on level App) 4.476 -> Packet A|2|S0|3c2605dcb8844c23|33|1 AckFrame[3-2,0|Δ0] reschedule loss detection timer for PTO over 221 millis, based on 4.699/App, because ackElicitingInFlight | RTT:34/13 4.477 -> Packet PA|3|S0|3c2605dcb8844c23|47|1 StreamFrame[0(CIB),0,17,fin] 4.510 <- (5) Packet A|4|S0|b76c9019ca618d2f|1060|2 AckFrame[3-2|Δ3] StreamFrame[0(CIB),0,1024,fin] 4.511 Cwnd(-): 6000; inflight: 0 4.511 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 4.511 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 98 millis, based on 4.610/App, because ackElicitingInFlight | RTT:34/10 4.511 -> Packet A|4|S0|3c2605dcb8844c23|47|1 StreamFrame[0(CIB),0,17,fin] 4.512 Finished downloading https://server4:443/btjyjsgwuv at 31:30.336 on ClientConnection[db8338364542f0cd/b76c9019ca618d2f(V1) with server4/193.167.100.100:443] 4.512 Closing ClientConnection[db8338364542f0cd/b76c9019ca618d2f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.513 Creating connection with server4:443 with v1 4.512 -> Packet A|5|S0|3c2605dcb8844c23|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 4.513 Setting up connection for downloading https://server4:443/nqewolwgwe at 31:30.337 on ClientConnection[963ef778148df160/d506709647dd6bda(V1) with server4/193.167.100.100:443] 4.513 Original destination connection id: 963ef778148df160 (scid: d506709647dd6bda) >- CryptoStream[I|ClientHello] 4.515 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.715/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.515 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.544 <- (6) Packet A|5|S0|b76c9019ca618d2f|35|2 AckFrame[5-4|Δ0] ConnectionCloseFrame[0|1|] 4.550 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 4.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.750/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.550 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,731] Padding(248) 4.558 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.660/Handshake, because peerAwaitingAddressValidation | RTT:34/17 4.558 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 4.561 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.663/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.560 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.561 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.663/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.561 Discarding pn space Initial because first Handshake message is being sent 4.561 Starting downloading https://server4:443/nqewolwgwe at 31:30.385 on ClientConnection[963ef778148df160/d506709647dd6bda(V1) with server4/193.167.100.100:443] 4.562 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 4.562 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.665/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.562 -> Packet A|0|S0|926f02aeb8b3aa5c|47|1 StreamFrame[0(CIB),0,17,fin] 4.594 <- (2) Packet A|1|S0|d506709647dd6bda|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b754a982e1fbdc4d804f655b7d878c98933d23aeddf2c1313ebb9edfcefeaa7fbdf307a99a] NewConnectionIdFrame[1,<0|e76bbe8db726bc03|85a9e74b42f0e9d4d40dc6d2567f4454] 4.595 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.697/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.595 State is set to Confirmed reschedule loss detection timer for PTO over 55 millis, based on 4.650/Handshake, because ackElicitingInFlight | RTT:34/14 4.595 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.595 Discarding pn space Handshake because HandshakeDone is received 4.595 <- (3) Packet A|2|S0|d506709647dd6bda|1054|1 StreamFrame[0(CIB),0,1024,fin] 4.596 Finished downloading https://server4:443/nqewolwgwe at 31:30.420 on ClientConnection[963ef778148df160/d506709647dd6bda(V1) with server4/193.167.100.100:443] 4.596 -> Packet A|1|S0|926f02aeb8b3aa5c|31|1 AckFrame[2-1|Δ0] 4.596 Closing ClientConnection[963ef778148df160/d506709647dd6bda(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.596 -> Packet A|2|S0|926f02aeb8b3aa5c|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 4.597 Creating connection with server4:443 with v1 4.597 Setting up connection for downloading https://server4:443/zhyjsfxecp at 31:30.421 on ClientConnection[eb0a23b3a7c81098/0f38c8df2fc297ba(V1) with server4/193.167.100.100:443] 4.597 Original destination connection id: eb0a23b3a7c81098 (scid: 0f38c8df2fc297ba) >- CryptoStream[I|ClientHello] 4.599 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.799/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.599 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.798 loss detection timeout handler running Sending probe 0, because no ack since 4.599. Current RTT: 100/25. 4.798 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.798 (Probe is an initial retransmit) 4.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.199/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.799 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.198 loss detection timeout handler running Sending probe 1, because no ack since 4.799. Current RTT: 100/25. 5.198 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.199 (Probe is an initial retransmit) 5.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.999/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.199 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.200 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.000/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.200 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.231 <- (1) Packet I|3|L|47|1 Token=[] AckFrame[2-0|Δ0] 5.232 probe count not reset on ack because handshake not yet confirmed 5.232 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.032/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.232 <- (2) Packet I|4|L|47|1 Token=[] AckFrame[3-0|Δ0] 5.232 probe count not reset on ack because handshake not yet confirmed 5.233 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 5.617/Initial, because peerAwaitingAddressValidation | RTT:32/16 5.616 loss detection timeout handler running Sending probe 2, because no ack since 5.200. Current RTT: 32/12. 5.616 Sending probe because peer awaiting address validation 5.616 (Probe is Initial ping, because there is no Initial data to retransmit) 5.618 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 6.258/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 5.617 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 5.632 <- (3) Packet I|5|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 5.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.632 <- (3) Packet H|2|L|1030|2 CryptoFrame[0,731] Padding(253) reschedule loss detection timer for PTO over 639 millis, based on 6.276/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 5.636 -> Packet I|5|L|1201|2 Token=[] AckFrame[5-3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 5.639 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 639 millis, based on 6.279/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 5.638 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.639 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.639 Starting downloading https://server4:443/zhyjsfxecp at 31:31.463 on ClientConnection[eb0a23b3a7c81098/0f38c8df2fc297ba(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 79 millis, based on 5.719/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 5.639 Discarding pn space Initial because first Handshake message is being sent 5.639 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 5.639 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.640 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 5.720/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 5.640 -> Packet A|0|S0|61fd1f37fa96cb70|47|1 StreamFrame[0(CIB),0,17,fin] 5.719 loss detection timeout handler running Sending probe 0, because no ack since 5.638. Current RTT: 32/12. 5.719 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.719 (Probe is a handshake retransmit) 5.720 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 159 millis, based on 5.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 5.720 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 5.879 loss detection timeout handler running Sending probe 1, because no ack since 5.640. Current RTT: 32/12. 5.879 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.880 (Probe is a handshake retransmit) 5.880 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 319 millis, based on 6.200/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 5.880 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 5.881 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 319 millis, based on 6.201/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 5.881 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 5.913 <- (5) Packet H|4|L|48|1 AckFrame[4,1|Δ0] 5.914 probe count not reset on ack because handshake not yet confirmed 5.914 Retransmitting CryptoFrame[0,36] on level Handshake 5.914 Cwnd(-): 6000; inflight: 127 5.914 -> Packet H|5|L|80|1 CryptoFrame[0,36] 5.913 <- (5) Packet A|0|S0|0f38c8df2fc297ba|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 5.913 <- (6) Packet A|1|S0|0f38c8df2fc297ba|94|3 HandshakeDoneFrame[] NewTokenFrame[b7f7d41e5cf6c920c92119a67e04c047df9e26413599e4bd5321465cc5be2f0064a07e2d53] NewConnectionIdFrame[1,<0|0f0b1c409ee4d00a|2fe2bee0ebc45ea13308d4a2f6be2842] 5.915 State is set to Confirmed 5.915 loss detection timeout handler running reschedule loss detection timer for PTO over -182 millis, based on 5.733/App, because ackElicitingInFlight | RTT:32/9 reschedule loss detection timer for PTO over -182 millis, based on 5.733/App, because ackElicitingInFlight | RTT:32/9 5.916 Discarding pn space Handshake because HandshakeDone is received 5.916 loss detection timeout handler running Sending probe 0, because no ack since 5.640. Current RTT: 32/9. 5.916 (Probe is retransmit on level App) 5.916 -> Packet A|1|S0|61fd1f37fa96cb70|31|1 AckFrame[1-0|Δ0] reschedule loss detection timer for PTO over 185 millis, based on 6.102/App, because ackElicitingInFlight | RTT:32/9 5.916 -> Packet PA|2|S0|61fd1f37fa96cb70|47|1 StreamFrame[0(CIB),0,17,fin] 6.031 <- (7) Packet A|2|S0|0f38c8df2fc297ba|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.031 <- (8) Packet A|3|S0|0f38c8df2fc297ba|94|3 HandshakeDoneFrame[] NewTokenFrame[b7f7d41e5cf6c920c92119a67e04c047df9e26413599e4bd5321465cc5be2f0064a07e2d53] NewConnectionIdFrame[1,<0|0f0b1c409ee4d00a|2fe2bee0ebc45ea13308d4a2f6be2842] 6.033 -> Packet A|3|S0|61fd1f37fa96cb70|31|1 AckFrame[3-0|Δ0] 6.101 loss detection timeout handler running Sending probe 1, because no ack since 5.916. Current RTT: 32/9. 6.102 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 371 millis, based on 6.474/App, because ackElicitingInFlight | RTT:32/9 6.102 -> Packet PA|4|S0|61fd1f37fa96cb70|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 371 millis, based on 6.475/App, because ackElicitingInFlight | RTT:32/9 6.103 -> Packet PA|5|S0|61fd1f37fa96cb70|47|1 StreamFrame[0(CIB),0,17,fin] 6.134 <- (9) Packet A|4|S0|0f38c8df2fc297ba|31|1 AckFrame[5-4|Δ0] 6.135 Cwnd(-): 3000; inflight: 0 6.135 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.135 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 84 millis, based on 6.220/App, because ackElicitingInFlight | RTT:32/7 6.135 -> Packet A|6|S0|61fd1f37fa96cb70|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3-0|Δ0] 6.135 <- (10) Packet A|5|S0|0f38c8df2fc297ba|1054|1 StreamFrame[0(CIB),0,1024,fin] 6.136 Finished downloading https://server4:443/zhyjsfxecp at 31:31.960 on ClientConnection[eb0a23b3a7c81098/0f38c8df2fc297ba(V1) with server4/193.167.100.100:443] 6.136 Closing ClientConnection[eb0a23b3a7c81098/0f38c8df2fc297ba(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.136 Creating connection with server4:443 with v1 6.136 -> Packet A|7|S0|61fd1f37fa96cb70|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-0|Δ0] 6.137 Setting up connection for downloading https://server4:443/mfxeqnhlug at 31:31.961 on ClientConnection[052123c35bad7340/1c85b2cddba31dbd(V1) with server4/193.167.100.100:443] 6.137 Original destination connection id: 052123c35bad7340 (scid: 1c85b2cddba31dbd) >- CryptoStream[I|ClientHello] 6.139 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.339/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.139 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.173 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 6.173 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.373/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.173 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,732] Padding(246) 6.177 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.279/Handshake, because peerAwaitingAddressValidation | RTT:34/17 6.177 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 6.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.282/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.180 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.181 Starting downloading https://server4:443/mfxeqnhlug at 31:32.005 on ClientConnection[052123c35bad7340/1c85b2cddba31dbd(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 6.283/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.181 Discarding pn space Initial because first Handshake message is being sent 6.181 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 6.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.283/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.181 -> Packet A|0|S0|48226836b6711b75|47|1 StreamFrame[0(CIB),0,17,fin] 6.216 <- (2) Packet A|2|S0|1c85b2cddba31dbd|1054|1 StreamFrame[0(CIB),0,1024,fin] 6.217 Finished downloading https://server4:443/mfxeqnhlug at 31:32.041 on ClientConnection[052123c35bad7340/1c85b2cddba31dbd(V1) with server4/193.167.100.100:443] 6.217 Closing ClientConnection[052123c35bad7340/1c85b2cddba31dbd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.218 -> Packet A|1|S0|48226836b6711b75|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 6.218 Creating connection with server4:443 with v1 6.218 Setting up connection for downloading https://server4:443/cpqnfzajdq at 31:32.042 on ClientConnection[cccc12490c41862f/dd43ea4067346e0e(V1) with server4/193.167.100.100:443] 6.218 Original destination connection id: cccc12490c41862f (scid: dd43ea4067346e0e) >- CryptoStream[I|ClientHello] 6.220 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.420/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.220 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.359 <- (3) Packet A|3|S0|1c85b2cddba31dbd|544|1 CryptoFrame[0,514] 6.360 -> Packet A|2|S0|48226836b6711b75|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 6.391 <- (4) Packet A|5|S0|1c85b2cddba31dbd|30|1 ConnectionCloseFrame[0|1|] 6.419 loss detection timeout handler running Sending probe 0, because no ack since 6.220. Current RTT: 100/25. 6.419 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.419 (Probe is an initial retransmit) 6.420 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.820/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.419 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.819 loss detection timeout handler running Sending probe 1, because no ack since 6.419. Current RTT: 100/25. 6.819 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.819 (Probe is an initial retransmit) 6.820 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.620/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.819 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.821 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.621/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.820 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.855 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 6.856 probe count not reset on ack because handshake not yet confirmed 6.856 Retransmitting CryptoFrame[0,257] on level Initial 6.856 Cwnd(-): 6000; inflight: 0 6.856 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.656/Initial, because peerAwaitingAddressValidation | RTT:100/25 6.856 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 7.264/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.856 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 6.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.855 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,731] Padding(248) reschedule loss detection timer for PTO over 407 millis, based on 7.267/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.859 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 6.862 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 7.270/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.862 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.863 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.965/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.863 Discarding pn space Initial because first Handshake message is being sent 6.863 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 6.863 Starting downloading https://server4:443/cpqnfzajdq at 31:32.687 on ClientConnection[cccc12490c41862f/dd43ea4067346e0e(V1) with server4/193.167.100.100:443] 6.864 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.966/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.864 -> Packet A|0|S0|272358ad1cb189e5|47|1 StreamFrame[0(CIB),0,17,fin] 6.888 Discarding packet (47 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.895 <- (3) Packet H|1|L|46|1 AckFrame[0|Δ0] 6.896 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 6.896 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 6.895 <- (3) Packet A|0|S0|dd43ea4067346e0e|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.896 <- (4) Packet A|1|S0|dd43ea4067346e0e|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b78b8d1927ac1b9d3b537019d4e1e4da6fcfe9f497d8344ade799fed75c2a24d509b5b6ac4] NewConnectionIdFrame[1,<0|797b91d8dfad2537|1875c3f421a4069f94f57fe30fd7e2f7] 6.897 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.897 State is set to Confirmed 6.897 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.897 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.897 Discarding pn space Handshake because HandshakeDone is received 6.897 -> Packet A|1|S0|272358ad1cb189e5|31|1 AckFrame[1-0|Δ0] 7.919 <- (5) Packet A|4|S0|dd43ea4067346e0e|94|3 HandshakeDoneFrame[] NewTokenFrame[b78b8d1927ac1b9d3b537019d4e1e4da6fcfe9f497d8344ade799fed75c2a24d509b5b6ac4] NewConnectionIdFrame[1,<0|797b91d8dfad2537|1875c3f421a4069f94f57fe30fd7e2f7] 7.938 -> Packet A|2|S0|272358ad1cb189e5|34|1 AckFrame[4,1-0|Δ19] 7.971 <- (6) Packet A|5|S0|dd43ea4067346e0e|1054|1 StreamFrame[0(CIB),0,1024,fin] 7.972 Finished downloading https://server4:443/cpqnfzajdq at 31:33.796 on ClientConnection[cccc12490c41862f/dd43ea4067346e0e(V1) with server4/193.167.100.100:443] 7.972 Closing ClientConnection[cccc12490c41862f/dd43ea4067346e0e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.972 -> Packet A|3|S0|272358ad1cb189e5|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,1-0|Δ0] 7.973 Creating connection with server4:443 with v1 7.973 Setting up connection for downloading https://server4:443/jvdcmheltc at 31:33.797 on ClientConnection[b89e2a5a6c043f90/d9f78523dc68ce46(V1) with server4/193.167.100.100:443] 7.973 Original destination connection id: b89e2a5a6c043f90 (scid: d9f78523dc68ce46) >- CryptoStream[I|ClientHello] 7.975 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.175/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.975 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.004 <- (7) Packet A|6|S0|dd43ea4067346e0e|30|1 ConnectionCloseFrame[0|1|] 8.009 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 8.010 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.210/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.009 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 8.013 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 8.115/Handshake, because peerAwaitingAddressValidation | RTT:34/17 8.012 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.015 Starting downloading https://server4:443/jvdcmheltc at 31:33.840 on ClientConnection[b89e2a5a6c043f90/d9f78523dc68ce46(V1) with server4/193.167.100.100:443] 8.015 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 8.117/Handshake, because peerAwaitingAddressValidation | RTT:34/17 8.016 Discarding pn space Initial because first Handshake message is being sent 8.016 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 8.118/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.016 -> Packet H|0|L|80|1 CryptoFrame[0,36] 8.016 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 8.118/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.016 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|4f6d89811ac66e49|47|1 StreamFrame[0(CIB),0,17,fin]] 8.049 <- (2) Packet A|1|S0|d9f78523dc68ce46|100|4 AckFrame[0|Δ2] HandshakeDoneFrame[] NewTokenFrame[b7bd81df1f64163a7243983ecb85aaea3f9c1a9f2eb601d60b0b4f4705df501858bee0535b] NewConnectionIdFrame[1,<0|602f6c536b416a4e|ef1559cffc261f14cb9ca176eafaab34] 8.