4a70e2ad6c65c442: No root crt list specified -- certificate will not be verified. 4a70e2ad6c65c442: Sending ALPN list (1): hq-interop 4a70e2ad6c65c442: Sending transport parameter TLS extension (85 bytes): 4a70e2ad6c65c442: Extension list (85 bytes): 4a70e2ad6c65c442: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 4a70e2ad6c65c442: Extension type: 4 (initial_max_data), length 4, 80100000 4a70e2ad6c65c442: Extension type: 8 (max_streams_bidi), length 2, 4200 4a70e2ad6c65c442: Extension type: 1 (idle_timeout), length 4, 8002bf20 4a70e2ad6c65c442: Extension type: 3 (max_packet_size), length 2, 45a0 4a70e2ad6c65c442: Extension type: 9 (max_streams_uni), length 2, 4200 4a70e2ad6c65c442: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 4a70e2ad6c65c442: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 4a70e2ad6c65c442: Extension type: 14 (active_connection_id_limit), length 1, 08 4a70e2ad6c65c442: Extension type: 11 (max_ack_delay), length 1, 0a 4a70e2ad6c65c442: Extension type: 15 (hcid), length 8, 15e08cf4149e5785 4a70e2ad6c65c442: Extension type: 2352 (unknown), length 4, 800070e2 4a70e2ad6c65c442: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 4a70e2ad6c65c442: Extension type: 29016 (enable_time_stamp), length 1, 03 4a70e2ad6c65c442: Extension type: 10930 (grease_quic_bit), length 0 4a70e2ad6c65c442: Preparing GET on stream 0 for /paqrrkpges 4a70e2ad6c65c442: Sending packet type: 2 (initial), S0, Q1, Version 1, 4a70e2ad6c65c442: <4a70e2ad6c65c442>, <15e08cf4149e5785>, Seq: 110591, pl: 617 4a70e2ad6c65c442: Token length: 37, Token: b7d5820c8172f66b909b064db70517ac... 4a70e2ad6c65c442: Prepared 597 bytes 4a70e2ad6c65c442: ping, 1 bytes 4a70e2ad6c65c442: crypto_hs, offset 0, length 592: 0100024c030396d6... 4a70e2ad6c65c442: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 4a70e2ad6c65c442: <4a70e2ad6c65c442>, <15e08cf4149e5785>, Seq: 0, pl: 547 4a70e2ad6c65c442: Prepared 527 bytes 4a70e2ad6c65c442: stream 0, offset 0, length 17, fin = 1: 474554202f706171... 4a70e2ad6c65c442: padding, 507 bytes 4a70e2ad6c65c442: Sending 1252 bytes to 193.167.100.100:443 at T=0.001877 (25bb829a) 4a70e2ad6c65c442: T= 0.252177, Lost packet type 2, number 110591, size 664, DCID <>, reason: timer 4a70e2ad6c65c442: Sending packet type: 2 (initial), S0, Q1, Version 1, 4a70e2ad6c65c442: <4a70e2ad6c65c442>, <15e08cf4149e5785>, Seq: 110592, pl: 617 4a70e2ad6c65c442: Token length: 37, Token: b7d5820c8172f66b909b064db70517ac... 4a70e2ad6c65c442: Prepared 597 bytes 4a70e2ad6c65c442: ping, 1 bytes 4a70e2ad6c65c442: crypto_hs, offset 0, length 592: 0100024c030396d6... 