d404ed76131c4138: No root crt list specified -- certificate will not be verified. d404ed76131c4138: Sending ALPN list (1): hq-interop d404ed76131c4138: Sending transport parameter TLS extension (83 bytes): d404ed76131c4138: Extension list (83 bytes): d404ed76131c4138: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 d404ed76131c4138: Extension type: 4 (initial_max_data), length 4, 80100000 d404ed76131c4138: Extension type: 8 (max_streams_bidi), length 2, 4200 d404ed76131c4138: Extension type: 1 (idle_timeout), length 4, 8002bf20 d404ed76131c4138: Extension type: 3 (max_packet_size), length 2, 45a0 d404ed76131c4138: Extension type: 9 (max_streams_uni), length 2, 4200 d404ed76131c4138: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 d404ed76131c4138: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff d404ed76131c4138: Extension type: 14 (active_connection_id_limit), length 1, 08 d404ed76131c4138: Extension type: 11 (max_ack_delay), length 1, 0a d404ed76131c4138: Extension type: 15 (hcid), length 8, 54d9377e9a107aea d404ed76131c4138: Extension type: 6630 (unknown), length 2, 44ed d404ed76131c4138: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 d404ed76131c4138: Extension type: 29016 (enable_time_stamp), length 1, 03 d404ed76131c4138: Extension type: 10930 (grease_quic_bit), length 0 d404ed76131c4138: Preparing GET on stream 0 for /cruel-teal-quokka d404ed76131c4138: Sending packet type: 2 (initial), S0, Q1, Version 1, d404ed76131c4138: , <54d9377e9a107aea>, Seq: 69878, pl: 615 d404ed76131c4138: Token length: 37, Token: b7ddbbef80f599695a025360f50d63ab... d404ed76131c4138: Prepared 595 bytes d404ed76131c4138: ping, 1 bytes d404ed76131c4138: crypto_hs, offset 0, length 590: 0100024a03038aac... d404ed76131c4138: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, d404ed76131c4138: , <54d9377e9a107aea>, Seq: 0, pl: 549 d404ed76131c4138: Prepared 529 bytes d404ed76131c4138: stream 0, offset 0, length 24, fin = 1: 474554202f637275... d404ed76131c4138: padding, 502 bytes d404ed76131c4138: Sending 1252 bytes to 193.167.100.100:443 at T=0.001926 (1dbc0870) d404ed76131c4138: T= 0.252227, Lost packet type 2, number 69878, size 662, DCID <>, reason: timer d404ed76131c4138: Sending packet type: 2 (initial), S0, Q1, Version 1, d404ed76131c4138: , <54d9377e9a107aea>, Seq: 69879, pl: 615 d404ed76131c4138: Token length: 37, Token: b7ddbbef80f599695a025360f50d63ab... d404ed76131c4138: Prepared 595 bytes d404ed76131c4138: ping, 1 bytes d404ed76131c4138: crypto_hs, offset 0, length 590: 0100024a03038aac... d404ed76131c4138: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, d404ed76131c4138: , <54d9377e9a107aea>, Seq: 1, pl: 549 d404ed76131c4138: Prepared 529 bytes d404ed76131c4138: padding, 529 bytes d404ed76131c4138: Sending 1252 bytes to 193.167.100.100:443 at T=0.252227 (1dbfda2d) d404ed76131c4138: Receiving 1200 bytes from 193.167.100.100:443 at T=0.287258 (1dc06304) d404ed76131c4138: Receiving packet type: 2 (initial), S0, Q1, Version 1, d404ed76131c4138: <54d9377e9a107aea>, <205f3028217e1b20>, Seq: 0, pl: 159 d404ed76131c4138: Token length: 0 d404ed76131c4138: Decrypted 142 bytes d404ed76131c4138: ack (nb=0), 69879 d404ed76131c4138: crypto_hs, offset 0, length 129: 0200007d03038ad2... d404ed76131c4138: Receiving packet type: 4 (handshake), S0, Q1, Version 1, d404ed76131c4138: <54d9377e9a107aea>, <205f3028217e1b20>, Seq: 0, pl: 990 d404ed76131c4138: Decrypted 973 bytes d404ed76131c4138: crypto_hs, offset 0, length 199: 0800008f008d0000... d404ed76131c4138: padding, 770 bytes