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 8.152/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.050 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 8.102/Handshake, because ackElicitingInFlight | RTT:34/13 8.050 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.050 Discarding pn space Handshake because HandshakeDone is received 8.070 -> Packet A|1|S0|4f6d89811ac66e49|32|1 AckFrame[1|Δ19] 8.167 <- (3) Packet A|3|S0|d9f78523dc68ce46|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 8.167 <- (4) Packet A|4|S0|d9f78523dc68ce46|94|3 HandshakeDoneFrame[] NewTokenFrame[b7bd81df1f64163a7243983ecb85aaea3f9c1a9f2eb601d60b0b4f4705df501858bee0535b] NewConnectionIdFrame[1,<0|602f6c536b416a4e|ef1559cffc261f14cb9ca176eafaab34] 8.168 -> Packet A|2|S0|4f6d89811ac66e49|33|1 AckFrame[4-3,1|Δ0] 8.201 <- (5) Packet A|5|S0|d9f78523dc68ce46|1054|1 StreamFrame[0(CIB),0,1024,fin] 8.202 Finished downloading https://server4:443/jvdcmheltc at 31:34.026 on ClientConnection[b89e2a5a6c043f90/d9f78523dc68ce46(V1) with server4/193.167.100.100:443] 8.202 Closing ClientConnection[b89e2a5a6c043f90/d9f78523dc68ce46(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.202 -> Packet A|3|S0|4f6d89811ac66e49|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1|Δ0] 8.203 Creating connection with server4:443 with v1 8.203 Setting up connection for downloading https://server4:443/bdelnabymy at 31:34.027 on ClientConnection[9f0460359da0bc8a/f38b3978d23daee3(V1) with server4/193.167.100.100:443] 8.203 Original destination connection id: 9f0460359da0bc8a (scid: f38b3978d23daee3) >- CryptoStream[I|ClientHello] 8.205 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.405/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.205 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.240 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 8.241 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.441/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.240 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,732] Padding(246) 8.244 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.348/Handshake, because peerAwaitingAddressValidation | RTT:35/17 8.244 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 8.248 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.351/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.248 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.248 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.351/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.248 Discarding pn space Initial because first Handshake message is being sent 8.248 Starting downloading https://server4:443/bdelnabymy at 31:34.072 on ClientConnection[9f0460359da0bc8a/f38b3978d23daee3(V1) with server4/193.167.100.100:443] 8.248 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 8.249 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.352/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.249 -> Packet A|0|S0|29d0b940c6ace94f|47|1 StreamFrame[0(CIB),0,17,fin] 8.280 <- (2) Packet H|1|L|46|1 AckFrame[0|Δ0] 8.281 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 8.281 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 8.280 <- (2) Packet A|0|S0|f38b3978d23daee3|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 8.281 <- (3) Packet A|1|S0|f38b3978d23daee3|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b74be377c78edbed46437550362bbfe7eab171cf3bcf47fbce5c0128779f8c723c76972170] NewConnectionIdFrame[1,<0|bc7dfd5c80635aff|80852602ea1d3e8c9a5eb6ed0fd0bb83] 8.282 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.282 State is set to Confirmed 8.282 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.282 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.282 Discarding pn space Handshake because HandshakeDone is received 8.282 -> Packet A|1|S0|29d0b940c6ace94f|31|1 AckFrame[1-0|Δ0] 8.421 <- (4) Packet A|3|S0|f38b3978d23daee3|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 8.441 -> Packet A|2|S0|29d0b940c6ace94f|34|1 AckFrame[3,1-0|Δ19] 8.474 <- (5) Packet A|5|S0|f38b3978d23daee3|1054|1 StreamFrame[0(CIB),0,1024,fin] 8.474 Finished downloading https://server4:443/bdelnabymy at 31:34.299 on ClientConnection[9f0460359da0bc8a/f38b3978d23daee3(V1) with server4/193.167.100.100:443] 8.474 Closing ClientConnection[9f0460359da0bc8a/f38b3978d23daee3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.475 -> Packet A|3|S0|29d0b940c6ace94f|39|2 ConnectionCloseFrame[0|0|] AckFrame[5,3,1-0|Δ0] 8.475 Creating connection with server4:443 with v1 8.476 Setting up connection for downloading https://server4:443/ezzqwnrghu at 31:34.300 on ClientConnection[717ea0492d80b999/60c91e5dfa73c12e(V1) with server4/193.167.100.100:443] 8.476 Original destination connection id: 717ea0492d80b999 (scid: 60c91e5dfa73c12e) >- CryptoStream[I|ClientHello] 8.477 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.677/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.477 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.506 <- (6) Packet A|6|S0|f38b3978d23daee3|30|1 ConnectionCloseFrame[0|1|] 8.676 loss detection timeout handler running Sending probe 0, because no ack since 8.477. Current RTT: 100/25. 8.677 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.677 (Probe is an initial retransmit) 8.677 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.077/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.677 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.076 loss detection timeout handler running Sending probe 1, because no ack since 8.677. Current RTT: 100/25. 9.077 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.077 (Probe is an initial retransmit) 9.077 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.877/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.077 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.078 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.878/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.078 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.112 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 9.113 probe count not reset on ack because handshake not yet confirmed 9.113 Retransmitting CryptoFrame[0,257] on level Initial 9.113 Cwnd(-): 6000; inflight: 0 9.113 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.913/Initial, because peerAwaitingAddressValidation | RTT:100/25 9.113 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 9.521/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.113 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 9.112 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,730] Padding(249) 9.116 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 9.524/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.116 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 9.118 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 9.526/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.118 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.119 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.221/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.119 Discarding pn space Initial because first Handshake message is being sent 9.119 Starting downloading https://server4:443/ezzqwnrghu at 31:34.943 on ClientConnection[717ea0492d80b999/60c91e5dfa73c12e(V1) with server4/193.167.100.100:443] 9.119 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 9.119 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.221/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.119 -> Packet A|0|S0|d943df85d82ec6dd|47|1 StreamFrame[0(CIB),0,17,fin] 9.220 loss detection timeout handler running Sending probe 0, because no ack since 9.118. Current RTT: 34/17. 9.220 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.221 (Probe is a handshake retransmit) 9.221 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 9.425/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.221 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 9.393 <- (2) Packet A|3|S0|60c91e5dfa73c12e|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.393 <- (3) Packet A|4|S0|60c91e5dfa73c12e|94|3 HandshakeDoneFrame[] NewTokenFrame[b702fef19fb4d420510e1b921b7f9c66e84cbe63110164d6a17d00d1d4ed50e119c5adaee6] NewConnectionIdFrame[1,<0|b8e576f2c422411f|a3930ec3bc23c67f6ba655f532165f0e] 9.394 State is set to Confirmed reschedule loss detection timer for PTO over -21 millis, based on 9.373/App, because ackElicitingInFlight | RTT:34/17 9.394 loss detection timeout handler running Sending probe 1, because no ack since 9.119. Current RTT: 34/17. reschedule loss detection timer for PTO over -148 millis, based on 9.246/App, because ackElicitingInFlight | RTT:34/17 9.395 Discarding pn space Handshake because HandshakeDone is received 9.395 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 9.649/App, because ackElicitingInFlight | RTT:34/17 9.395 -> Packet PA|1|S0|d943df85d82ec6dd|52|2 AckFrame[4-3|Δ0] StreamFrame[0(CIB),0,17,fin] 9.428 <- (4) Packet A|5|S0|60c91e5dfa73c12e|1059|2 AckFrame[1-0|Δ0] StreamFrame[0(CIB),0,1024,fin] 9.428 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.429 Finished downloading https://server4:443/ezzqwnrghu at 31:35.253 on ClientConnection[717ea0492d80b999/60c91e5dfa73c12e(V1) with server4/193.167.100.100:443] 9.429 Closing ClientConnection[717ea0492d80b999/60c91e5dfa73c12e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.429 -> Packet A|2|S0|d943df85d82ec6dd|35|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 9.429 Creating connection with server4:443 with v1 9.430 Setting up connection for downloading https://server4:443/iomplgtezu at 31:35.254 on ClientConnection[23fadaee7afe8a42/8e4f2f0ea170b1ed(V1) with server4/193.167.100.100:443] 9.430 Original destination connection id: 23fadaee7afe8a42 (scid: 8e4f2f0ea170b1ed) >- CryptoStream[I|ClientHello] 9.431 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.631/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.431 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.465 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.466 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.666/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.465 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,732] Padding(247) 9.469 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.571/Handshake, because peerAwaitingAddressValidation | RTT:34/17 9.469 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 9.472 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.471 -> Packet H|0|L|80|1 CryptoFrame[0,36] 9.472 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.472 Starting downloading https://server4:443/iomplgtezu at 31:35.296 on ClientConnection[23fadaee7afe8a42/8e4f2f0ea170b1ed(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 9.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.472 Discarding pn space Initial because first Handshake message is being sent 9.472 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 9.472 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.472 -> Packet A|0|S0|4f0353cd710b4001|47|1 StreamFrame[0(CIB),0,17,fin] 9.573 loss detection timeout handler running Sending probe 0, because no ack since 9.471. Current RTT: 34/17. 9.574 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.574 (Probe is a handshake retransmit) 9.574 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 9.778/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.574 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 9.777 loss detection timeout handler running Sending probe 1, because no ack since 9.472. Current RTT: 34/17. 9.777 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.778 (Probe is a handshake retransmit) 9.778 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 10.186/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.778 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 9.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 10.187/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.779 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 9.811 <- (2) Packet H|1|L|46|1 AckFrame[4|Δ0] 9.812 probe count not reset on ack because handshake not yet confirmed 9.812 Retransmitting CryptoFrame[0,36] on level Handshake 9.812 Cwnd(-): 6000; inflight: 127 9.812 -> Packet H|5|L|85|2 CryptoFrame[0,36] AckFrame[0|Δ0] 9.811 <- (2) Packet A|0|S0|8e4f2f0ea170b1ed|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.812 <- (3) Packet A|1|S0|8e4f2f0ea170b1ed|102|4 AckFrame[0|Δ308] HandshakeDoneFrame[] NewTokenFrame[b7488c9ecdbf155ea57c95607b1b99875f773ac5fe5ae27398312e61ec9280d9dcc657d32f] NewConnectionIdFrame[1,<0|a3225295552a2ee3|8f0c45b6efe3000aae2372b99a1a7622] 9.813 State is set to Confirmed 9.813 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.813 Discarding pn space Handshake because HandshakeDone is received 9.813 -> Packet A|1|S0|4f0353cd710b4001|31|1 AckFrame[1-0|Δ0] 9.813 <- (4) Packet A|2|S0|8e4f2f0ea170b1ed|1054|1 StreamFrame[0(CIB),0,1024,fin] 9.814 Finished downloading https://server4:443/iomplgtezu at 31:35.638 on ClientConnection[23fadaee7afe8a42/8e4f2f0ea170b1ed(V1) with server4/193.167.100.100:443] 9.814 Closing ClientConnection[23fadaee7afe8a42/8e4f2f0ea170b1ed(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.814 -> Packet A|2|S0|4f0353cd710b4001|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 9.815 Creating connection with server4:443 with v1 9.815 Setting up connection for downloading https://server4:443/ozfgcrticu at 31:35.639 on ClientConnection[8dd8bbe67cf004f0/c86c3b1ccf51461f(V1) with server4/193.167.100.100:443] 9.815 Original destination connection id: 8dd8bbe67cf004f0 (scid: c86c3b1ccf51461f) >- CryptoStream[I|ClientHello] 9.817 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.017/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.816 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.845 <- (5) Packet A|3|S0|8e4f2f0ea170b1ed|30|1 ConnectionCloseFrame[0|1|] 9.851 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.851 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.051/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.851 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,731] Padding(248) 9.854 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.956/Handshake, because peerAwaitingAddressValidation | RTT:34/17 9.853 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.857 Starting downloading https://server4:443/ozfgcrticu at 31:35.681 on ClientConnection[8dd8bbe67cf004f0/c86c3b1ccf51461f(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 9.959/Handshake, because peerAwaitingAddressValidation | RTT:34/17 9.857 Discarding pn space Initial because first Handshake message is being sent 9.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.959/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.857 -> Packet H|0|L|80|1 CryptoFrame[0,36] 9.858 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.960/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.858 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|22f19c1d8a7a57dc|47|1 StreamFrame[0(CIB),0,17,fin]] 9.890 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 9.890 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 9.890 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 9.890 <- (2) Packet A|0|S0|c86c3b1ccf51461f|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.892 <- (3) Packet A|2|S0|c86c3b1ccf51461f|1054|1 StreamFrame[0(CIB),0,1024,fin] 9.893 Finished downloading https://server4:443/ozfgcrticu at 31:35.717 on ClientConnection[8dd8bbe67cf004f0/c86c3b1ccf51461f(V1) with server4/193.167.100.100:443] 9.893 -> Packet A|1|S0|22f19c1d8a7a57dc|34|1 AckFrame[2,0|Δ1] 9.893 Closing ClientConnection[8dd8bbe67cf004f0/c86c3b1ccf51461f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.894 Creating connection with server4:443 with v1 9.893 -> Packet A|2|S0|22f19c1d8a7a57dc|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 9.894 Setting up connection for downloading https://server4:443/cthculqvit at 31:35.718 on ClientConnection[810ab2b84dc5bd71/7f9ac71de5a5c026(V1) with server4/193.167.100.100:443] 9.894 Original destination connection id: 810ab2b84dc5bd71 (scid: 7f9ac71de5a5c026) >- CryptoStream[I|ClientHello] 9.895 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.095/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.895 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.925 <- (4) Packet A|3|S0|c86c3b1ccf51461f|30|1 ConnectionCloseFrame[0|1|] 9.925 <- (5) Packet A|3|S0|c86c3b1ccf51461f|30|1 ConnectionCloseFrame[0|1|] 9.930 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.930 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.130/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.930 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,732] Padding(247) 9.933 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.035/Handshake, because peerAwaitingAddressValidation | RTT:34/17 9.933 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 9.935 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 101 millis, based on 10.037/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.935 -> Packet H|0|L|80|1 CryptoFrame[0,36] 9.935 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.037/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.935 Discarding pn space Initial because first Handshake message is being sent 9.935 Starting downloading https://server4:443/cthculqvit at 31:35.760 on ClientConnection[810ab2b84dc5bd71/7f9ac71de5a5c026(V1) with server4/193.167.100.100:443] 9.935 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 9.936 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.038/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.936 -> Packet A|0|S0|01e20ac329bf1a43|47|1 StreamFrame[0(CIB),0,17,fin] 9.968 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 9.969 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 9.969 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 9.968 <- (2) Packet A|0|S0|7f9ac71de5a5c026|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.968 <- (3) Packet A|1|S0|7f9ac71de5a5c026|94|3 HandshakeDoneFrame[] NewTokenFrame[b798f19587a008c8d35464a68678dc31b363a4693c4300df647e22e7f53c7d622e7a77d8e1] NewConnectionIdFrame[1,<0|48b4a1389009b647|f5d90b83361ca3b2db86aaf1e8257c67] 9.969 State is set to Confirmed reschedule loss detection timer for PTO over 93 millis, based on 10.063/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 93 millis, based on 10.063/App, because ackElicitingInFlight | RTT:34/17 9.969 Discarding pn space Handshake because HandshakeDone is received 9.970 -> Packet A|1|S0|01e20ac329bf1a43|31|1 AckFrame[1-0|Δ0] 10.062 loss detection timeout handler running Sending probe 0, because no ack since 9.936. Current RTT: 34/17. 10.063 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 10.317/App, because ackElicitingInFlight | RTT:34/17 10.063 -> Packet PA|2|S0|01e20ac329bf1a43|47|1 StreamFrame[0(CIB),0,17,fin] 10.096 <- (4) Packet A|2|S0|7f9ac71de5a5c026|1060|2 AckFrame[2-1|Δ1] StreamFrame[0(CIB),0,1024,fin] 10.097 Cwnd(-): 6000; inflight: 0 10.097 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.097 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 110 millis, based on 10.208/App, because ackElicitingInFlight | RTT:34/13 10.097 -> Packet A|3|S0|01e20ac329bf1a43|47|1 StreamFrame[0(CIB),0,17,fin] 10.097 Finished downloading https://server4:443/cthculqvit at 31:35.921 on ClientConnection[810ab2b84dc5bd71/7f9ac71de5a5c026(V1) with server4/193.167.100.100:443] 10.097 Closing ClientConnection[810ab2b84dc5bd71/7f9ac71de5a5c026(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.098 -> Packet A|4|S0|01e20ac329bf1a43|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 10.098 Creating connection with server4:443 with v1 10.098 Setting up connection for downloading https://server4:443/iyfqhppxcc at 31:35.922 on ClientConnection[948b4ceb386c8ded/ddf98679039e3d81(V1) with server4/193.167.100.100:443] 10.098 Original destination connection id: 948b4ceb386c8ded (scid: ddf98679039e3d81) >- CryptoStream[I|ClientHello] 10.100 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.300/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.100 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.129 <- (5) Packet A|3|S0|7f9ac71de5a5c026|30|1 ConnectionCloseFrame[0|1|] 10.134 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 10.135 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.335/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.134 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,732] Padding(246) 10.137 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.239/Handshake, because peerAwaitingAddressValidation | RTT:34/17 10.137 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 10.139 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.241/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.139 -> Packet H|0|L|80|1 CryptoFrame[0,36] 10.139 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.241/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.139 Discarding pn space Initial because first Handshake message is being sent 10.139 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 10.140 Starting downloading https://server4:443/iyfqhppxcc at 31:35.964 on ClientConnection[948b4ceb386c8ded/ddf98679039e3d81(V1) with server4/193.167.100.100:443] 10.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.242/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.140 -> Packet A|0|S0|a82b69d58ec384d9|47|1 StreamFrame[0(CIB),0,17,fin] 10.172 <- (2) Packet H|1|L|46|1 AckFrame[0|Δ0] 10.172 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 10.172 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 10.172 <- (2) Packet A|0|S0|ddf98679039e3d81|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.172 <- (3) Packet A|1|S0|ddf98679039e3d81|94|3 HandshakeDoneFrame[] NewTokenFrame[b7084599f685e89fc29330d1e8cc1290edc2a843c33ff2c70c56399df199801ef98a933778] NewConnectionIdFrame[1,<0|f229f9cfc22fb3d0|d03de6995271cd04cfac8fae7d75ff16] 10.173 State is set to Confirmed reschedule loss detection timer for PTO over 77 millis, based on 10.251/App, because ackElicitingInFlight | RTT:34/13 reschedule loss detection timer for PTO over 77 millis, based on 10.251/App, because ackElicitingInFlight | RTT:34/13 10.173 Discarding pn space Handshake because HandshakeDone is received 10.173 -> Packet A|1|S0|a82b69d58ec384d9|31|1 AckFrame[1-0|Δ0] 10.250 loss detection timeout handler running Sending probe 0, because no ack since 10.140. Current RTT: 34/13. 10.250 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 10.473/App, because ackElicitingInFlight | RTT:34/13 10.251 -> Packet PA|2|S0|a82b69d58ec384d9|47|1 StreamFrame[0(CIB),0,17,fin] 10.472 loss detection timeout handler running Sending probe 1, because no ack since 10.251. Current RTT: 34/13. 