4a70e2ad6c65c442: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 4a70e2ad6c65c442: <4a70e2ad6c65c442>, <15e08cf4149e5785>, Seq: 1, pl: 547 4a70e2ad6c65c442: Prepared 527 bytes 4a70e2ad6c65c442: padding, 527 bytes 4a70e2ad6c65c442: Sending 1252 bytes to 193.167.100.100:443 at T=0.252177 (25bf5456) 4a70e2ad6c65c442: Receiving 1200 bytes from 193.167.100.100:443 at T=0.286413 (25bfda12) 4a70e2ad6c65c442: Receiving packet type: 2 (initial), S0, Q1, Version 1, 4a70e2ad6c65c442: <15e08cf4149e5785>, <03c22ace149eef8f>, Seq: 1, pl: 150 4a70e2ad6c65c442: Token length: 0 4a70e2ad6c65c442: Decrypted 133 bytes 4a70e2ad6c65c442: crypto_hs, offset 0, length 129: 0200007d0303365f... 4a70e2ad6c65c442: Receiving packet type: 2 (initial), S0, Q1, Version 1, 4a70e2ad6c65c442: <15e08cf4149e5785>, <03c22ace149eef8f>, Seq: 2, pl: 25 4a70e2ad6c65c442: Token length: 0 4a70e2ad6c65c442: Decrypted 8 bytes 4a70e2ad6c65c442: ack (nb=0), 110591-110592 4a70e2ad6c65c442: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 4a70e2ad6c65c442: <15e08cf4149e5785>, <03c22ace149eef8f>, Seq: 1, pl: 222 4a70e2ad6c65c442: Decrypted 205 bytes 4a70e2ad6c65c442: crypto_hs, offset 0, length 201: 08000091008f0000... 4a70e2ad6c65c442: Received transport parameter TLS extension (98 bytes): 4a70e2ad6c65c442: Extension list (98 bytes): 4a70e2ad6c65c442: Extension type: 0 (ocid), length 8, 4a70e2ad6c65c442 4a70e2ad6c65c442: Extension type: 2 (stateless_reset_token), length 16, 80ecb99c7777a0082769f83270372e49 4a70e2ad6c65c442: Extension type: 15 (hcid), length 8, 03c22ace149eef8f 4a70e2ad6c65c442: Extension type: 1 (idle_timeout), length 4, 80007530 4a70e2ad6c65c442: Extension type: 3 (max_packet_size), length 2, 4800 4a70e2ad6c65c442: Extension type: 4 (initial_max_data), length 4, 8018fe70 4a70e2ad6c65c442: Extension type: 5 (max_stream_data_bidi_local), length 2, 7ffc 4a70e2ad6c65c442: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80167e98 4a70e2ad6c65c442: Extension type: 7 (max_stream_data_uni), length 2, 7ffc 4a70e2ad6c65c442: Extension type: 8 (max_streams_bidi), length 2, 4064 4a70e2ad6c65c442: Extension type: 9 (max_streams_uni), length 1, 03 4a70e2ad6c65c442: Extension type: 12 (disable_migration), length 0 4a70e2ad6c65c442: Extension type: 14 (active_connection_id_limit), length 1, 08 4a70e2ad6c65c442: Extension type: 17 (version_negotiation), length 16, 00000001ff00001d000000016b3343cf 4a70e2ad6c65c442: Receiving packet type: 6 (1rtt protected), S0, Q1, 4a70e2ad6c65c442: <15e08cf4149e5785>, Seq: 0 (0), Phi: 0, 4a70e2ad6c65c442: Decrypted 701 bytes 4a70e2ad6c65c442: ack (nb=0), 0-1 4a70e2ad6c65c442: padding, 696 bytes 4a70e2ad6c65c442: T= 0.286413, cwin: 17800,flight: 0,nb_ret: 1,rtt_min: 34236,rtt: 34236,rtt_var: 12838,max_ack_delay: 0,state: 10 4a70e2ad6c65c442: The session was properly resumed! 4a70e2ad6c65c442: Zero RTT data is accepted! 