d404ed76131c4138: Received transport parameter TLS extension (98 bytes): d404ed76131c4138: Extension list (98 bytes): d404ed76131c4138: Extension type: 0 (ocid), length 8, d404ed76131c4138 d404ed76131c4138: Extension type: 2 (stateless_reset_token), length 16, f6a21f3e46c4364cf4ac3809428122d1 d404ed76131c4138: Extension type: 15 (hcid), length 8, 205f3028217e1b20 d404ed76131c4138: Extension type: 1 (idle_timeout), length 4, 80007530 d404ed76131c4138: Extension type: 3 (max_packet_size), length 2, 4800 d404ed76131c4138: Extension type: 4 (initial_max_data), length 4, 8018fe70 d404ed76131c4138: Extension type: 5 (max_stream_data_bidi_local), length 2, 7ffc d404ed76131c4138: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80167e98 d404ed76131c4138: Extension type: 7 (max_stream_data_uni), length 2, 7ffc d404ed76131c4138: Extension type: 8 (max_streams_bidi), length 2, 4064 d404ed76131c4138: Extension type: 9 (max_streams_uni), length 1, 03 d404ed76131c4138: Extension type: 12 (disable_migration), length 0 d404ed76131c4138: Extension type: 14 (active_connection_id_limit), length 1, 08 d404ed76131c4138: Extension type: 17 (version_negotiation), length 16, 00000001ff00001d000000016b3343cf d404ed76131c4138: The session was properly resumed! d404ed76131c4138: Zero RTT data is accepted! d404ed76131c4138: Negotiated ALPN: hq-interop d404ed76131c4138: Sending packet type: 4 (handshake), S0, Q1, Version 1, d404ed76131c4138: <205f3028217e1b20>, <54d9377e9a107aea>, Seq: 0, pl: 80 d404ed76131c4138: Prepared 60 bytes d404ed76131c4138: ack (nb=0), 0 d404ed76131c4138: crypto_hs, offset 0, length 52: 14000030ba086c28... d404ed76131c4138: T= 0.287586, Lost packet type 5, number 0, size 558, DCID <205f3028217e1b20>, reason: timer d404ed76131c4138: Sending packet type: 6 (1rtt protected), S0, Q1, d404ed76131c4138: <205f3028217e1b20>, Seq: 2 (2), Phi: 0, d404ed76131c4138: Prepared 285 bytes d404ed76131c4138: new_connection_id[1]: 0xbd9698dfa99f0eba, 185917cc118b93c39334c4c64bb689a7 d404ed76131c4138: new_connection_id[2]: 0xa2b5989a27da97bb, 0497a3c2a59f0dbadfa3e097b8e40840 d404ed76131c4138: new_connection_id[3]: 0x8c08c4a38d817359, 041c67b8d77c5c25dc9f83c1f22551c4 d404ed76131c4138: new_connection_id[4]: 0x076fd2be039ee5c4, e4ef9297c236c5eb62550873ffb52957 d404ed76131c4138: new_connection_id[5]: 0x0cfb72b08eaf81e2, b79eabfbf672776a2221d9765a68b894 d404ed76131c4138: new_connection_id[6]: 0xf5282d0b02bc968e, 34d173c11fd1cc724b051fa56494827b d404ed76131c4138: new_connection_id[7]: 0x388ba130dd2e858c, 2ed2f93fd2766817b659f857d0e58398 d404ed76131c4138: stream 0, offset 0, length 24, fin = 1: 474554202f637275... d404ed76131c4138: padding, 62 bytes d404ed76131c4138: T= 0.287586, cwin: 16022,flight: 990,nb_ret: 2,rtt_min: 35031,rtt: 35031,rtt_var: 17515,max_ack_delay: 0,state: 13 d404ed76131c4138: Sending 416 bytes to 193.167.100.100:443 at T=0.287586 (1dc0644c) d404ed76131c4138: Connection established. Version = 1, I-CID: d404ed76131c4138, verified: 1 d404ed76131c4138: Receiving 354 bytes from 193.167.100.100:443 at T=0.321059 (1dc0e70d) d404ed76131c4138: Receiving packet type: 4 (handshake), S0, Q1, Version 1, d404ed76131c4138: <54d9377e9a107aea>, <205f3028217e1b20>, Seq: 1, pl: 22 d404ed76131c4138: Decrypted 5 bytes d404ed76131c4138: ack (nb=0), 0 d404ed76131c4138: Receiving packet type: 6 (1rtt protected), S0, Q1, d404ed76131c4138: <54d9377e9a107aea>, Seq: 0 (0), Phi: 0, d404ed76131c4138: Decrypted 282 bytes d404ed76131c4138: ack (nb=0), 1-2 d404ed76131c4138: crypto_hs, offset 0, length 273: 0400010d00001c20... d404ed76131c4138: T= 0.321059, cwin: 16964,flight: 0,nb_ret: 2,rtt_min: 33473,rtt: 34665,rtt_var: 10484,max_ack_delay: 0,state: 14 d404ed76131c4138: Receiving 150 bytes from 193.167.100.100:443 at T=0.321701 (1dc0e98f) d404ed76131c4138: Receiving packet type: 6 (1rtt protected), S0, Q1, d404ed76131c4138: <54d9377e9a107aea>, Seq: 1 (1), Phi: 0, d404ed76131c4138: Decrypted 124 bytes d404ed76131c4138: handshake_done d404ed76131c4138: new_token[37]: 0xb77f0b8818bc31aff5c82d0dad94a453... d404ed76131c4138: new_connection_id[1]: 0x2075cd35cd6254f1, f6e86dc0530a23dea7b39913917f9988 d404ed76131c4138: new_connection_id[2]: 0x93cce262c601adda, 18873568e9345a9db0a55a1364fdc601 d404ed76131c4138: new_connection_id[3]: 0x4e67897297ecf63f, 7f56cccacb50b311ae6bf19ff60d40d6 d404ed76131c4138: T= 0.321701, cwin: 16964,flight: 0,nb_ret: 2,rtt_min: 33473,rtt: 34665,rtt_var: 10484,max_ack_delay: 0,state: 14 d404ed76131c4138: Receiving 1054 bytes from 193.167.100.100:443 at T=0.323407 (1dc0f039) d404ed76131c4138: Receiving packet type: 6 (1rtt protected), S0, Q1, d404ed76131c4138: <54d9377e9a107aea>, Seq: 2 (2), Phi: 0, d404ed76131c4138: Decrypted 1028 bytes d404ed76131c4138: stream 0, offset 0, length 1024, fin = 1: c720ee992dea8026... d404ed76131c4138: T= 0.323407, cwin: 16964,flight: 0,nb_ret: 2,rtt_min: 33473,rtt: 34665,rtt_var: 10484,max_ack_delay: 0,state: 14 d404ed76131c4138: All done, Closing the connection. d404ed76131c4138: Sending packet type: 6 (1rtt protected), S1, Q1, d404ed76131c4138: <205f3028217e1b20>, Seq: 3 (3), Phi: 0, d404ed76131c4138: Prepared 8 bytes d404ed76131c4138: ack (nb=0), 0-2 d404ed76131c4138: application_close, Error 0x0000, Reason length 0 d404ed76131c4138: Sending 34 bytes to 193.167.100.100:443 at T=0.323591 (1dc0f0f1) d404ed76131c4138: Receiving 303 bytes from 193.167.100.100:443 at T=0.427728 (1dc287ba) d404ed76131c4138: Receiving packet type: 6 (1rtt protected), S0, Q1, d404ed76131c4138: <54d9377e9a107aea>, Seq: 3 (3), Phi: 0, d404ed76131c4138: Decrypted 277 bytes d404ed76131c4138: crypto_hs, offset 0, length 273: 0400010d00001c20... d404ed76131c4138: Sending packet type: 6 (1rtt protected), S1, Q1, d404ed76131c4138: <205f3028217e1b20>, Seq: 4 (4), Phi: 0, d404ed76131c4138: Prepared 3 bytes d404ed76131c4138: application_close, Error 0x0000, Reason length 0 d404ed76131c4138: Sending 29 bytes to 193.167.100.100:443 at T=0.427824 (1dc2881a) d404ed76131c4138: Receiving 150 bytes from 193.167.100.100:443 at T=0.427883 (1dc28855) d404ed76131c4138: Receiving packet type: 6 (1rtt protected), S0, Q1, d404ed76131c4138: <54d9377e9a107aea>, Seq: 4 (4), Phi: 0, d404ed76131c4138: Decrypted 124 bytes d404ed76131c4138: handshake_done d404ed76131c4138: new_token[37]: 0xb77f0b8818bc31aff5c82d0dad94a453... d404ed76131c4138: new_connection_id[1]: 0x2075cd35cd6254f1, f6e86dc0530a23dea7b39913917f9988 d404ed76131c4138: new_connection_id[2]: 0x93cce262c601adda, 18873568e9345a9db0a55a1364fdc601 d404ed76131c4138: new_connection_id[3]: 0x4e67897297ecf63f, 7f56cccacb50b311ae6bf19ff60d40d6 d404ed76131c4138: Receiving 30 bytes from 193.167.100.100:443 at T=0.458919 (1dc30191) d404ed76131c4138: Receiving packet type: 6 (1rtt protected), S1, Q1, d404ed76131c4138: <54d9377e9a107aea>, Seq: 5 (5), Phi: 0, d404ed76131c4138: Decrypted 4 bytes d404ed76131c4138: connection_close, Error 0x0000, Reason length 0 d404ed76131c4138: Out of 2 zero RTT packets, 1 were acked by the server. d404ed76131c4138: Received 1024 bytes in 0.459012 seconds, 0.017847 Mbps. d404ed76131c4138: Sent 24 bytes in 0.459012 seconds, 0.000418 Mbps.