10.472 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 443 millis, based on 10.916/App, because ackElicitingInFlight | RTT:34/13 10.472 -> Packet PA|3|S0|a82b69d58ec384d9|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 443 millis, based on 10.917/App, because ackElicitingInFlight | RTT:34/13 10.473 -> Packet PA|4|S0|a82b69d58ec384d9|47|1 StreamFrame[0(CIB),0,17,fin] 10.506 <- (4) Packet A|2|S0|ddf98679039e3d81|1062|2 AckFrame[4,1|Δ1] StreamFrame[0(CIB),0,1024,fin] 10.507 Cwnd(-): 6000; inflight: 47 10.507 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 10.507 -> Packet A|5|S0|a82b69d58ec384d9|47|1 StreamFrame[0(CIB),0,17,fin] 10.507 Finished downloading https://server4:443/iyfqhppxcc at 31:36.331 on ClientConnection[948b4ceb386c8ded/ddf98679039e3d81(V1) with server4/193.167.100.100:443] 10.507 Closing ClientConnection[948b4ceb386c8ded/ddf98679039e3d81(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.508 -> Packet A|6|S0|a82b69d58ec384d9|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 10.508 Creating connection with server4:443 with v1 10.508 Setting up connection for downloading https://server4:443/mawqheupla at 31:36.332 on ClientConnection[2e2a029efcc9cb13/c2a0030ad92d1d05(V1) with server4/193.167.100.100:443] 10.508 Original destination connection id: 2e2a029efcc9cb13 (scid: c2a0030ad92d1d05) >- CryptoStream[I|ClientHello] 10.510 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.710/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.510 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.539 <- (5) Packet A|3|S0|ddf98679039e3d81|35|2 AckFrame[6-5|Δ0] ConnectionCloseFrame[0|1|] 10.544 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 10.544 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.745/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.544 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 10.547 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.649/Handshake, because peerAwaitingAddressValidation | RTT:34/17 10.547 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 10.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.651/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.549 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.550 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.550 Starting downloading https://server4:443/mawqheupla at 31:36.374 on ClientConnection[2e2a029efcc9cb13/c2a0030ad92d1d05(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 10.652/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.550 Discarding pn space Initial because first Handshake message is being sent 10.550 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 10.550 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.652/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.550 -> Packet A|0|S0|6f48c43da20634ae|47|1 StreamFrame[0(CIB),0,17,fin] 10.651 loss detection timeout handler running Sending probe 0, because no ack since 10.549. Current RTT: 34/17. 10.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.652 (Probe is a handshake retransmit) 10.652 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 10.856/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.652 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 10.855 loss detection timeout handler running Sending probe 1, because no ack since 10.550. Current RTT: 34/17. 10.855 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.855 (Probe is a handshake retransmit) 10.856 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 11.264/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.855 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 10.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 11.265/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.856 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 11.264 loss detection timeout handler running Sending probe 2, because no ack since 10.550. Current RTT: 34/17. 11.264 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.264 (Probe is a handshake retransmit) 11.264 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 12.080/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.264 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 11.265 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 12.081/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.265 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 11.605 <- (2) Packet A|3|S0|c2a0030ad92d1d05|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 11.605 <- (3) Packet A|4|S0|c2a0030ad92d1d05|94|3 HandshakeDoneFrame[] NewTokenFrame[b7f570303af46ab70907b62be1d0d99959055d49ebf0bfcd728b48c3c32e3aede1d3973bb8] NewConnectionIdFrame[1,<0|9a79821504a1b516|b9175c963e2f11f4bd3adbbfcf4295d5] 11.606 State is set to Confirmed reschedule loss detection timer for PTO over -39 millis, based on 11.566/App, because ackElicitingInFlight | RTT:34/17 11.606 loss detection timeout handler running Sending probe 3, because no ack since 10.550. Current RTT: 34/17. reschedule loss detection timer for PTO over -928 millis, based on 10.677/App, because ackElicitingInFlight | RTT:34/17 11.606 Discarding pn space Handshake because HandshakeDone is received 11.606 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 11.860/App, because ackElicitingInFlight | RTT:34/17 11.606 -> Packet PA|1|S0|6f48c43da20634ae|52|2 AckFrame[4-3|Δ0] StreamFrame[0(CIB),0,17,fin] 11.859 loss detection timeout handler running Sending probe 1, because no ack since 11.606. Current RTT: 34/17. 11.860 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 12.368/App, because ackElicitingInFlight | RTT:34/17 11.860 -> Packet PA|2|S0|6f48c43da20634ae|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 12.369/App, because ackElicitingInFlight | RTT:34/17 11.861 -> Packet PA|3|S0|6f48c43da20634ae|47|1 StreamFrame[0(CIB),0,17,fin] 11.892 <- (4) Packet A|5|S0|c2a0030ad92d1d05|33|1 AckFrame[3-2,0|Δ0] 11.892 Cwnd(-): 6000; inflight: 0 11.893 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.318 <- (5) Packet A|6|S0|c2a0030ad92d1d05|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 13.318 <- (6) Packet A|7|S0|c2a0030ad92d1d05|94|3 HandshakeDoneFrame[] NewTokenFrame[b7f570303af46ab70907b62be1d0d99959055d49ebf0bfcd728b48c3c32e3aede1d3973bb8] NewConnectionIdFrame[1,<0|9a79821504a1b516|b9175c963e2f11f4bd3adbbfcf4295d5] 13.319 -> Packet A|4|S0|6f48c43da20634ae|31|1 AckFrame[7-3|Δ0] 16.408 <- (7) Packet A|9|S0|c2a0030ad92d1d05|94|3 HandshakeDoneFrame[] NewTokenFrame[b7f570303af46ab70907b62be1d0d99959055d49ebf0bfcd728b48c3c32e3aede1d3973bb8] NewConnectionIdFrame[1,<0|9a79821504a1b516|b9175c963e2f11f4bd3adbbfcf4295d5] 16.428 -> Packet A|5|S0|6f48c43da20634ae|34|1 AckFrame[9,7-3|Δ19] 16.461 <- (8) Packet A|10|S0|c2a0030ad92d1d05|1054|1 StreamFrame[0(CIB),0,1024,fin] 16.461 Finished downloading https://server4:443/mawqheupla at 31:42.286 on ClientConnection[2e2a029efcc9cb13/c2a0030ad92d1d05(V1) with server4/193.167.100.100:443] 16.461 Closing ClientConnection[2e2a029efcc9cb13/c2a0030ad92d1d05(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.462 -> Packet A|6|S0|6f48c43da20634ae|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,7-3|Δ0] 16.462 Creating connection with server4:443 with v1 16.463 Setting up connection for downloading https://server4:443/eeaxzlhvni at 31:42.287 on ClientConnection[7303596071fbcf0e/45ac6b920ca55441(V1) with server4/193.167.100.100:443] 16.463 Original destination connection id: 7303596071fbcf0e (scid: 45ac6b920ca55441) >- CryptoStream[I|ClientHello] 16.464 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.664/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.464 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.493 <- (9) Packet A|11|S0|c2a0030ad92d1d05|30|1 ConnectionCloseFrame[0|1|] 16.663 loss detection timeout handler running Sending probe 0, because no ack since 16.464. Current RTT: 100/25. 16.663 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.663 (Probe is an initial retransmit) 16.664 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.064/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.664 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.698 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 16.699 probe count not reset on ack because handshake not yet confirmed 16.699 Retransmitting CryptoFrame[0,257] on level Initial 16.699 Cwnd(-): 6000; inflight: 0 16.699 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.099/Initial, because peerAwaitingAddressValidation | RTT:100/25 16.700 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 16.904/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.699 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 16.702 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.698 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) reschedule loss detection timer for PTO over 203 millis, based on 16.906/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.702 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 16.705 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 16.909/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.705 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.706 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.808/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.706 Discarding pn space Initial because first Handshake message is being sent 16.706 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 16.706 Starting downloading https://server4:443/eeaxzlhvni at 31:42.530 on ClientConnection[7303596071fbcf0e/45ac6b920ca55441(V1) with server4/193.167.100.100:443] 16.707 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.809/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.707 -> Packet A|0|S0|ea148ad7b325225c|47|1 StreamFrame[0(CIB),0,17,fin] 16.733 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.739 <- (3) Packet A|1|S0|45ac6b920ca55441|100|4 AckFrame[0|Δ2] HandshakeDoneFrame[] NewTokenFrame[b7f8211255d229122fa0659cdfc45f6ac8c2c3bbb8b686039bc8c3b213a8bb3f87371724fc] NewConnectionIdFrame[1,<0|7f2e42215ba78795|437406ab31b4dfb77149c331355e9ceb] 16.739 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.841/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.740 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 16.791/Handshake, because ackElicitingInFlight | RTT:34/13 16.740 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.740 Discarding pn space Handshake because HandshakeDone is received 16.741 <- (4) Packet A|2|S0|45ac6b920ca55441|1054|1 StreamFrame[0(CIB),0,1024,fin] 16.741 -> Packet A|1|S0|ea148ad7b325225c|32|1 AckFrame[2-1|Δ1] 16.741 Finished downloading https://server4:443/eeaxzlhvni at 31:42.565 on ClientConnection[7303596071fbcf0e/45ac6b920ca55441(V1) with server4/193.167.100.100:443] 16.741 Closing ClientConnection[7303596071fbcf0e/45ac6b920ca55441(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.742 -> Packet A|2|S0|ea148ad7b325225c|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 16.742 Creating connection with server4:443 with v1 16.742 Setting up connection for downloading https://server4:443/hazuschksu at 31:42.567 on ClientConnection[4ec93cbcb0efa437/c45cd2d3851a8a69(V1) with server4/193.167.100.100:443] 16.742 Original destination connection id: 4ec93cbcb0efa437 (scid: c45cd2d3851a8a69) >- CryptoStream[I|ClientHello] 16.744 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.944/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.744 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.773 <- (5) Packet A|3|S0|45ac6b920ca55441|30|1 ConnectionCloseFrame[0|1|] 16.943 loss detection timeout handler running Sending probe 0, because no ack since 16.744. Current RTT: 100/25. 16.944 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.944 (Probe is an initial retransmit) 16.944 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.344/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.944 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.979 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 16.979 probe count not reset on ack because handshake not yet confirmed 16.980 Retransmitting CryptoFrame[0,257] on level Initial 16.980 Cwnd(-): 6000; inflight: 0 16.980 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.380/Initial, because peerAwaitingAddressValidation | RTT:100/25 16.980 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 17.184/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.980 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 16.979 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,731] Padding(248) 16.983 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 17.187/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.983 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 16.986 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 17.190/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.986 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.987 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.987 Starting downloading https://server4:443/hazuschksu at 31:42.811 on ClientConnection[4ec93cbcb0efa437/c45cd2d3851a8a69(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 17.089/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.987 Discarding pn space Initial because first Handshake message is being sent 16.988 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.090/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.987 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|633a997a4f60fd31|47|1 StreamFrame[0(CIB),0,17,fin]] 17.019 <- (2) Packet A|1|S0|c45cd2d3851a8a69|94|3 HandshakeDoneFrame[] NewTokenFrame[b764811de5929d62e205df2f4ea13ed6675d6b222e85cbc6c2f9c31112ba52c2af31ad4e69] NewConnectionIdFrame[1,<0|9325e0404741f8f8|e1d30dd6523b45bcb5eb0c52f4ad2f6f] 17.020 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 17.088/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 94 millis, based on 17.114/App, because ackElicitingInFlight | RTT:34/17 17.020 Discarding pn space Handshake because HandshakeDone is received 17.039 -> Packet A|1|S0|633a997a4f60fd31|32|1 AckFrame[1|Δ19] 17.114 loss detection timeout handler running Sending probe 0, because no ack since 16.987. Current RTT: 34/17. 17.114 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 17.368/App, because ackElicitingInFlight | RTT:34/17 17.114 -> Packet PA|2|S0|633a997a4f60fd31|47|1 StreamFrame[0(CIB),0,17,fin] 17.368 loss detection timeout handler running Sending probe 1, because no ack since 17.114. Current RTT: 34/17. 17.368 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 17.876/App, because ackElicitingInFlight | RTT:34/17 17.368 -> Packet PA|3|S0|633a997a4f60fd31|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 17.877/App, because ackElicitingInFlight | RTT:34/17 17.369 -> Packet PA|4|S0|633a997a4f60fd31|47|1 StreamFrame[0(CIB),0,17,fin] 17.393 <- (3) Packet A|3|S0|c45cd2d3851a8a69|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 17.394 <- (4) Packet A|4|S0|c45cd2d3851a8a69|1054|1 StreamFrame[0(CIB),0,1024,fin] 17.394 -> Packet A|5|S0|633a997a4f60fd31|33|1 AckFrame[4-3,1|Δ0] 17.394 <- (5) Packet A|5|S0|c45cd2d3851a8a69|544|1 CryptoFrame[0,514] 17.394 Finished downloading https://server4:443/hazuschksu at 31:43.219 on ClientConnection[4ec93cbcb0efa437/c45cd2d3851a8a69(V1) with server4/193.167.100.100:443] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 17.395 Closing ClientConnection[4ec93cbcb0efa437/c45cd2d3851a8a69(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.395 -> Packet A|6|S0|633a997a4f60fd31|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1|Δ0] 17.395 Creating connection with server4:443 with v1 17.396 Setting up connection for downloading https://server4:443/gjdgcnxiqy at 31:43.220 on ClientConnection[0a60fef6afa788d2/ad78e5a90269c0ef(V1) with server4/193.167.100.100:443] 17.396 Original destination connection id: 0a60fef6afa788d2 (scid: ad78e5a90269c0ef) >- CryptoStream[I|ClientHello] 17.397 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.597/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.397 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.421 <- (6) Packet A|6|S0|c45cd2d3851a8a69|32|1 AckFrame[3-1|Δ21] 17.421 -> Packet A|7|S0|633a997a4f60fd31|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1|Δ0] 17.426 <- (7) Packet A|7|S0|c45cd2d3851a8a69|30|1 ConnectionCloseFrame[0|1|] 17.597 loss detection timeout handler running Sending probe 0, because no ack since 17.397. Current RTT: 100/25. 17.597 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.597 (Probe is an initial retransmit) 17.597 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.997/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.597 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.632 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 17.633 probe count not reset on ack because handshake not yet confirmed 17.633 Retransmitting CryptoFrame[0,257] on level Initial 17.633 Cwnd(-): 6000; inflight: 0 17.633 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.033/Initial, because peerAwaitingAddressValidation | RTT:100/25 17.633 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 17.837/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.633 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 17.632 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 17.635 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 17.840/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.635 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 17.638 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 17.842/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.638 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.638 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.638 Starting downloading https://server4:443/gjdgcnxiqy at 31:43.462 on ClientConnection[0a60fef6afa788d2/ad78e5a90269c0ef(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 17.740/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.638 Discarding pn space Initial because first Handshake message is being sent 17.638 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 17.639 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.741/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.639 -> Packet A|0|S0|fbe1f04bd1a2baf4|47|1 StreamFrame[0(CIB),0,17,fin] 17.671 <- (2) Packet H|2|L|46|1 AckFrame[1-0|Δ0] 17.671 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 17.671 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 17.671 <- (2) Packet A|0|S0|ad78e5a90269c0ef|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 17.691 -> Packet A|1|S0|fbe1f04bd1a2baf4|32|1 AckFrame[0|Δ19] 17.785 <- (3) Packet A|2|S0|ad78e5a90269c0ef|94|3 HandshakeDoneFrame[] NewTokenFrame[b748f051b3e89e1373f27e5d490061cd839c9e6c84b9de96efe6c74f5635b2cc396d6866da] NewConnectionIdFrame[1,<0|0fc119facb066618|d6f2eda8ca1e8eb86c14ab21c2a1dcdd] 17.785 State is set to Confirmed reschedule loss detection timer for PTO over -19 millis, based on 17.766/App, because ackElicitingInFlight | RTT:34/17 17.785 loss detection timeout handler running Sending probe 0, because no ack since 17.638. Current RTT: 34/17. reschedule loss detection timer for PTO over -19 millis, based on 17.766/App, because ackElicitingInFlight | RTT:34/17 17.786 Discarding pn space Handshake because HandshakeDone is received 17.786 (Probe is retransmit on level App) 17.785 <- (4) Packet A|3|S0|ad78e5a90269c0ef|94|3 HandshakeDoneFrame[] NewTokenFrame[b748f051b3e89e1373f27e5d490061cd839c9e6c84b9de96efe6c74f5635b2cc396d6866da] NewConnectionIdFrame[1,<0|0fc119facb066618|d6f2eda8ca1e8eb86c14ab21c2a1dcdd] reschedule loss detection timer for PTO over 253 millis, based on 18.040/App, because ackElicitingInFlight | RTT:34/17 17.786 -> Packet PA|2|S0|fbe1f04bd1a2baf4|47|1 StreamFrame[0(CIB),0,17,fin] 17.786 -> Packet A|3|S0|fbe1f04bd1a2baf4|33|1 AckFrame[3-2,0|Δ0] 17.819 <- (5) Packet A|4|S0|ad78e5a90269c0ef|1060|2 AckFrame[3-1|Δ2] StreamFrame[0(CIB),0,1024,fin] 17.820 Cwnd(-): 3000; inflight: 0 17.820 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 17.820 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 126 millis, based on 17.947/App, because ackElicitingInFlight | RTT:34/17 17.820 -> Packet A|4|S0|fbe1f04bd1a2baf4|47|1 StreamFrame[0(CIB),0,17,fin] 17.820 Finished downloading https://server4:443/gjdgcnxiqy at 31:43.644 on ClientConnection[0a60fef6afa788d2/ad78e5a90269c0ef(V1) with server4/193.167.100.100:443] 17.820 Closing ClientConnection[0a60fef6afa788d2/ad78e5a90269c0ef(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.821 Creating connection with server4:443 with v1 17.821 -> Packet A|5|S0|fbe1f04bd1a2baf4|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 17.822 Setting up connection for downloading https://server4:443/tdpsjgaxdh at 31:43.646 on ClientConnection[a2ab55eda4e6f6f3/51941e2669b288dd(V1) with server4/193.167.100.100:443] 17.822 Original destination connection id: a2ab55eda4e6f6f3 (scid: 51941e2669b288dd) >- CryptoStream[I|ClientHello] 17.823 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.023/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.823 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.852 <- (6) Packet A|5|S0|ad78e5a90269c0ef|35|2 AckFrame[5-4|Δ0] ConnectionCloseFrame[0|1|] 18.022 loss detection timeout handler running Sending probe 0, because no ack since 17.823. Current RTT: 100/25. 18.022 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.022 (Probe is an initial retransmit) 18.023 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.423/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.022 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.422 loss detection timeout handler running Sending probe 1, because no ack since 18.022. Current RTT: 100/25. 18.422 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.422 (Probe is an initial retransmit) 18.423 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.223/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.422 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.424 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.224/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.423 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.456 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 18.456 <- (1) Packet I|2|L|49|1 Token=[] AckFrame[2,0|Δ0] 18.459 probe count not reset on ack because handshake not yet confirmed 18.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 19.259/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.459 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 18.459 Cwnd(-): 6000; inflight: 2401 18.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 19.259/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.456 <- (1) Packet H|1|L|981|2 CryptoFrame[0,731] Padding(204) >- CryptoStream[H|Finished] 18.