4a70e2ad6c65c442: Negotiated ALPN: hq-interop 4a70e2ad6c65c442: Sending packet type: 4 (handshake), S0, Q1, Version 1, 4a70e2ad6c65c442: <03c22ace149eef8f>, <15e08cf4149e5785>, Seq: 0, pl: 80 4a70e2ad6c65c442: Prepared 60 bytes 4a70e2ad6c65c442: ack (nb=0), 1 4a70e2ad6c65c442: crypto_hs, offset 0, length 52: 1400003019bc9ade... 4a70e2ad6c65c442: Sending packet type: 6 (1rtt protected), S1, Q1, 4a70e2ad6c65c442: <03c22ace149eef8f>, Seq: 2 (2), Phi: 0, 4a70e2ad6c65c442: Prepared 285 bytes 4a70e2ad6c65c442: new_connection_id[1]: 0x1b6fe529ac5ed975, c9a681be59254d5e4e6f091319be8ba9 4a70e2ad6c65c442: new_connection_id[2]: 0xe80bfffa2575a633, 798de73df9549e5ef61aa8f426c32070 4a70e2ad6c65c442: new_connection_id[3]: 0x5539f393d6ff0d27, 83917c624c0776d783cce66c2d9b7569 4a70e2ad6c65c442: new_connection_id[4]: 0xf5b8017ba4e058f7, 606248eaa643f04566b09d688029d666 4a70e2ad6c65c442: new_connection_id[5]: 0x245384481203b98a, 63661f8e9387888b447e9d062523ea1b 4a70e2ad6c65c442: new_connection_id[6]: 0x2ee998909872ae3d, 6cc163e80064b69959fc046e48c2fceb 4a70e2ad6c65c442: new_connection_id[7]: 0x9f7d6263100611b2, 58bdffbcf208eb27a936fe47ea409e60 4a70e2ad6c65c442: padding, 89 bytes 4a70e2ad6c65c442: T= 0.286873, cwin: 17800,flight: 416,nb_ret: 1,rtt_min: 34236,rtt: 34236,rtt_var: 12838,max_ack_delay: 0,state: 13 4a70e2ad6c65c442: Sending 416 bytes to 193.167.100.100:443 at T=0.286873 (25bfdbde) 4a70e2ad6c65c442: Connection established. Version = 1, I-CID: 4a70e2ad6c65c442, verified: 1 4a70e2ad6c65c442: Receiving 1054 bytes from 193.167.100.100:443 at T=0.287501 (25bfde52) 4a70e2ad6c65c442: Receiving packet type: 6 (1rtt protected), S0, Q1, 4a70e2ad6c65c442: <15e08cf4149e5785>, Seq: 1 (1), Phi: 0, 4a70e2ad6c65c442: Decrypted 1028 bytes 4a70e2ad6c65c442: stream 0, offset 0, length 1024, fin = 1: 281896c11d497821... 4a70e2ad6c65c442: T= 0.287501, cwin: 17800,flight: 416,nb_ret: 1,rtt_min: 34236,rtt: 34236,rtt_var: 12838,max_ack_delay: 0,state: 13 4a70e2ad6c65c442: All done, Closing the connection. 4a70e2ad6c65c442: Sending packet type: 6 (1rtt protected), S1, Q1, 4a70e2ad6c65c442: <03c22ace149eef8f>, Seq: 3 (3), Phi: 0, 4a70e2ad6c65c442: Prepared 8 bytes 4a70e2ad6c65c442: ack (nb=0), 0-1 4a70e2ad6c65c442: application_close, Error 0x0000, Reason length 0 4a70e2ad6c65c442: Sending 34 bytes to 193.167.100.100:443 at T=0.287695 (25bfdf14) 4a70e2ad6c65c442: Receiving 50 bytes from 193.167.100.100:443 at T=0.320060 (25c05d81) 4a70e2ad6c65c442: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 4a70e2ad6c65c442: <15e08cf4149e5785>, <03c22ace149eef8f>, Seq: 2, pl: 26 4a70e2ad6c65c442: Decrypted 9 bytes 4a70e2ad6c65c442: ack (nb=0), 0 4a70e2ad6c65c442: connection_close, Error 0x0000, Offending frame 0x1, Reason length 0 4a70e2ad6c65c442: Receiving 50 bytes from 193.167.100.100:443 at T=0.320397 (25c05ed2) 4a70e2ad6c65c442: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 4a70e2ad6c65c442: <15e08cf4149e5785>, <03c22ace149eef8f>, Seq: 2, pl: 26 4a70e2ad6c65c442: Decrypted 9 bytes 4a70e2ad6c65c442: ack (nb=0), 0 4a70e2ad6c65c442: connection_close, Error 0x0000, Offending frame 0x1, Reason length 0 4a70e2ad6c65c442: Out of 2 zero RTT packets, 2 were acked by the server. 4a70e2ad6c65c442: Received 1024 bytes in 0.581292 seconds, 0.014093 Mbps. 4a70e2ad6c65c442: Sent 17 bytes in 0.581292 seconds, 0.000234 Mbps.