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.850/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.462 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.462 Discarding pn space Initial because first Handshake message is being sent 18.462 Starting downloading https://server4:443/tdpsjgaxdh at 31:44.286 on ClientConnection[a2ab55eda4e6f6f3/51941e2669b288dd(V1) with server4/193.167.100.100:443] 18.462 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 18.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.463 -> Packet A|0|S0|fe4db04b7b5eb151|47|1 StreamFrame[0(CIB),0,17,fin] 18.559 loss detection timeout handler running Sending probe 0, because no ack since 18.462. Current RTT: 33/16. 18.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.559 (Probe is a handshake retransmit) 18.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.753/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.559 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 18.592 <- (2) Packet A|1|S0|51941e2669b288dd|100|4 AckFrame[0|Δ98] HandshakeDoneFrame[] NewTokenFrame[b79cd60f80eee4b3bb6b0024c2a97e5760c41f129d130f8adc3637a89b8a2e56d25569af91] NewConnectionIdFrame[1,<0|ed526d3979fe81a8|07219fbb9533142947ba81721ab261d0] 18.593 probe count not reset on ack because handshake not yet confirmed 18.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.787/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.593 State is set to Confirmed reschedule loss detection timer for PTO over 290 millis, based on 18.883/Handshake, because ackElicitingInFlight | RTT:42/30 18.593 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.593 Discarding pn space Handshake because HandshakeDone is received 18.594 <- (3) Packet A|2|S0|51941e2669b288dd|1054|1 StreamFrame[0(CIB),0,1024,fin] 18.594 -> Packet A|1|S0|fe4db04b7b5eb151|32|1 AckFrame[2-1|Δ1] 18.594 Finished downloading https://server4:443/tdpsjgaxdh at 31:44.418 on ClientConnection[a2ab55eda4e6f6f3/51941e2669b288dd(V1) with server4/193.167.100.100:443] 18.594 Closing ClientConnection[a2ab55eda4e6f6f3/51941e2669b288dd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.595 -> Packet A|2|S0|fe4db04b7b5eb151|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 18.595 Creating connection with server4:443 with v1 18.596 Setting up connection for downloading https://server4:443/ngnokkdenv at 31:44.420 on ClientConnection[3508fe9a7e212662/6cc832e72ece947a(V1) with server4/193.167.100.100:443] 18.596 Original destination connection id: 3508fe9a7e212662 (scid: 6cc832e72ece947a) >- CryptoStream[I|ClientHello] 18.597 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.797/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.597 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.626 <- (4) Packet A|3|S0|51941e2669b288dd|30|1 ConnectionCloseFrame[0|1|] 18.626 <- (5) Packet A|3|S0|51941e2669b288dd|30|1 ConnectionCloseFrame[0|1|] 18.796 loss detection timeout handler running Sending probe 0, because no ack since 18.597. Current RTT: 100/25. 18.796 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.796 (Probe is an initial retransmit) 18.797 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.197/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.796 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.196 loss detection timeout handler running Sending probe 1, because no ack since 18.796. Current RTT: 100/25. 19.196 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.196 (Probe is an initial retransmit) 19.196 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.996/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.196 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.197 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.997/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.197 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.230 <- (1) Packet I|3|L|49|1 Token=[] AckFrame[3-2,0|Δ0] 19.230 probe count not reset on ack because handshake not yet confirmed 19.230 Cwnd(-): 6000; inflight: 0 19.230 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 20.030/Initial, because peerAwaitingAddressValidation | RTT:100/25 19.631 <- (2) Packet I|4|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 19.631 <- (2) Packet H|2|L|1030|2 CryptoFrame[0,732] Padding(252) 19.634 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 20.018/Handshake, because peerAwaitingAddressValidation | RTT:32/16 19.634 -> Packet I|4|L|1201|2 Token=[] AckFrame[4-3|Δ0] Padding(1153) >- CryptoStream[H|Finished] 19.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 20.020/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.636 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 19.732/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.636 Starting downloading https://server4:443/ngnokkdenv at 31:45.460 on ClientConnection[3508fe9a7e212662/6cc832e72ece947a(V1) with server4/193.167.100.100:443] 19.636 Discarding pn space Initial because first Handshake message is being sent 19.636 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 19.636 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.637 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 19.733/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.637 -> Packet A|0|S0|5e7bba2a20792df8|47|1 StreamFrame[0(CIB),0,17,fin] 19.669 <- (4) Packet A|1|S0|6cc832e72ece947a|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b7a18adcf853503602ed6b9168e136605ecb7722cbdb811717fe1900a9f06960c0b9be5736] NewConnectionIdFrame[1,<0|45930b0858c37902|a473cf143085bbbb5e767db39151b628] 19.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 19.766/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.670 State is set to Confirmed reschedule loss detection timer for PTO over 46 millis, based on 19.716/Handshake, because ackElicitingInFlight | RTT:32/12 19.670 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.670 Discarding pn space Handshake because HandshakeDone is received 19.671 <- (5) Packet A|2|S0|6cc832e72ece947a|1054|1 StreamFrame[0(CIB),0,1024,fin] 19.671 -> Packet A|1|S0|5e7bba2a20792df8|32|1 AckFrame[2-1|Δ1] 19.671 Finished downloading https://server4:443/ngnokkdenv at 31:45.496 on ClientConnection[3508fe9a7e212662/6cc832e72ece947a(V1) with server4/193.167.100.100:443] 19.671 Closing ClientConnection[3508fe9a7e212662/6cc832e72ece947a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.672 -> Packet A|2|S0|5e7bba2a20792df8|30|1 ConnectionCloseFrame[0|0|] 19.672 Creating connection with server4:443 with v1 19.672 Setting up connection for downloading https://server4:443/udqsxkphgo at 31:45.497 on ClientConnection[7316e4a11ce7c872/a7dc40287c5a0c9f(V1) with server4/193.167.100.100:443] 19.672 Original destination connection id: 7316e4a11ce7c872 (scid: a7dc40287c5a0c9f) >- CryptoStream[I|ClientHello] 19.674 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.874/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.674 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.703 <- (6) Packet A|3|S0|6cc832e72ece947a|30|1 ConnectionCloseFrame[0|1|] 19.703 <- (7) Packet A|3|S0|6cc832e72ece947a|30|1 ConnectionCloseFrame[0|1|] 19.708 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.708 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.908/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.708 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,732] Padding(247) 19.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.813/Handshake, because peerAwaitingAddressValidation | RTT:34/17 19.711 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 19.714 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.816/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.713 -> Packet H|0|L|80|1 CryptoFrame[0,36] 19.714 Starting downloading https://server4:443/udqsxkphgo at 31:45.538 on ClientConnection[7316e4a11ce7c872/a7dc40287c5a0c9f(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.714 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.816/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.714 Discarding pn space Initial because first Handshake message is being sent 19.714 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.816/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.714 -> Packet A|0|S0|2f33de6c866acedb|47|1 StreamFrame[0(CIB),0,17,fin] 19.715 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 19.815 loss detection timeout handler running Sending probe 0, because no ack since 19.713. Current RTT: 34/17. 19.816 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.816 (Probe is a handshake retransmit) 19.816 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 20.020/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.816 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 20.019 loss detection timeout handler running Sending probe 1, because no ack since 19.714. Current RTT: 34/17. 20.019 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.020 (Probe is a handshake retransmit) 20.020 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 20.428/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.020 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 20.021 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 20.429/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.021 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 20.053 <- (2) Packet H|1|L|48|1 AckFrame[4,1|Δ0] 20.054 probe count not reset on ack because handshake not yet confirmed 20.054 Retransmitting CryptoFrame[0,36] on level Handshake 20.054 Cwnd(-): 6000; inflight: 127 20.054 -> Packet H|5|L|80|1 CryptoFrame[0,36] 20.053 <- (2) Packet A|0|S0|a7dc40287c5a0c9f|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 20.054 <- (3) Packet A|1|S0|a7dc40287c5a0c9f|102|4 AckFrame[0|Δ306] HandshakeDoneFrame[] NewTokenFrame[b744b2919e9e853bfdd6efb633225379b4671a80bb8c96c547fed7abfe1501acdee767ccf5] NewConnectionIdFrame[1,<0|999500026d529622|7825c7a0a3dc2e5b9b4ad45218511c3a] 20.055 State is set to Confirmed 20.055 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.055 Discarding pn space Handshake because HandshakeDone is received 20.055 -> Packet A|1|S0|2f33de6c866acedb|31|1 AckFrame[1-0|Δ0] 20.056 <- (4) Packet A|2|S0|a7dc40287c5a0c9f|1054|1 StreamFrame[0(CIB),0,1024,fin] 20.056 Finished downloading https://server4:443/udqsxkphgo at 31:45.880 on ClientConnection[7316e4a11ce7c872/a7dc40287c5a0c9f(V1) with server4/193.167.100.100:443] 20.056 Closing ClientConnection[7316e4a11ce7c872/a7dc40287c5a0c9f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.056 -> Packet A|2|S0|2f33de6c866acedb|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 20.057 Creating connection with server4:443 with v1 20.057 Setting up connection for downloading https://server4:443/vpgcdmlebb at 31:45.881 on ClientConnection[48ae29ca31a2b6d0/9ddff57d852951d6(V1) with server4/193.167.100.100:443] 20.057 Original destination connection id: 48ae29ca31a2b6d0 (scid: 9ddff57d852951d6) >- CryptoStream[I|ClientHello] 20.058 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.258/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.058 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.199 <- (5) Packet A|3|S0|a7dc40287c5a0c9f|1054|1 StreamFrame[0(CIB),0,1024,fin] 20.199 -> Packet A|3|S0|2f33de6c866acedb|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 20.200 <- (6) Packet A|4|S0|a7dc40287c5a0c9f|1054|1 StreamFrame[0(CIB),0,1024,fin] 20.200 -> Packet A|4|S0|2f33de6c866acedb|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 20.231 <- (7) Packet A|5|S0|a7dc40287c5a0c9f|30|1 ConnectionCloseFrame[0|1|] 20.257 loss detection timeout handler running Sending probe 0, because no ack since 20.058. Current RTT: 100/25. 20.258 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.258 (Probe is an initial retransmit) 20.258 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.658/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.258 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.293 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 20.293 probe count not reset on ack because handshake not yet confirmed 20.293 Retransmitting CryptoFrame[0,257] on level Initial 20.293 Cwnd(-): 6000; inflight: 0 20.293 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.693/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.293 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 20.497/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.293 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 20.295 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.293 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) reschedule loss detection timer for PTO over 203 millis, based on 20.499/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.295 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 20.298 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 20.502/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.298 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.298 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.298 Starting downloading https://server4:443/vpgcdmlebb at 31:46.122 on ClientConnection[48ae29ca31a2b6d0/9ddff57d852951d6(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 20.400/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.298 Discarding pn space Initial because first Handshake message is being sent 20.298 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 20.299 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.298 -> Packet A|0|S0|95191bcc7b47c632|47|1 StreamFrame[0(CIB),0,17,fin] 20.327 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.330 <- (3) Packet H|2|L|46|1 AckFrame[0|Δ0] 20.330 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 20.330 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 20.330 <- (3) Packet A|0|S0|9ddff57d852951d6|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 20.330 <- (4) Packet A|1|S0|9ddff57d852951d6|94|3 HandshakeDoneFrame[] NewTokenFrame[b73ec36162cea466c20aad4a785adf00f375e36531e1167a5f63d50e2360144052864a610a] NewConnectionIdFrame[1,<0|47adea7b9f3f16ce|f1e26234904cef2ae696067ca659b616] 20.331 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 20.409/App, because ackElicitingInFlight | RTT:34/13 reschedule loss detection timer for PTO over 78 millis, based on 20.409/App, because ackElicitingInFlight | RTT:34/13 20.331 Discarding pn space Handshake because HandshakeDone is received 20.331 -> Packet A|1|S0|95191bcc7b47c632|31|1 AckFrame[1-0|Δ0] 20.409 loss detection timeout handler running Sending probe 0, because no ack since 20.298. Current RTT: 34/13. 20.409 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 20.632/App, because ackElicitingInFlight | RTT:34/13 20.410 -> Packet PA|2|S0|95191bcc7b47c632|47|1 StreamFrame[0(CIB),0,17,fin] 20.631 loss detection timeout handler running Sending probe 1, because no ack since 20.410. Current RTT: 34/13. 20.631 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 443 millis, based on 21.075/App, because ackElicitingInFlight | RTT:34/13 20.631 -> Packet PA|3|S0|95191bcc7b47c632|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 443 millis, based on 21.076/App, because ackElicitingInFlight | RTT:34/13 20.632 -> Packet PA|4|S0|95191bcc7b47c632|47|1 StreamFrame[0(CIB),0,17,fin] 20.665 <- (5) Packet A|2|S0|9ddff57d852951d6|1062|2 AckFrame[4,1|Δ1] StreamFrame[0(CIB),0,1024,fin] 20.666 Cwnd(-): 3000; inflight: 47 20.666 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 20.666 -> Packet A|5|S0|95191bcc7b47c632|47|1 StreamFrame[0(CIB),0,17,fin] 20.666 Finished downloading https://server4:443/vpgcdmlebb at 31:46.490 on ClientConnection[48ae29ca31a2b6d0/9ddff57d852951d6(V1) with server4/193.167.100.100:443] 20.666 Closing ClientConnection[48ae29ca31a2b6d0/9ddff57d852951d6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.667 -> Packet A|6|S0|95191bcc7b47c632|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 20.667 Creating connection with server4:443 with v1 20.668 Setting up connection for downloading https://server4:443/gztkhprqbj at 31:46.492 on ClientConnection[47053cd664b9cfd2/5a4c65f76c736025(V1) with server4/193.167.100.100:443] 20.668 Original destination connection id: 47053cd664b9cfd2 (scid: 5a4c65f76c736025) >- CryptoStream[I|ClientHello] 20.669 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.869/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.669 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.698 <- (6) Packet A|3|S0|9ddff57d852951d6|35|2 AckFrame[6-5|Δ0] ConnectionCloseFrame[0|1|] 20.703 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 20.704 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.904/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.703 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 20.706 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.808/Handshake, because peerAwaitingAddressValidation | RTT:34/17 20.706 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 20.708 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.708 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.709 Starting downloading https://server4:443/gztkhprqbj at 31:46.533 on ClientConnection[47053cd664b9cfd2/5a4c65f76c736025(V1) with server4/193.167.100.100:443] 20.709 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.811/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.709 Discarding pn space Initial because first Handshake message is being sent 20.709 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 20.709 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.811/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.709 -> Packet A|0|S0|570fb91b38a6f094|47|1 StreamFrame[0(CIB),0,17,fin] 20.810 loss detection timeout handler running Sending probe 0, because no ack since 20.708. Current RTT: 34/17. 20.810 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.811 (Probe is a handshake retransmit) 20.811 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 21.015/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.811 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 20.846 <- (2) Packet A|2|S0|5a4c65f76c736025|1054|1 StreamFrame[0(CIB),0,1024,fin] 20.846 Finished downloading https://server4:443/gztkhprqbj at 31:46.671 on ClientConnection[47053cd664b9cfd2/5a4c65f76c736025(V1) with server4/193.167.100.100:443] 20.847 Closing ClientConnection[47053cd664b9cfd2/5a4c65f76c736025(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.847 Creating connection with server4:443 with v1 20.847 -> Packet A|1|S0|570fb91b38a6f094|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 20.848 Setting up connection for downloading https://server4:443/cxhhscxmnp at 31:46.672 on ClientConnection[dad414af7eddce94/035ddf899c5b2329(V1) with server4/193.167.100.100:443] 20.848 Original destination connection id: dad414af7eddce94 (scid: 035ddf899c5b2329) >- CryptoStream[I|ClientHello] 20.849 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.049/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.849 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.883 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 20.884 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.084/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.886 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.988/Handshake, because peerAwaitingAddressValidation | RTT:34/17 20.886 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 20.883 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,732] Padding(246) >- CryptoStream[H|Finished] 20.889 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.991/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.889 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.890 Starting downloading https://server4:443/cxhhscxmnp at 31:46.714 on ClientConnection[dad414af7eddce94/035ddf899c5b2329(V1) with server4/193.167.100.100:443] 20.890 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.992/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.890 Discarding pn space Initial because first Handshake message is being sent 20.890 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 20.890 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.992/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.890 -> Packet A|0|S0|691fa3f245d4c8c9|47|1 StreamFrame[0(CIB),0,17,fin] 20.991 loss detection timeout handler running Sending probe 0, because no ack since 20.889. Current RTT: 34/17. 20.991 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.991 (Probe is a handshake retransmit) 20.992 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 21.196/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.992 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 21.195 loss detection timeout handler running Sending probe 1, because no ack since 20.890. Current RTT: 34/17. 21.195 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.195 (Probe is a handshake retransmit) 21.195 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 21.603/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.195 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 21.196 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 21.604/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.196 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 21.228 <- (2) Packet H|1|L|46|1 AckFrame[4-3|Δ0] 21.228 probe count not reset on ack because handshake not yet confirmed 21.229 Retransmitting CryptoFrame[0,36] on level Handshake 21.229 Cwnd(-): 6000; inflight: 47 21.229 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 21.229 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 21.229 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 359 millis, based on 21.589/Handshake, because ackElicitingInFlight | RTT:34/14 21.229 -> Packet H|5|L|85|2 CryptoFrame[0,36] AckFrame[0|Δ0] 21.228 <- (2) Packet A|0|S0|035ddf899c5b2329|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 21.229 <- (3) Packet A|1|S0|035ddf899c5b2329|102|4 AckFrame[0|Δ306] HandshakeDoneFrame[] NewTokenFrame[b7cbfea10c48c11b9e7b7fac6755608b878d31fb3b9ca96dccab135b56af661399617bab15] NewConnectionIdFrame[1,<0|64be8ecffed84037|ca7b98858d5dae8b9c54d60f5aa7c2ed] reschedule loss detection timer for PTO over 88 millis, based on 21.319/Handshake, because ackElicitingInFlight | RTT:34/14 21.230 State is set to Confirmed reschedule loss detection timer for PTO over 391 millis, based on 21.622/Handshake, because ackElicitingInFlight | RTT:69/81 21.230 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.230 Discarding pn space Handshake because HandshakeDone is received 21.230 -> Packet A|1|S0|691fa3f245d4c8c9|31|1 AckFrame[1-0|Δ0] 21.362 <- (4) Packet A|4|S0|035ddf899c5b2329|94|3 HandshakeDoneFrame[] NewTokenFrame[b7cbfea10c48c11b9e7b7fac6755608b878d31fb3b9ca96dccab135b56af661399617bab15] NewConnectionIdFrame[1,<0|64be8ecffed84037|ca7b98858d5dae8b9c54d60f5aa7c2ed] 21.382 -> Packet A|2|S0|691fa3f245d4c8c9|34|1 AckFrame[4,1-0|Δ19] 21.547 <- (5) Packet A|6|S0|035ddf899c5b2329|1054|1 StreamFrame[0(CIB),0,1024,fin] 21.547 Finished downloading https://server4:443/cxhhscxmnp at 31:47.372 on ClientConnection[dad414af7eddce94/035ddf899c5b2329(V1) with server4/193.167.100.100:443] 21.548 Closing ClientConnection[dad414af7eddce94/035ddf899c5b2329(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.547 <- (6) Packet A|7|S0|035ddf899c5b2329|1054|1 StreamFrame[0(CIB),0,1024,fin] 21.548 Receiving frame for non-existent stream 0 21.548 -> Packet A|3|S0|691fa3f245d4c8c9|39|2 AckFrame[7-6,4,1-0|Δ0] ConnectionCloseFrame[0|0|] 21.548 Creating connection with server4:443 with v1 21.549 Setting up connection for downloading https://server4:443/pftzshdtvm at 31:47.373 on ClientConnection[1ff7ca12df389f50/bb1c5c8c952294d6(V1) with server4/193.167.100.100:443] 21.549 Original destination connection id: 1ff7ca12df389f50 (scid: bb1c5c8c952294d6) >- CryptoStream[I|ClientHello] 21.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.750/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.550 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.585 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 21.585 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.785/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.588 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.690/Handshake, because peerAwaitingAddressValidation | RTT:34/17 21.585 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 21.588 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 21.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.590 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.590 Starting downloading https://server4:443/pftzshdtvm at 31:47.414 on ClientConnection[1ff7ca12df389f50/bb1c5c8c952294d6(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 21.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.590 Discarding pn space Initial because first Handshake message is being sent 21.590 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 21.591 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.693/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.591 -> Packet A|0|S0|7f0ce758ba78db1d|47|1 StreamFrame[0(CIB),0,17,fin] 21.623 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 21.623 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 21.623 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 21.623 <- (2) Packet A|0|S0|bb1c5c8c952294d6|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 21.623 <- (3) Packet A|1|S0|bb1c5c8c952294d6|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b7f94bce245a4ddaae7a623e58941d30cd498e86d35af61cd6f7258433e4352bb075565190] NewConnectionIdFrame[1,<0|2e11f11d2c53bab7|34f75493f8cbab71a72894e937dadbcc] 21.624 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.624 State is set to Confirmed 21.624 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.624 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.624 Discarding pn space Handshake because HandshakeDone is received 21.624 -> Packet A|1|S0|7f0ce758ba78db1d|31|1 AckFrame[1-0|Δ0] 21.625 <- (4) Packet A|2|S0|bb1c5c8c952294d6|1054|1 StreamFrame[0(CIB),0,1024,fin] 21.626 Finished downloading https://server4:443/pftzshdtvm at 31:47.450 on ClientConnection[1ff7ca12df389f50/bb1c5c8c952294d6(V1) with server4/193.167.100.100:443] 21.626 Closing ClientConnection[1ff7ca12df389f50/bb1c5c8c952294d6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.626 -> Packet A|2|S0|7f0ce758ba78db1d|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 21.626 Creating connection with server4:443 with v1 21.627 Setting up connection for downloading https://server4:443/aoeaffupjl at 31:47.451 on ClientConnection[e128f24af10097e2/54a9160711318194(V1) with server4/193.167.100.100:443] 21.627 Original destination connection id: e128f24af10097e2 (scid: 54a9160711318194) >- CryptoStream[I|ClientHello] 21.628 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.828/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.628 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.662 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 21.663 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.863/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.662 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 21.665 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.767/Handshake, because peerAwaitingAddressValidation | RTT:34/17 21.665 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 21.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.667 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.668 Discarding pn space Initial because first Handshake message is being sent 21.668 Starting downloading https://server4:443/aoeaffupjl at 31:47.492 on ClientConnection[e128f24af10097e2/54a9160711318194(V1) with server4/193.167.100.100:443] 21.668 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 21.668 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.770/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.668 -> Packet A|0|S0|d82a2d726eacc74b|47|1 StreamFrame[0(CIB),0,17,fin] 21.700 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 21.701 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 21.701 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 21.700 <- (2) Packet A|0|S0|54a9160711318194|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 21.701 <- (3) Packet A|1|S0|54a9160711318194|100|4 AckFrame[0|Δ2] HandshakeDoneFrame[] NewTokenFrame[b7f83ea74b805b8f2594885f1429a18c33d5624c26afd8472a046cc33e48c4390ce5cd6d67] NewConnectionIdFrame[1,<0|326c2016ba49896b|5e23775634bab81dc088939897f637ca] 21.701 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.701 State is set to Confirmed 21.701 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.701 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.701 Discarding pn space Handshake because HandshakeDone is received 21.702 -> Packet A|1|S0|d82a2d726eacc74b|31|1 AckFrame[1-0|Δ0] 21.702 <- (4) Packet A|2|S0|54a9160711318194|1054|1 StreamFrame[0(CIB),0,1024,fin] 21.703 Finished downloading https://server4:443/aoeaffupjl at 31:47.527 on ClientConnection[e128f24af10097e2/54a9160711318194(V1) with server4/193.167.100.100:443] 21.703 Closing ClientConnection[e128f24af10097e2/54a9160711318194(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.703 -> Packet A|2|S0|d82a2d726eacc74b|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 21.704 Creating connection with server4:443 with v1 21.704 Setting up connection for downloading https://server4:443/krsihwhdbn at 31:47.528 on ClientConnection[c7752d244ebd6f4b/214385f65d6be80b(V1) with server4/193.167.100.100:443] 21.704 Original destination connection id: c7752d244ebd6f4b (scid: 214385f65d6be80b) >- CryptoStream[I|ClientHello] 21.706 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.906/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.706 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.740 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 21.741 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.941/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.740 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 21.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.845/Handshake, because peerAwaitingAddressValidation | RTT:34/17 21.743 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 21.746 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.848/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.746 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.746 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.848/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.746 Discarding pn space Initial because first Handshake message is being sent 21.746 Starting downloading https://server4:443/krsihwhdbn at 31:47.570 on ClientConnection[c7752d244ebd6f4b/214385f65d6be80b(V1) with server4/193.167.100.100:443] 21.746 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 21.746 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.848/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.746 -> Packet A|0|S0|ae6947cc3334cbe0|47|1 StreamFrame[0(CIB),0,17,fin] 21.762 <- (5) Packet A|3|S0|bb1c5c8c952294d6|1054|1 StreamFrame[0(CIB),0,1024,fin] 21.762 -> Packet A|3|S0|7f0ce758ba78db1d|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 21.763 <- (6) Packet A|4|S0|bb1c5c8c952294d6|1054|1 StreamFrame[0(CIB),0,1024,fin] 21.763 -> Packet A|4|S0|7f0ce758ba78db1d|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 21.772 <- (7) Packet A|9|S0|035ddf899c5b2329|1054|1 StreamFrame[0(CIB),0,1024,fin] 21.773 -> Packet A|4|S0|691fa3f245d4c8c9|39|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4,1-0|Δ0] 21.781 <- (2) Packet A|2|S0|214385f65d6be80b|1054|1 StreamFrame[0(CIB),0,1024,fin] 21.782 Finished downloading https://server4:443/krsihwhdbn at 31:47.606 on ClientConnection[c7752d244ebd6f4b/214385f65d6be80b(V1) with server4/193.167.100.100:443] 21.782 Closing ClientConnection[c7752d244ebd6f4b/214385f65d6be80b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.782 -> Packet A|1|S0|ae6947cc3334cbe0|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 21.783 Creating connection with server4:443 with v1 21.783 Setting up connection for downloading https://server4:443/sgakawubni at 31:47.607 on ClientConnection[47c1a7d4177926d4/68de5113bc5e3322(V1) with server4/193.167.100.100:443] 21.783 Original destination connection id: 47c1a7d4177926d4 (scid: 68de5113bc5e3322) >- CryptoStream[I|ClientHello] 21.784 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.984/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.784 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.794 <- (7) Packet A|5|S0|bb1c5c8c952294d6|30|1 ConnectionCloseFrame[0|1|] 21.814 <- (3) Packet A|3|S0|214385f65d6be80b|30|1 ConnectionCloseFrame[0|1|] 21.819 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 21.819 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.019/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.819 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,730] Padding(249) 21.822 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.924/Handshake, because peerAwaitingAddressValidation | RTT:34/17 21.822 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 21.825 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.927/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.825 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.825 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.927/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.825 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 21.825 Starting downloading https://server4:443/sgakawubni at 31:47.649 on ClientConnection[47c1a7d4177926d4/68de5113bc5e3322(V1) with server4/193.167.100.100:443] 21.825 Discarding pn space Initial because first Handshake message is being sent 21.826 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.928/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.826 -> Packet A|0|S0|726c4175f6fa5063|47|1 StreamFrame[0(CIB),0,17,fin] 21.857 <- (2) Packet H|1|L|46|1 AckFrame[0|Δ0] 21.858 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 21.858 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 21.857 <- (2) Packet A|0|S0|68de5113bc5e3322|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 21.858 <- (3) Packet A|1|S0|68de5113bc5e3322|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b7ddeda9f43fda9169b09466a01e1001a1579bbd23f44ddb6479a28fe2b66b2f6a015de817] NewConnectionIdFrame[1,<0|09b349dcae2892bb|09a1f1fdf460cf8251255e875d7d751f] 21.859 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.859 State is set to Confirmed 21.859 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.859 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.859 Discarding pn space Handshake because HandshakeDone is received 21.859 -> Packet A|1|S0|726c4175f6fa5063|31|1 AckFrame[1-0|Δ0] 22.181 <- (8) Packet A|10|S0|035ddf899c5b2329|1054|1 StreamFrame[0(CIB),0,1024,fin] 22.182 -> Packet A|5|S0|691fa3f245d4c8c9|39|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4,1-0|Δ0] 22.207 <- (4) Packet A|6|S0|68de5113bc5e3322|1054|1 StreamFrame[0(CIB),0,1024,fin] 22.208 Finished downloading https://server4:443/sgakawubni at 31:48.032 on ClientConnection[47c1a7d4177926d4/68de5113bc5e3322(V1) with server4/193.167.100.100:443] 22.208 Closing ClientConnection[47c1a7d4177926d4/68de5113bc5e3322(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.208 -> Packet A|2|S0|726c4175f6fa5063|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,1-0|Δ0] 22.208 Creating connection with server4:443 with v1 22.209 Setting up connection for downloading https://server4:443/hihmecusit at 31:48.033 on ClientConnection[22859771babce8d9/a827a3fe2eb5d3be(V1) with server4/193.167.100.100:443] 22.209 Original destination connection id: 22859771babce8d9 (scid: a827a3fe2eb5d3be) >- CryptoStream[I|ClientHello] 22.211 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.411/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.210 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.245 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 22.246 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.446/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.245 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 22.248 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.350/Handshake, because peerAwaitingAddressValidation | RTT:34/17 22.248 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 22.250 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.352/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.250 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.250 Starting downloading https://server4:443/hihmecusit at 31:48.075 on ClientConnection[22859771babce8d9/a827a3fe2eb5d3be(V1) with server4/193.167.100.100:443] 22.250 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.352/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.250 Discarding pn space Initial because first Handshake message is being sent 22.250 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 22.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.353/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.251 -> Packet A|0|S0|03cf672f1a6e71b8|47|1 StreamFrame[0(CIB),0,17,fin] 22.282 <- (2) Packet H|1|L|46|1 AckFrame[0|Δ0] 22.283 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 22.283 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 22.282 <- (2) Packet A|0|S0|a827a3fe2eb5d3be|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.283 <- (3) Packet A|1|S0|a827a3fe2eb5d3be|94|3 HandshakeDoneFrame[] NewTokenFrame[b7b264eca6c20e44919a932342943923dae66f71a383112233d5446d64625e26ba46af1203] NewConnectionIdFrame[1,<0|ace6d340ad348af8|21b90b52d94c28f60bc6b40dee9b1d8b] 22.284 State is set to Confirmed reschedule loss detection timer for PTO over 77 millis, based on 22.362/App, because ackElicitingInFlight | RTT:34/13 reschedule loss detection timer for PTO over 77 millis, based on 22.362/App, because ackElicitingInFlight | RTT:34/13 22.284 Discarding pn space Handshake because HandshakeDone is received 22.284 -> Packet A|1|S0|03cf672f1a6e71b8|31|1 AckFrame[1-0|Δ0] 22.361 loss detection timeout handler running Sending probe 0, because no ack since 22.251. Current RTT: 34/13. 22.361 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 22.583/App, because ackElicitingInFlight | RTT:34/13 22.361 -> Packet PA|2|S0|03cf672f1a6e71b8|47|1 StreamFrame[0(CIB),0,17,fin] 22.394 <- (4) Packet A|2|S0|a827a3fe2eb5d3be|1060|2 AckFrame[2-1|Δ1] StreamFrame[0(CIB),0,1024,fin] 22.395 Cwnd(-): 6000; inflight: 0 22.395 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 22.395 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 98 millis, based on 22.494/App, because ackElicitingInFlight | RTT:34/10 22.395 -> Packet A|3|S0|03cf672f1a6e71b8|47|1 StreamFrame[0(CIB),0,17,fin] 22.395 Finished downloading https://server4:443/hihmecusit at 31:48.220 on ClientConnection[22859771babce8d9/a827a3fe2eb5d3be(V1) with server4/193.167.100.100:443] 22.395 Closing ClientConnection[22859771babce8d9/a827a3fe2eb5d3be(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.396 -> Packet A|4|S0|03cf672f1a6e71b8|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 22.396 Creating connection with server4:443 with v1 22.397 Setting up connection for downloading https://server4:443/abowbuussp at 31:48.221 on ClientConnection[3efecccc60a6a9cf/9a3b9b65d22b1df9(V1) with server4/193.167.100.100:443] 22.397 Original destination connection id: 3efecccc60a6a9cf (scid: 9a3b9b65d22b1df9) >- CryptoStream[I|ClientHello] 22.398 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.598/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.398 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.597 loss detection timeout handler running Sending probe 0, because no ack since 22.398. Current RTT: 100/25. 22.597 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.597 (Probe is an initial retransmit) 22.598 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.998/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.597 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.631 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 22.631 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[1-0|Δ0] 22.633 probe count not reset on ack because handshake not yet confirmed 22.633 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 23.033/Handshake, because peerAwaitingAddressValidation | RTT:100/25 22.633 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 23.033/Handshake, because peerAwaitingAddressValidation | RTT:100/25 22.633 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 22.631 <- (1) Packet H|1|L|983|2 CryptoFrame[0,731] Padding(206) >- CryptoStream[H|Finished] 22.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.636 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.733/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.636 Discarding pn space Initial because first Handshake message is being sent 22.636 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 22.637 Starting downloading https://server4:443/abowbuussp at 31:48.460 on ClientConnection[3efecccc60a6a9cf/9a3b9b65d22b1df9(V1) with server4/193.167.100.100:443] 22.637 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.637 -> Packet A|0|S0|1e736f29d8d24b33|47|1 StreamFrame[0(CIB),0,17,fin] 22.669 <- (2) Packet H|2|L|46|1 AckFrame[1-0|Δ0] 22.669 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 22.669 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 22.669 <- (2) Packet A|0|S0|9a3b9b65d22b1df9|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.671 <- (3) Packet A|2|S0|9a3b9b65d22b1df9|1054|1 StreamFrame[0(CIB),0,1024,fin] 22.671 -> Packet A|1|S0|1e736f29d8d24b33|34|1 AckFrame[2,0|Δ1] 22.672 Finished downloading https://server4:443/abowbuussp at 31:48.496 on ClientConnection[3efecccc60a6a9cf/9a3b9b65d22b1df9(V1) with server4/193.167.100.100:443] 22.672 Closing ClientConnection[3efecccc60a6a9cf/9a3b9b65d22b1df9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.672 -> Packet A|2|S0|1e736f29d8d24b33|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 22.672 Creating connection with server4:443 with v1 22.673 Setting up connection for downloading https://server4:443/ephimzvlsa at 31:48.497 on ClientConnection[6557bf9e6f71a1b7/c6d011f921b5912a(V1) with server4/193.167.100.100:443] 22.673 Original destination connection id: 6557bf9e6f71a1b7 (scid: c6d011f921b5912a) >- CryptoStream[I|ClientHello] 22.674 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.874/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.674 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.709 <- (4) Packet A|3|S0|9a3b9b65d22b1df9|94|3 HandshakeDoneFrame[] NewTokenFrame[b79bc918a192a93dce4c70646755f5e2590811b381370494c5b9a9e3967e75e716cd04693d] NewConnectionIdFrame[1,<0|0e7f2dc097290d8d|f4f1932bc2482bc254c9c809517bc48a] 22.710 -> Packet A|3|S0|1e736f29d8d24b33|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 22.811 <- (5) Packet A|4|S0|9a3b9b65d22b1df9|94|3 HandshakeDoneFrame[] NewTokenFrame[b79bc918a192a93dce4c70646755f5e2590811b381370494c5b9a9e3967e75e716cd04693d] NewConnectionIdFrame[1,<0|0e7f2dc097290d8d|f4f1932bc2482bc254c9c809517bc48a] 22.812 -> Packet A|4|S0|1e736f29d8d24b33|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 22.843 <- (6) Packet A|6|S0|9a3b9b65d22b1df9|30|1 ConnectionCloseFrame[0|1|] 22.873 loss detection timeout handler running Sending probe 0, because no ack since 22.674. Current RTT: 100/25. 22.873 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.873 (Probe is an initial retransmit) 22.873 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.273/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.873 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.273 loss detection timeout handler running Sending probe 1, because no ack since 22.873. Current RTT: 100/25. 23.273 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.273 (Probe is an initial retransmit) 23.273 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.073/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.273 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.274 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.074/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.274 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.073 loss detection timeout handler running Sending probe 2, because no ack since 23.274. Current RTT: 100/25. 24.073 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.073 (Probe is an initial retransmit) 24.074 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 25.674/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.074 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.075 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 25.675/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.075 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.306 <- (1) Packet I|2|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 24.306 <- (1) Packet H|1|L|1030|2 CryptoFrame[0,732] Padding(252) 24.309 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 25.909/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.309 -> Packet I|6|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) >- CryptoStream[H|Finished] 24.311 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 25.911/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.311 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.311 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.511/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.311 Starting downloading https://server4:443/ephimzvlsa at 31:50.136 on ClientConnection[6557bf9e6f71a1b7/c6d011f921b5912a(V1) with server4/193.167.100.100:443] 24.311 Discarding pn space Initial because first Handshake message is being sent 24.311 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 24.312 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.512/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.312 -> Packet A|0|S0|522e40bab0f6fa49|47|1 StreamFrame[0(CIB),0,17,fin] 24.344 <- (3) Packet H|3|L|46|1 AckFrame[0|Δ0] 24.344 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 24.344 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 24.344 <- (3) Packet A|0|S0|c6d011f921b5912a|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 24.344 <- (4) Packet A|1|S0|c6d011f921b5912a|100|4 AckFrame[0|Δ2] HandshakeDoneFrame[] NewTokenFrame[b7f706a27e8b4d9987dc9a2b09cb382e7c0d076f815f61694703e5c04c05069ff9f3c811bd] NewConnectionIdFrame[1,<0|44ef8f8f2056957a|99a70a6cb44cd4d114dbe5610708d987] 24.345 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.345 State is set to Confirmed 24.345 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.345 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.345 Discarding pn space Handshake because HandshakeDone is received 24.345 -> Packet A|1|S0|522e40bab0f6fa49|31|1 AckFrame[1-0|Δ0] 24.346 <- (5) Packet A|2|S0|c6d011f921b5912a|1054|1 StreamFrame[0(CIB),0,1024,fin] 24.347 Finished downloading https://server4:443/ephimzvlsa at 31:50.171 on ClientConnection[6557bf9e6f71a1b7/c6d011f921b5912a(V1) with server4/193.167.100.100:443] 24.347 Closing ClientConnection[6557bf9e6f71a1b7/c6d011f921b5912a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.347 -> Packet A|2|S0|522e40bab0f6fa49|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 24.347 Creating connection with server4:443 with v1 24.347 Setting up connection for downloading https://server4:443/yyvpubfhac at 31:50.172 on ClientConnection[a10d335cb147936e/e594de1f09c32e16(V1) with server4/193.167.100.100:443] 24.348 Original destination connection id: a10d335cb147936e (scid: e594de1f09c32e16) >- CryptoStream[I|ClientHello] 24.349 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.549/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.348 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.378 <- (6) Packet A|3|S0|c6d011f921b5912a|30|1 ConnectionCloseFrame[0|1|] 24.548 loss detection timeout handler running Sending probe 0, because no ack since 24.348. Current RTT: 100/25. 24.548 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.548 (Probe is an initial retransmit) 24.548 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.948/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.548 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.948 loss detection timeout handler running Sending probe 1, because no ack since 24.548. Current RTT: 100/25. 24.948 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.948 (Probe is an initial retransmit) 24.948 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 25.748/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.948 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.949 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 25.749/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.949 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.382 <- (1) Packet I|4|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 25.382 <- (1) Packet H|2|L|1030|2 CryptoFrame[0,732] Padding(252) 25.384 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 26.185/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.384 -> Packet I|4|L|1201|2 Token=[] AckFrame[4|Δ0] Padding(1153) >- CryptoStream[H|Finished] 25.387 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 26.187/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.387 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.387 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.387 Starting downloading https://server4:443/yyvpubfhac at 31:51.211 on ClientConnection[a10d335cb147936e/e594de1f09c32e16(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 199 millis, based on 25.587/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.387 Discarding pn space Initial because first Handshake message is being sent 25.387 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 25.387 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 25.388 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 25.588/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.388 -> Packet A|0|S0|bad3cd6374320222|47|1 StreamFrame[0(CIB),0,17,fin] 25.420 <- (3) Packet H|4|L|46|1 AckFrame[1-0|Δ0] 25.421 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 25.421 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 25.420 <- (3) Packet A|0|S0|e594de1f09c32e16|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 25.420 <- (4) Packet A|1|S0|e594de1f09c32e16|94|3 HandshakeDoneFrame[] NewTokenFrame[b7502b0768dea540065d49303596b4e73edcf7f3bc5498869c53af83826ffce575ae8dc2f5] NewConnectionIdFrame[1,<0|4c5cbe97766d68ce|1f93d0a134ec2435129a452d5694fd8d] 25.421 State is set to Confirmed reschedule loss detection timer for PTO over 191 millis, based on 25.613/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 191 millis, based on 25.613/App, because ackElicitingInFlight | RTT:100/25 25.421 Discarding pn space Handshake because HandshakeDone is received 25.422 -> Packet A|1|S0|bad3cd6374320222|31|1 AckFrame[1-0|Δ0] 25.536 <- (5) Packet A|2|S0|e594de1f09c32e16|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 25.536 <- (6) Packet A|3|S0|e594de1f09c32e16|94|3 HandshakeDoneFrame[] NewTokenFrame[b7502b0768dea540065d49303596b4e73edcf7f3bc5498869c53af83826ffce575ae8dc2f5] NewConnectionIdFrame[1,<0|4c5cbe97766d68ce|1f93d0a134ec2435129a452d5694fd8d] 25.536 -> Packet A|2|S0|bad3cd6374320222|31|1 AckFrame[3-0|Δ0] 25.612 loss detection timeout handler running Sending probe 0, because no ack since 25.388. Current RTT: 100/25. 25.613 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 26.063/App, because ackElicitingInFlight | RTT:100/25 25.613 -> Packet PA|3|S0|bad3cd6374320222|47|1 StreamFrame[0(CIB),0,17,fin] 25.646 <- (7) Packet A|4|S0|e594de1f09c32e16|1060|2 AckFrame[3-2|Δ1] StreamFrame[0(CIB),0,1024,fin] 25.646 Cwnd(-): 6000; inflight: 0 25.646 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 25.646 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 121 millis, based on 25.769/App, because ackElicitingInFlight | RTT:33/16 25.647 -> Packet A|4|S0|bad3cd6374320222|47|1 StreamFrame[0(CIB),0,17,fin] 25.647 Finished downloading https://server4:443/yyvpubfhac at 31:51.471 on ClientConnection[a10d335cb147936e/e594de1f09c32e16(V1) with server4/193.167.100.100:443] 25.647 Closing ClientConnection[a10d335cb147936e/e594de1f09c32e16(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.647 -> Packet A|5|S0|bad3cd6374320222|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 25.648 Creating connection with server4:443 with v1 25.648 Setting up connection for downloading https://server4:443/pueltjdgbw at 31:51.472 on ClientConnection[5358860d213145f9/f6dedfaacc0a5897(V1) with server4/193.167.100.100:443] 25.648 Original destination connection id: 5358860d213145f9 (scid: f6dedfaacc0a5897) >- CryptoStream[I|ClientHello] 25.649 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.849/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.649 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.684 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 25.684 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.884/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 25.687 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 25.789/Handshake, because peerAwaitingAddressValidation | RTT:34/17 25.687 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 25.684 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,732] Padding(247) >- CryptoStream[H|Finished] 25.690 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 25.792/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 25.689 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.690 Starting downloading https://server4:443/pueltjdgbw at 31:51.514 on ClientConnection[5358860d213145f9/f6dedfaacc0a5897(V1) with server4/193.167.100.100:443] 25.690 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 25.792/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 25.690 Discarding pn space Initial because first Handshake message is being sent 25.690 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 25.690 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 25.792/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 25.690 -> Packet A|0|S0|0c0cbac709cd1b2d|47|1 StreamFrame[0(CIB),0,17,fin] 25.722 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 25.723 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 25.723 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 25.722 <- (2) Packet A|0|S0|f6dedfaacc0a5897|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 25.723 <- (3) Packet A|1|S0|f6dedfaacc0a5897|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b7c0b5f4188c2180cabe65c9c43d2dd31bd7cf6afc1758b2bf3644de7249eb6095751aed99] NewConnectionIdFrame[1,<0|f1bf78b61a56293c|6d8f48c3b12f8cbbad77f6c27c260be5] 25.724 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 25.724 State is set to Confirmed 25.724 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 25.724 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 25.724 Discarding pn space Handshake because HandshakeDone is received 25.724 -> Packet A|1|S0|0c0cbac709cd1b2d|31|1 AckFrame[1-0|Δ0] 25.725 <- (4) Packet A|2|S0|f6dedfaacc0a5897|1054|1 StreamFrame[0(CIB),0,1024,fin] 25.725 Finished downloading https://server4:443/pueltjdgbw at 31:51.549 on ClientConnection[5358860d213145f9/f6dedfaacc0a5897(V1) with server4/193.167.100.100:443] 25.725 Closing ClientConnection[5358860d213145f9/f6dedfaacc0a5897(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.725 -> Packet A|2|S0|0c0cbac709cd1b2d|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 25.726 Creating connection with server4:443 with v1 25.726 Setting up connection for downloading https://server4:443/ssxvzainau at 31:51.550 on ClientConnection[570f72f981c1eab7/bfbb1d775eae8805(V1) with server4/193.167.100.100:443] 25.726 Original destination connection id: 570f72f981c1eab7 (scid: bfbb1d775eae8805) >- CryptoStream[I|ClientHello] 25.727 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.927/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.727 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.747 <- (8) Packet A|6|S0|e594de1f09c32e16|1054|1 StreamFrame[0(CIB),0,1024,fin] 25.747 -> Packet A|6|S0|bad3cd6374320222|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 25.757 <- (5) Packet A|3|S0|f6dedfaacc0a5897|30|1 ConnectionCloseFrame[0|1|] 25.757 <- (6) Packet A|3|S0|f6dedfaacc0a5897|30|1 ConnectionCloseFrame[0|1|] 25.778 <- (9) Packet A|8|S0|e594de1f09c32e16|30|1 ConnectionCloseFrame[0|1|] 25.926 loss detection timeout handler running Sending probe 0, because no ack since 25.727. Current RTT: 100/25. 25.927 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.927 (Probe is an initial retransmit) 25.927 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.327/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.927 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.960 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 25.960 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[1-0|Δ0] 25.963 probe count not reset on ack because handshake not yet confirmed 25.963 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 26.363/Handshake, because peerAwaitingAddressValidation | RTT:100/25 25.963 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 26.157/Handshake, because peerAwaitingAddressValidation | RTT:33/16 25.963 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 25.960 <- (1) Packet H|1|L|983|2 CryptoFrame[0,731] Padding(206) >- CryptoStream[H|Finished] 25.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 26.160/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.966 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.967 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.064/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.967 Discarding pn space Initial because first Handshake message is being sent 25.967 Starting downloading https://server4:443/ssxvzainau at 31:51.791 on ClientConnection[570f72f981c1eab7/bfbb1d775eae8805(V1) with server4/193.167.100.100:443] 25.967 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 25.967 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.064/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.967 -> Packet A|0|S0|a78f154823cb70c1|47|1 StreamFrame[0(CIB),0,17,fin] 25.999 <- (2) Packet H|2|L|46|1 AckFrame[1-0|Δ0] 26.000 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 26.000 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 25.999 <- (2) Packet A|0|S0|bfbb1d775eae8805|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 26.000 <- (3) Packet A|1|S0|bfbb1d775eae8805|100|4 AckFrame[0|Δ2] HandshakeDoneFrame[] NewTokenFrame[b71993637e7dba4887b508fa18f0d568e22401fe2702be3cc0c6c3a3e0057df1e40e82ed5f] NewConnectionIdFrame[1,<0|2ba7cf9cdf7d3809|dbe93c45bb1f58b7ce77616443b21ef9] 26.000 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 26.001 State is set to Confirmed 26.001 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 26.001 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 26.001 Discarding pn space Handshake because HandshakeDone is received 26.001 -> Packet A|1|S0|a78f154823cb70c1|31|1 AckFrame[1-0|Δ0] 26.002 <- (4) Packet A|2|S0|bfbb1d775eae8805|1054|1 StreamFrame[0(CIB),0,1024,fin] 26.002 Finished downloading https://server4:443/ssxvzainau at 31:51.827 on ClientConnection[570f72f981c1eab7/bfbb1d775eae8805(V1) with server4/193.167.100.100:443] 26.002 Closing ClientConnection[570f72f981c1eab7/bfbb1d775eae8805(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.003 -> Packet A|2|S0|a78f154823cb70c1|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 26.003 Creating connection with server4:443 with v1 26.003 Setting up connection for downloading https://server4:443/pgmrnplbil at 31:51.828 on ClientConnection[03844664b334e8d6/0347772705e75316(V1) with server4/193.167.100.100:443] 26.004 Original destination connection id: 03844664b334e8d6 (scid: 0347772705e75316) >- CryptoStream[I|ClientHello] 26.005 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.205/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.005 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.034 <- (5) Packet A|3|S0|bfbb1d775eae8805|30|1 ConnectionCloseFrame[0|1|] 26.034 <- (6) Packet A|3|S0|bfbb1d775eae8805|30|1 ConnectionCloseFrame[0|1|] 26.039 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 26.039 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.239/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 26.039 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 26.041 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.143/Handshake, because peerAwaitingAddressValidation | RTT:34/17 26.041 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 26.043 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.145/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.043 -> Packet H|0|L|80|1 CryptoFrame[0,36] 26.044 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.044 Starting downloading https://server4:443/pgmrnplbil at 31:51.868 on ClientConnection[03844664b334e8d6/0347772705e75316(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 26.146/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.044 Discarding pn space Initial because first Handshake message is being sent 26.044 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 26.044 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.146/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.044 -> Packet A|0|S0|5f25e46900454ab0|47|1 StreamFrame[0(CIB),0,17,fin] 26.145 loss detection timeout handler running Sending probe 0, because no ack since 26.043. Current RTT: 34/17. 26.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.145 (Probe is a handshake retransmit) 26.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 26.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.145 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 26.349 loss detection timeout handler running Sending probe 1, because no ack since 26.044. Current RTT: 34/17. 26.349 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.349 (Probe is a handshake retransmit) 26.349 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 26.757/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.349 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 26.350 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 26.758/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.350 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 26.757 loss detection timeout handler running Sending probe 2, because no ack since 26.044. Current RTT: 34/17. 26.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.757 (Probe is a handshake retransmit) 26.758 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 27.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.758 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 26.759 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 27.575/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.759 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 26.790 <- (2) Packet H|1|L|48|1 AckFrame[5,1|Δ0] 26.790 probe count not reset on ack because handshake not yet confirmed 26.791 Retransmitting CryptoFrame[0,36] on level Handshake 26.791 Cwnd(-): 6000; inflight: 127 26.791 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 26.791 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 783 millis, based on 27.575/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 815 millis, based on 27.607/Handshake, because ackElicitingInFlight | RTT:34/17 26.791 -> Packet H|7|L|80|1 CryptoFrame[0,36] 26.790 <- (2) Packet A|0|S0|0347772705e75316|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 26.791 <- (3) Packet A|1|S0|0347772705e75316|102|4 AckFrame[0|Δ714] HandshakeDoneFrame[] NewTokenFrame[b7ea1f9ecec8506fc0af4a861846801eee96cdc0fb2fa86a5a04a682d2186064892139f0cf] NewConnectionIdFrame[1,<0|491a823333ebd4cf|c9588303517b948959efa49cfc28524c] reschedule loss detection timer for PTO over 85 millis, based on 26.877/Handshake, because ackElicitingInFlight | RTT:34/13 26.792 State is set to Confirmed reschedule loss detection timer for PTO over 847 millis, based on 27.639/Handshake, because ackElicitingInFlight | RTT:120/182 26.792 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 26.792 Discarding pn space Handshake because HandshakeDone is received 26.792 -> Packet A|1|S0|5f25e46900454ab0|31|1 AckFrame[1-0|Δ0] 26.926 <- (4) Packet A|3|S0|0347772705e75316|1054|1 StreamFrame[0(CIB),0,1024,fin] 26.927 Finished downloading https://server4:443/pgmrnplbil at 31:52.751 on ClientConnection[03844664b334e8d6/0347772705e75316(V1) with server4/193.167.100.100:443] 26.926 <- (5) Packet A|4|S0|0347772705e75316|1054|1 StreamFrame[0(CIB),0,1024,fin] 26.927 Closing ClientConnection[03844664b334e8d6/0347772705e75316(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.927 Receiving frame for non-existent stream 0 26.927 -> Packet A|2|S0|5f25e46900454ab0|33|1 AckFrame[4-3,1-0|Δ0] 26.927 -> Packet A|3|S0|5f25e46900454ab0|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1-0|Δ0] 26.927 Creating connection with server4:443 with v1 26.928 Setting up connection for downloading https://server4:443/qptcyjbgbo at 31:52.752 on ClientConnection[5014402aabfc5333/ebee8b1c26a03edb(V1) with server4/193.167.100.100:443] 26.928 Original destination connection id: 5014402aabfc5333 (scid: ebee8b1c26a03edb) >- CryptoStream[I|ClientHello] 26.929 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.129/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.929 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.958 <- (6) Packet A|5|S0|0347772705e75316|30|1 ConnectionCloseFrame[0|1|] 26.963 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 26.964 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.164/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 26.963 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 26.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.068/Handshake, because peerAwaitingAddressValidation | RTT:34/17 26.966 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 26.968 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.070/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.968 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.969 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.071/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.969 Starting downloading https://server4:443/qptcyjbgbo at 31:52.793 on ClientConnection[5014402aabfc5333/ebee8b1c26a03edb(V1) with server4/193.167.100.100:443] 26.969 Discarding pn space Initial because first Handshake message is being sent 26.969 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 26.969 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.071/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.969 -> Packet A|0|S0|4416599edbc1f78b|47|1 StreamFrame[0(CIB),0,17,fin] 27.001 <- (2) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 27.002 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 27.002 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 27.001 <- (2) Packet A|0|S0|ebee8b1c26a03edb|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 27.004 <- (3) Packet A|2|S0|ebee8b1c26a03edb|1054|1 StreamFrame[0(CIB),0,1024,fin] 27.004 -> Packet A|1|S0|4416599edbc1f78b|34|1 AckFrame[2,0|Δ1] 27.004 Finished downloading https://server4:443/qptcyjbgbo at 31:52.828 on ClientConnection[5014402aabfc5333/ebee8b1c26a03edb(V1) with server4/193.167.100.100:443] 27.004 Closing ClientConnection[5014402aabfc5333/ebee8b1c26a03edb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.005 -> Packet A|2|S0|4416599edbc1f78b|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 27.005 Creating connection with server4:443 with v1 27.005 Setting up connection for downloading https://server4:443/shyteivqgz at 31:52.829 on ClientConnection[436b848114a921cd/adf5e7ca93811495(V1) with server4/193.167.100.100:443] 27.005 Original destination connection id: 436b848114a921cd (scid: adf5e7ca93811495) >- CryptoStream[I|ClientHello] 27.006 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.206/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.006 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.044 <- (4) Packet A|3|S0|ebee8b1c26a03edb|94|3 HandshakeDoneFrame[] NewTokenFrame[b76f808096d88981e5bbbac5c4bfb1446b8a4c11b37ee94744e6ece20c87ec7c89aff000dc] NewConnectionIdFrame[1,<0|c4eebceb92031078|ebff301961c803706b23efb613ead573] 27.044 -> Packet A|3|S0|4416599edbc1f78b|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 27.076 <- (5) Packet A|4|S0|ebee8b1c26a03edb|30|1 ConnectionCloseFrame[0|1|] 27.206 loss detection timeout handler running Sending probe 0, because no ack since 27.006. Current RTT: 100/25. 27.206 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.206 (Probe is an initial retransmit) 27.206 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.606/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.206 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.605 loss detection timeout handler running Sending probe 1, because no ack since 27.206. Current RTT: 100/25. 27.605 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.605 (Probe is an initial retransmit) 27.606 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.406/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.606 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.607 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.407/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.607 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.641 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 27.641 probe count not reset on ack because handshake not yet confirmed 27.641 Retransmitting CryptoFrame[0,257] on level Initial 27.641 Cwnd(-): 6000; inflight: 0 27.641 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.441/Initial, because peerAwaitingAddressValidation | RTT:100/25 27.641 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 28.050/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.641 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 27.641 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,732] Padding(247) 27.644 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 28.052/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.644 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 27.646 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 28.054/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.646 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.646 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.748/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.646 Discarding pn space Initial because first Handshake message is being sent 27.646 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 27.646 Starting downloading https://server4:443/shyteivqgz at 31:53.470 on ClientConnection[436b848114a921cd/adf5e7ca93811495(V1) with server4/193.167.100.100:443] 27.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.749/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.647 -> Packet A|0|S0|11c337f89023bd01|47|1 StreamFrame[0(CIB),0,17,fin] 27.674 Discarding packet (47 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 27.681 <- (3) Packet A|2|S0|adf5e7ca93811495|1054|1 StreamFrame[0(CIB),0,1024,fin] 27.681 Finished downloading https://server4:443/shyteivqgz at 31:53.505 on ClientConnection[436b848114a921cd/adf5e7ca93811495(V1) with server4/193.167.100.100:443] 27.681 Closing ClientConnection[436b848114a921cd/adf5e7ca93811495(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.681 -> Packet A|1|S0|11c337f89023bd01|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 27.682 Creating connection with server4:443 with v1 27.682 Setting up connection for downloading https://server4:443/rbqnsfppob at 31:53.506 on ClientConnection[c4f5fbf672aa9bc5/e23c2bb55d3fcb17(V1) with server4/193.167.100.100:443] 27.682 Original destination connection id: c4f5fbf672aa9bc5 (scid: e23c2bb55d3fcb17) >- CryptoStream[I|ClientHello] 27.683 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.884/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.683 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.713 <- (4) Packet A|3|S0|adf5e7ca93811495|30|1 ConnectionCloseFrame[0|1|] 27.713 <- (5) Packet A|3|S0|adf5e7ca93811495|30|1 ConnectionCloseFrame[0|1|] 27.883 loss detection timeout handler running Sending probe 0, because no ack since 27.683. Current RTT: 100/25. 27.883 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.883 (Probe is an initial retransmit) 27.883 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.283/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.883 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.918 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 27.918 probe count not reset on ack because handshake not yet confirmed 27.918 Retransmitting CryptoFrame[0,257] on level Initial 27.918 Cwnd(-): 6000; inflight: 0 27.918 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.318/Initial, because peerAwaitingAddressValidation | RTT:100/25 27.918 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 28.122/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.918 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 27.918 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 27.920 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 28.124/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.920 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 27.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 28.126/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.922 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 28.025/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.923 Starting downloading https://server4:443/rbqnsfppob at 31:53.747 on ClientConnection[c4f5fbf672aa9bc5/e23c2bb55d3fcb17(V1) with server4/193.167.100.100:443] 27.923 Discarding pn space Initial because first Handshake message is being sent 27.923 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 27.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 28.025/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.923 -> Packet A|0|S0|318c9104e4d3754c|47|1 StreamFrame[0(CIB),0,17,fin] 27.957 <- (2) Packet A|2|S0|e23c2bb55d3fcb17|1054|1 StreamFrame[0(CIB),0,1024,fin] 27.958 Finished downloading https://server4:443/rbqnsfppob at 31:53.782 on ClientConnection[c4f5fbf672aa9bc5/e23c2bb55d3fcb17(V1) with server4/193.167.100.100:443] 27.958 Closing ClientConnection[c4f5fbf672aa9bc5/e23c2bb55d3fcb17(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.958 -> Packet A|1|S0|318c9104e4d3754c|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 27.958 Creating connection with server4:443 with v1 27.959 Setting up connection for downloading https://server4:443/yrxpyixgno at 31:53.783 on ClientConnection[1cda8689d9728e9a/bf05a5797d05624d(V1) with server4/193.167.100.100:443] 27.959 Original destination connection id: 1cda8689d9728e9a (scid: bf05a5797d05624d) >- CryptoStream[I|ClientHello] 27.960 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.160/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.960 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.995 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 27.995 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.195/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.995 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,732] Padding(247) 27.997 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 28.099/Handshake, because peerAwaitingAddressValidation | RTT:34/17 27.997 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.999 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 28.101/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 28.000 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.999 -> Packet H|0|L|80|1 CryptoFrame[0,36] 28.000 Starting downloading https://server4:443/yrxpyixgno at 31:53.824 on ClientConnection[1cda8689d9728e9a/bf05a5797d05624d(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 28.102/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 28.000 Discarding pn space Initial because first Handshake message is being sent 28.000 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 28.000 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 28.102/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 28.000 -> Packet A|0|S0|2623d3276d9f3e7a|47|1 StreamFrame[0(CIB),0,17,fin] 28.032 <- (2) Packet A|1|S0|bf05a5797d05624d|94|3 HandshakeDoneFrame[] NewTokenFrame[b71676d7ba78660287a26a8937a4dac332ff1bb1bcf96278b5c3fecf10a3646b6cc5711160] NewConnectionIdFrame[1,<0|b563f5aebed1a9a7|810c8250a446e6ffb735095ab62116e0] 28.033 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 28.101/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 94 millis, based on 28.127/App, because ackElicitingInFlight | RTT:34/17 28.033 Discarding pn space Handshake because HandshakeDone is received 28.052 -> Packet A|1|S0|2623d3276d9f3e7a|32|1 AckFrame[1|Δ19] 28.089 <- (3) Packet A|3|S0|e23c2bb55d3fcb17|544|1 CryptoFrame[0,514] 28.089 <- (4) Packet A|4|S0|e23c2bb55d3fcb17|94|3 HandshakeDoneFrame[] NewTokenFrame[b780f02dab7042c65ecb416e36c3d51d65b97671fdf77161c59eba54832b7fc0d6619c0dd1] NewConnectionIdFrame[1,<0|fe2133fd9bb6daa2|b92caae2fcf3d08397895bd1388f0af6] 28.089 -> Packet A|2|S0|318c9104e4d3754c|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 28.089 -> Packet A|3|S0|318c9104e4d3754c|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 28.121 <- (5) Packet A|5|S0|e23c2bb55d3fcb17|30|1 ConnectionCloseFrame[0|1|] 28.121 <- (6) Packet A|5|S0|e23c2bb55d3fcb17|30|1 ConnectionCloseFrame[0|1|] 28.127 loss detection timeout handler running Sending probe 0, because no ack since 28.000. Current RTT: 34/17. 28.127 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 28.381/App, because ackElicitingInFlight | RTT:34/17 28.127 -> Packet PA|2|S0|2623d3276d9f3e7a|47|1 StreamFrame[0(CIB),0,17,fin] 28.160 <- (3) Packet A|3|S0|bf05a5797d05624d|1060|2 AckFrame[2-1|Δ2] StreamFrame[0(CIB),0,1024,fin] 28.160 Cwnd(-): 6000; inflight: 0 28.160 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 28.160 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 28.272/App, because ackElicitingInFlight | RTT:34/13 28.161 -> Packet A|3|S0|2623d3276d9f3e7a|47|1 StreamFrame[0(CIB),0,17,fin] 28.161 Finished downloading https://server4:443/yrxpyixgno at 31:53.985 on ClientConnection[1cda8689d9728e9a/bf05a5797d05624d(V1) with server4/193.167.100.100:443] 28.161 Closing ClientConnection[1cda8689d9728e9a/bf05a5797d05624d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.161 -> Packet A|4|S0|2623d3276d9f3e7a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 28.161 Creating connection with server4:443 with v1 28.162 Setting up connection for downloading https://server4:443/wkqgunzevp at 31:53.986 on ClientConnection[3a300adbd7994e21/ca594592fb894b57(V1) with server4/193.167.100.100:443] 28.162 Original destination connection id: 3a300adbd7994e21 (scid: ca594592fb894b57) >- CryptoStream[I|ClientHello] 28.164 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.364/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.164 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.213 <- (4) Packet A|4|S0|bf05a5797d05624d|32|1 AckFrame[3-1|Δ22] 28.213 -> Packet A|5|S0|2623d3276d9f3e7a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 28.216 <- (5) Packet A|5|S0|bf05a5797d05624d|544|1 CryptoFrame[0,514] 28.216 -> Packet A|6|S0|2623d3276d9f3e7a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 28.363 loss detection timeout handler running Sending probe 0, because no ack since 28.164. Current RTT: 100/25. 28.363 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.363 (Probe is an initial retransmit) 28.363 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.763/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.363 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.763 loss detection timeout handler running Sending probe 1, because no ack since 28.363. Current RTT: 100/25. 28.763 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.763 (Probe is an initial retransmit) 28.763 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 29.563/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.763 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.764 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 29.564/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.764 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.797 <- (1) Packet I|1|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 28.797 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[2-1|Δ0] 28.800 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.800 probe count not reset on ack because handshake not yet confirmed reschedule loss detection timer for PTO over 799 millis, based on 29.600/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.800 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 28.800 Retransmitting CryptoFrame[0,257] on level Initial 28.800 Cwnd(-): 6000; inflight: 2401 28.800 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 29.600/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.800 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 29.188/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.800 -> Packet I|5|L|1200|3 Token=[] CryptoFrame[0,257] AckFrame[1|Δ0] Padding(891) 28.797 <- (1) Packet H|1|L|983|2 CryptoFrame[0,732] Padding(205) >- CryptoStream[H|Finished] 28.803 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 29.191/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.803 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.804 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.901/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.804 Starting downloading https://server4:443/wkqgunzevp at 31:54.628 on ClientConnection[3a300adbd7994e21/ca594592fb894b57(V1) with server4/193.167.100.100:443] 28.804 Discarding pn space Initial because first Handshake message is being sent 28.804 Discarding packet (47 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 28.804 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 28.805 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.902/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.804 -> Packet A|0|S0|8eaac3329af7dc00|47|1 StreamFrame[0(CIB),0,17,fin] 28.833 Discarding packet (49 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 28.836 <- (4) Packet H|2|L|46|1 AckFrame[1-0|Δ0] 28.837 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 28.837 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 28.836 <- (4) Packet A|0|S0|ca594592fb894b57|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 28.837 <- (5) Packet A|1|S0|ca594592fb894b57|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b7010b215b999fee24c370852ec12c041a85580aeb278dd89adbff1a5ca244546a3047a4e1] NewConnectionIdFrame[1,<0|26c726280843e2a1|3cecdfecb384b9d8b74b361e24d377e0] 28.838 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.838 State is set to Confirmed 28.838 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.838 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.838 Discarding pn space Handshake because HandshakeDone is received 28.838 -> Packet A|1|S0|8eaac3329af7dc00|31|1 AckFrame[1-0|Δ0] 28.839 <- (6) Packet A|2|S0|ca594592fb894b57|1054|1 StreamFrame[0(CIB),0,1024,fin] 28.839 Finished downloading https://server4:443/wkqgunzevp at 31:54.664 on ClientConnection[3a300adbd7994e21/ca594592fb894b57(V1) with server4/193.167.100.100:443] 28.839 Closing ClientConnection[3a300adbd7994e21/ca594592fb894b57(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.840 -> Packet A|2|S0|8eaac3329af7dc00|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 28.840 Creating connection with server4:443 with v1 28.841 Setting up connection for downloading https://server4:443/dlomxqfghi at 31:54.665 on ClientConnection[90a29e459251e3c7/d9d8c6c13df73ec7(V1) with server4/193.167.100.100:443] 28.841 Original destination connection id: 90a29e459251e3c7 (scid: d9d8c6c13df73ec7) >- CryptoStream[I|ClientHello] 28.842 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.042/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.842 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.871 <- (7) Packet A|3|S0|ca594592fb894b57|30|1 ConnectionCloseFrame[0|1|] 28.872 <- (8) Packet A|3|S0|ca594592fb894b57|30|1 ConnectionCloseFrame[0|1|] 29.041 loss detection timeout handler running Sending probe 0, because no ack since 28.842. Current RTT: 100/25. 29.041 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.041 (Probe is an initial retransmit) 29.042 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.442/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.042 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.441 loss detection timeout handler running Sending probe 1, because no ack since 29.042. Current RTT: 100/25. 29.441 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.441 (Probe is an initial retransmit) 29.441 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 30.241/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.441 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.442 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 30.242/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.442 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.477 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 29.477 probe count not reset on ack because handshake not yet confirmed 29.477 Retransmitting CryptoFrame[0,257] on level Initial 29.477 Cwnd(-): 6000; inflight: 0 29.477 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 30.277/Initial, because peerAwaitingAddressValidation | RTT:100/25 29.477 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 29.885/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.477 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 29.477 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,730] Padding(249) 29.480 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 29.889/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.480 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 29.483 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 29.891/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.483 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.483 Starting downloading https://server4:443/dlomxqfghi at 31:55.308 on ClientConnection[90a29e459251e3c7/d9d8c6c13df73ec7(V1) with server4/193.167.100.100:443] 29.484 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.586/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.484 Discarding pn space Initial because first Handshake message is being sent 29.483 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 29.484 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.586/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.484 -> Packet A|0|S0|a74bdbbd772c3dcd|47|1 StreamFrame[0(CIB),0,17,fin] 29.510 Discarding packet (47 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 29.516 <- (3) Packet H|1|L|46|1 AckFrame[1-0|Δ0] 29.516 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 29.516 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 29.516 <- (3) Packet A|0|S0|d9d8c6c13df73ec7|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 29.518 <- (4) Packet A|2|S0|d9d8c6c13df73ec7|1054|1 StreamFrame[0(CIB),0,1024,fin] 29.519 Finished downloading https://server4:443/dlomxqfghi at 31:55.343 on ClientConnection[90a29e459251e3c7/d9d8c6c13df73ec7(V1) with server4/193.167.100.100:443] 29.518 -> Packet A|1|S0|a74bdbbd772c3dcd|34|1 AckFrame[2,0|Δ1] 29.519 Closing ClientConnection[90a29e459251e3c7/d9d8c6c13df73ec7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.519 -> Packet A|2|S0|a74bdbbd772c3dcd|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 29.519 Creating connection with server4:443 with v1 29.520 Setting up connection for downloading https://server4:443/zghxotxaft at 31:55.344 on ClientConnection[9db5c01942a36b64/086466c6cdb0c68c(V1) with server4/193.167.100.100:443] 29.520 Original destination connection id: 9db5c01942a36b64 (scid: 086466c6cdb0c68c) >- CryptoStream[I|ClientHello] 29.521 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.721/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.521 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.550 <- (5) Packet A|3|S0|d9d8c6c13df73ec7|30|1 ConnectionCloseFrame[0|1|] 29.555 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 29.556 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.756/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 29.555 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 29.558 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.660/Handshake, because peerAwaitingAddressValidation | RTT:34/17 29.558 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 29.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.662/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.560 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.662/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.560 Starting downloading https://server4:443/zghxotxaft at 31:55.384 on ClientConnection[9db5c01942a36b64/086466c6cdb0c68c(V1) with server4/193.167.100.100:443] 29.560 Discarding pn space Initial because first Handshake message is being sent 29.560 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 29.561 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.663/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.561 -> Packet A|0|S0|7d558d80d0976e38|47|1 StreamFrame[0(CIB),0,17,fin] 29.593 <- (2) Packet H|1|L|46|1 AckFrame[0|Δ0] 29.593 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 29.593 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 29.593 <- (2) Packet A|0|S0|086466c6cdb0c68c|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 29.593 <- (3) Packet A|1|S0|086466c6cdb0c68c|100|4 AckFrame[0|Δ2] HandshakeDoneFrame[] NewTokenFrame[b77f5ce067d993f8ba3eb5c160bbd8e3c66746001e17ef0b2ed25d1d19dcfe88b34b6f684a] NewConnectionIdFrame[1,<0|034f73d92a128143|8ccf0a30b3ea383f09efc435848aebf8] 29.594 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.594 State is set to Confirmed 29.594 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.594 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.594 Discarding pn space Handshake because HandshakeDone is received 29.594 -> Packet A|1|S0|7d558d80d0976e38|31|1 AckFrame[1-0|Δ0] 29.595 <- (4) Packet A|2|S0|086466c6cdb0c68c|1054|1 StreamFrame[0(CIB),0,1024,fin] 29.596 Finished downloading https://server4:443/zghxotxaft at 31:55.420 on ClientConnection[9db5c01942a36b64/086466c6cdb0c68c(V1) with server4/193.167.100.100:443] 29.596 Closing ClientConnection[9db5c01942a36b64/086466c6cdb0c68c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.596 -> Packet A|2|S0|7d558d80d0976e38|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 29.596 Creating connection with server4:443 with v1 29.597 Setting up connection for downloading https://server4:443/exanepnpsc at 31:55.421 on ClientConnection[59a22474c548e182/0f383a6266800119(V1) with server4/193.167.100.100:443] 29.597 Original destination connection id: 59a22474c548e182 (scid: 0f383a6266800119) >- CryptoStream[I|ClientHello] 29.600 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.800/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.600 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.799 loss detection timeout handler running Sending probe 0, because no ack since 29.600. Current RTT: 100/25. 29.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.799 (Probe is an initial retransmit) 29.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 30.199/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.799 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.199 loss detection timeout handler running Sending probe 1, because no ack since 29.799. Current RTT: 100/25. 30.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.199 (Probe is an initial retransmit) 30.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 30.999/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.199 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.200 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 31.000/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.200 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.999 loss detection timeout handler running Sending probe 2, because no ack since 30.200. Current RTT: 100/25. 30.999 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.999 (Probe is an initial retransmit) 31.000 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 32.600/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.000 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.001 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 32.601/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.001 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.033 <- (1) Packet I|2|L|47|1 Token=[] AckFrame[5-2|Δ0] 31.033 probe count not reset on ack because handshake not yet confirmed 31.033 Retransmitting CryptoFrame[0,257] on level Initial 31.033 Cwnd(-): 6000; inflight: 0 31.033 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 32.633/Initial, because peerAwaitingAddressValidation | RTT:100/25 31.033 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 727 millis, based on 31.761/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 31.033 -> Packet I|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.065 <- (2) Packet I|3|L|47|1 Token=[] AckFrame[6-2|Δ0] 31.066 probe count not reset on ack because handshake not yet confirmed 31.066 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 727 millis, based on 31.794/Initial, because peerAwaitingAddressValidation | RTT:31/15 31.232 <- (3) Packet I|4|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 31.232 <- (3) Packet H|1|L|1030|2 CryptoFrame[0,730] Padding(254) 31.235 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 631 millis, based on 31.867/Handshake, because peerAwaitingAddressValidation | RTT:31/12 31.235 -> Packet I|7|L|1201|2 Token=[] AckFrame[4-2|Δ0] Padding(1153) >- CryptoStream[H|Finished] 31.237 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 631 millis, based on 31.869/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/12 31.237 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.237 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.237 Starting downloading https://server4:443/exanepnpsc at 31:57.061 on ClientConnection[59a22474c548e182/0f383a6266800119(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 78 millis, based on 31.316/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/12 31.237 Discarding pn space Initial because first Handshake message is being sent 31.237 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 31.237 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 78 millis, based on 31.316/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/12 31.237 -> Packet A|0|S0|d7a91e4b6c0cd548|47|1 StreamFrame[0(CIB),0,17,fin] 31.270 <- (4) Packet H|3|L|46|1 AckFrame[1-0|Δ0] 31.270 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 31.270 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 31.270 <- (4) Packet A|0|S0|0f383a6266800119|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 31.271 <- (5) Packet A|1|S0|0f383a6266800119|100|4 AckFrame[0|Δ2] HandshakeDoneFrame[] NewTokenFrame[b7fec9ffcaed9e8c1cdd005f38ecf420f85330c6359d3afcf94673c0ccb56f6159ae27def9] NewConnectionIdFrame[1,<0|cf81f6df8f85a9c4|f60b408c657c6c86b0f4561ee4e8f2ce] 31.271 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.271 State is set to Confirmed 31.271 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.271 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.271 Discarding pn space Handshake because HandshakeDone is received 31.271 -> Packet A|1|S0|d7a91e4b6c0cd548|31|1 AckFrame[1-0|Δ0] 31.272 <- (6) Packet A|2|S0|0f383a6266800119|1054|1 StreamFrame[0(CIB),0,1024,fin] 31.273 Finished downloading https://server4:443/exanepnpsc at 31:57.097 on ClientConnection[59a22474c548e182/0f383a6266800119(V1) with server4/193.167.100.100:443] 31.273 Closing ClientConnection[59a22474c548e182/0f383a6266800119(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.273 -> Packet A|2|S0|d7a91e4b6c0cd548|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 31.273 Creating connection with server4:443 with v1 31.274 Setting up connection for downloading https://server4:443/bljehaufty at 31:57.098 on ClientConnection[8c8c99fe5a880574/559284ebf40fdddf(V1) with server4/193.167.100.100:443] 31.274 Original destination connection id: 8c8c99fe5a880574 (scid: 559284ebf40fdddf) >- CryptoStream[I|ClientHello] 31.275 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.475/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.275 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.305 <- (7) Packet A|3|S0|0f383a6266800119|30|1 ConnectionCloseFrame[0|1|] 31.305 <- (8) Packet A|3|S0|0f383a6266800119|30|1 ConnectionCloseFrame[0|1|] 31.309 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 31.310 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.510/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 31.309 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,732] Padding(246) 31.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.414/Handshake, because peerAwaitingAddressValidation | RTT:34/17 31.312 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 31.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.314 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.314 Starting downloading https://server4:443/bljehaufty at 31:57.139 on ClientConnection[8c8c99fe5a880574/559284ebf40fdddf(V1) with server4/193.167.100.100:443] 31.314 Discarding pn space Initial because first Handshake message is being sent 31.315 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 31.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.417/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.315 -> Packet A|0|S0|129c7dee2fe30910|47|1 StreamFrame[0(CIB),0,17,fin] 31.349 <- (2) Packet A|2|S0|559284ebf40fdddf|1054|1 StreamFrame[0(CIB),0,1024,fin] 31.350 Finished downloading https://server4:443/bljehaufty at 31:57.174 on ClientConnection[8c8c99fe5a880574/559284ebf40fdddf(V1) with server4/193.167.100.100:443] 31.350 Closing ClientConnection[8c8c99fe5a880574/559284ebf40fdddf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.350 -> Packet A|1|S0|129c7dee2fe30910|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 31.350 Creating connection with server4:443 with v1 31.351 Setting up connection for downloading https://server4:443/twxblgfqda at 31:57.175 on ClientConnection[dc334d63237e7814/8c48d807339f8c8d(V1) with server4/193.167.100.100:443] 31.351 Original destination connection id: dc334d63237e7814 (scid: 8c48d807339f8c8d) >- CryptoStream[I|ClientHello] 31.352 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.552/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.352 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.382 <- (3) Packet A|3|S0|559284ebf40fdddf|30|1 ConnectionCloseFrame[0|1|] 31.382 <- (4) Packet A|3|S0|559284ebf40fdddf|30|1 ConnectionCloseFrame[0|1|] 31.386 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ1] CryptoFrame[0,123] 31.387 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.587/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 31.386 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,731] Padding(247) 31.389 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.491/Handshake, because peerAwaitingAddressValidation | RTT:34/17 31.389 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 31.391 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.493/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.391 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.392 Starting downloading https://server4:443/twxblgfqda at 31:57.216 on ClientConnection[dc334d63237e7814/8c48d807339f8c8d(V1) with server4/193.167.100.100:443] 31.392 Discarding pn space Initial because first Handshake message is being sent 31.392 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 31.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.392 -> Packet A|0|S0|45ee6dc7916f5cf6|47|1 StreamFrame[0(CIB),0,17,fin] 31.493 loss detection timeout handler running Sending probe 0, because no ack since 31.391. Current RTT: 34/17. 31.493 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.493 (Probe is a handshake retransmit) 31.494 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 31.698/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.493 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 31.697 loss detection timeout handler running Sending probe 1, because no ack since 31.392. Current RTT: 34/17. 31.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.697 (Probe is a handshake retransmit) 31.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 32.105/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.697 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 31.698 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 32.106/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.698 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 31.730 <- (2) Packet H|1|L|48|1 AckFrame[3,1|Δ0] 31.730 probe count not reset on ack because handshake not yet confirmed 31.730 Retransmitting CryptoFrame[0,36] on level Handshake 31.730 Cwnd(-): 6000; inflight: 127 31.730 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 375 millis, based on 32.106/Handshake, because ackElicitingInFlight | RTT:34/17 31.730 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 343 millis, based on 32.074/Handshake, because ackElicitingInFlight | RTT:34/13 31.730 -> Packet H|5|L|80|1 CryptoFrame[0,36] 31.730 <- (2) Packet A|0|S0|8c48d807339f8c8d|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 31.730 <- (3) Packet A|1|S0|8c48d807339f8c8d|102|4 AckFrame[0|Δ305] HandshakeDoneFrame[] NewTokenFrame[b7d16f2abdeefa023fb0fa0153298b0a19dca40d09ba32cc8a617d7817e7bf48d241d65447] NewConnectionIdFrame[1,<0|da76c17c0ccb2bfd|8670a76130642ff3b6c0cbb076ce2f13] reschedule loss detection timer for PTO over 85 millis, based on 31.816/Handshake, because ackElicitingInFlight | RTT:34/13 31.731 State is set to Confirmed reschedule loss detection timer for PTO over 388 millis, based on 32.119/Handshake, because ackElicitingInFlight | RTT:69/80 31.731 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.731 Discarding pn space Handshake because HandshakeDone is received 31.731 -> Packet A|1|S0|45ee6dc7916f5cf6|31|1 AckFrame[1-0|Δ0] 31.732 <- (4) Packet A|2|S0|8c48d807339f8c8d|1054|1 StreamFrame[0(CIB),0,1024,fin] 31.732 Finished downloading https://server4:443/twxblgfqda at 31:57.557 on ClientConnection[dc334d63237e7814/8c48d807339f8c8d(V1) with server4/193.167.100.100:443] 31.732 Closing ClientConnection[dc334d63237e7814/8c48d807339f8c8d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.733 -> Packet A|2|S0|45ee6dc7916f5cf6|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 31.733 Creating connection with server4:443 with v1 31.733 Setting up connection for downloading https://server4:443/roweipmmcn at 31:57.558 on ClientConnection[7f0d7d4adb72cee3/0825b5243a7d603d(V1) with server4/193.167.100.100:443] 31.734 Original destination connection id: 7f0d7d4adb72cee3 (scid: 0825b5243a7d603d) >- CryptoStream[I|ClientHello] 31.735 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.935/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.734 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.934 loss detection timeout handler running Sending probe 0, because no ack since 31.734. Current RTT: 100/25. 31.934 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 31.934 (Probe is an initial retransmit) 31.934 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.334/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.934 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.969 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ1] CryptoFrame[0,123] 31.969 probe count not reset on ack because handshake not yet confirmed 31.970 Retransmitting CryptoFrame[0,257] on level Initial 31.970 Cwnd(-): 6000; inflight: 0 31.970 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.370/Initial, because peerAwaitingAddressValidation | RTT:100/25 31.970 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 32.174/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.970 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 31.969 <- (1) Packet H|0|L|1024|2 CryptoFrame[0,730] Padding(248) 31.972 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 32.176/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.972 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 31.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 32.178/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.974 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.974 Starting downloading https://server4:443/roweipmmcn at 31:57.798 on ClientConnection[7f0d7d4adb72cee3/0825b5243a7d603d(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 32.076/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.974 Discarding pn space Initial because first Handshake message is being sent 31.974 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 31.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 32.076/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.974 -> Packet A|0|S0|8195dfbc676a8417|47|1 StreamFrame[0(CIB),0,17,fin] 32.003 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 32.008 <- (3) Packet A|2|S0|0825b5243a7d603d|1054|1 StreamFrame[0(CIB),0,1024,fin] 32.009 Finished downloading https://server4:443/roweipmmcn at 31:57.833 on ClientConnection[7f0d7d4adb72cee3/0825b5243a7d603d(V1) with server4/193.167.100.100:443] 32.009 Closing ClientConnection[7f0d7d4adb72cee3/0825b5243a7d603d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.009 -> Packet A|1|S0|8195dfbc676a8417|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 32.009 Creating connection with server4:443 with v1 32.010 Setting up connection for downloading https://server4:443/eygvvguvaz at 31:57.834 on ClientConnection[c1d854d6be64e040/268b0741ae3139a2(V1) with server4/193.167.100.100:443] 32.010 Original destination connection id: c1d854d6be64e040 (scid: 268b0741ae3139a2) >- CryptoStream[I|ClientHello] 32.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.211/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.011 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.142 <- (4) Packet A|3|S0|0825b5243a7d603d|544|1 CryptoFrame[0,514] 32.142 <- (5) Packet A|4|S0|0825b5243a7d603d|94|3 HandshakeDoneFrame[] NewTokenFrame[b7d1de855e5e7fa0d5ce7fde8feefe1608cc487b8a33c198e382f6cebf8ce2d4834c4e7a80] NewConnectionIdFrame[1,<0|da87c823e4a98c17|aa2de1719112a64b8acfc6271377ae02] 32.142 -> Packet A|2|S0|8195dfbc676a8417|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 32.142 -> Packet A|3|S0|8195dfbc676a8417|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 32.173 <- (6) Packet A|5|S0|0825b5243a7d603d|30|1 ConnectionCloseFrame[0|1|] 32.174 <- (7) Packet A|5|S0|0825b5243a7d603d|30|1 ConnectionCloseFrame[0|1|] 32.210 loss detection timeout handler running Sending probe 0, because no ack since 32.011. Current RTT: 100/25. 32.210 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.210 (Probe is an initial retransmit) 32.210 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.611/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.210 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.610 loss detection timeout handler running Sending probe 1, because no ack since 32.210. Current RTT: 100/25. 32.610 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.610 (Probe is an initial retransmit) 32.610 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 33.410/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.610 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.611 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 33.411/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.611 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.043 <- (1) Packet I|5|L|170|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 33.043 <- (1) Packet H|2|L|1030|2 CryptoFrame[0,732] Padding(252) 33.046 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 33.846/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.046 -> Packet I|4|L|1201|2 Token=[] AckFrame[5|Δ0] Padding(1153) >- CryptoStream[H|Finished] 33.048 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 33.848/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.048 -> Packet H|0|L|80|1 CryptoFrame[0,36] 33.049 Starting downloading https://server4:443/eygvvguvaz at 31:58.873 on ClientConnection[c1d854d6be64e040/268b0741ae3139a2(V1) with server4/193.167.100.100:443] 33.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.249/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.049 Discarding pn space Initial because first Handshake message is being sent 33.049 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 33.049 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 33.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.249/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.049 -> Packet A|0|S0|bf2049b9d87e2f53|47|1 StreamFrame[0(CIB),0,17,fin] 33.082 <- (3) Packet H|4|L|46|1 AckFrame[1-0|Δ0] 33.082 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 33.082 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 33.082 <- (3) Packet A|0|S0|268b0741ae3139a2|544|1 CryptoFrame[0,514] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 33.082 <- (4) Packet A|1|S0|268b0741ae3139a2|99|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewTokenFrame[b702543e4ba340eee36f3e37195e28ac7d20417ceb33663b8e84fde2de4da794e9e17e240d] NewConnectionIdFrame[1,<0|ec335b9e6180684d|ba91aa8e79e8c6314a54583d9dd4b397] 33.083 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.083 State is set to Confirmed 33.083 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.083 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.083 Discarding pn space Handshake because HandshakeDone is received 33.083 -> Packet A|1|S0|bf2049b9d87e2f53|31|1 AckFrame[1-0|Δ0] 33.221 <- (5) Packet A|3|S0|268b0741ae3139a2|1054|1 StreamFrame[0(CIB),0,1024,fin] 33.222 Finished downloading https://server4:443/eygvvguvaz at 31:59.046 on ClientConnection[c1d854d6be64e040/268b0741ae3139a2(V1) with server4/193.167.100.100:443] 33.222 Closing ClientConnection[c1d854d6be64e040/268b0741ae3139a2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.222 <- (6) Packet A|4|S0|268b0741ae3139a2|1054|1 StreamFrame[0(CIB),0,1024,fin] 33.222 Receiving frame for non-existent stream 0 33.222 -> Packet A|2|S0|bf2049b9d87e2f53|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1-0|Δ0]