eecc1116c1971d47: No root crt list specified -- certificate will not be verified. eecc1116c1971d47: Sending ALPN list (1): hq-interop eecc1116c1971d47: Sending transport parameter TLS extension (85 bytes): eecc1116c1971d47: Extension list (85 bytes): eecc1116c1971d47: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 eecc1116c1971d47: Extension type: 4 (initial_max_data), length 4, 80100000 eecc1116c1971d47: Extension type: 8 (max_streams_bidi), length 2, 4200 eecc1116c1971d47: Extension type: 1 (idle_timeout), length 4, 8002bf20 eecc1116c1971d47: Extension type: 3 (max_packet_size), length 2, 45a0 eecc1116c1971d47: Extension type: 9 (max_streams_uni), length 2, 4200 eecc1116c1971d47: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 eecc1116c1971d47: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff eecc1116c1971d47: Extension type: 14 (active_connection_id_limit), length 1, 08 eecc1116c1971d47: Extension type: 11 (max_ack_delay), length 1, 0a eecc1116c1971d47: Extension type: 15 (hcid), length 8, b0588fbed7379054 eecc1116c1971d47: Extension type: 7436 (unknown), length 4, 8000cc11 eecc1116c1971d47: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 eecc1116c1971d47: Extension type: 29016 (enable_time_stamp), length 1, 03 eecc1116c1971d47: Extension type: 10930 (grease_quic_bit), length 0 eecc1116c1971d47: Preparing GET on stream 0 for /surprised-intense-belt eecc1116c1971d47: Sending packet type: 2 (initial), S0, Q1, Version 1, eecc1116c1971d47: , , Seq: 107322, pl: 617 eecc1116c1971d47: Token length: 0 eecc1116c1971d47: Prepared 597 bytes eecc1116c1971d47: ping, 1 bytes eecc1116c1971d47: crypto_hs, offset 0, length 592: 0100024c03032043... eecc1116c1971d47: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, eecc1116c1971d47: , , Seq: 0, pl: 584 eecc1116c1971d47: Prepared 564 bytes eecc1116c1971d47: stream 0, offset 0, length 29, fin = 1: 474554202f737572... eecc1116c1971d47: padding, 532 bytes eecc1116c1971d47: Sending 1252 bytes to 193.167.100.100:443 at T=0.001888 (1a1f9b47) eecc1116c1971d47: T= 0.252186, Lost packet type 2, number 107322, size 627, DCID <>, reason: timer eecc1116c1971d47: Sending packet type: 2 (initial), S0, Q1, Version 1, eecc1116c1971d47: , , Seq: 107323, pl: 617 eecc1116c1971d47: Token length: 0 eecc1116c1971d47: Prepared 597 bytes eecc1116c1971d47: ping, 1 bytes eecc1116c1971d47: crypto_hs, offset 0, length 592: 0100024c03032043... eecc1116c1971d47: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, eecc1116c1971d47: , , Seq: 1, pl: 584 eecc1116c1971d47: Prepared 564 bytes eecc1116c1971d47: padding, 564 bytes eecc1116c1971d47: Sending 1252 bytes to 193.167.100.100:443 at T=0.252186 (1a236d01) eecc1116c1971d47: Receiving 1200 bytes from 193.167.100.100:443 at T=0.285991 (1a23f10e) eecc1116c1971d47: Receiving packet type: 2 (initial), S0, Q1, Version 1, eecc1116c1971d47: , <3eb3821f718154ea>, Seq: 1, pl: 1174 eecc1116c1971d47: Token length: 0 eecc1116c1971d47: Decrypted 1157 bytes eecc1116c1971d47: crypto_hs, offset 0, length 129: 0200007d03033741... eecc1116c1971d47: padding, 1024 bytes eecc1116c1971d47: Receiving 295 bytes from 193.167.100.100:443 at T=0.286281 (1a23f230) eecc1116c1971d47: Receiving packet type: 2 (initial), S0, Q1, Version 1, eecc1116c1971d47: , <3eb3821f718154ea>, Seq: 2, pl: 25 eecc1116c1971d47: Token length: 0 eecc1116c1971d47: Decrypted 8 bytes eecc1116c1971d47: ack (nb=0), 107322-107323 eecc1116c1971d47: Received unpadded initial, length=295 eecc1116c1971d47: Receiving packet type: 4 (handshake), S0, Q1, Version 1, eecc1116c1971d47: , <3eb3821f718154ea>, Seq: 1, pl: 220 eecc1116c1971d47: Decrypted 203 bytes eecc1116c1971d47: crypto_hs, offset 0, length 199: 0800008f008d0000... eecc1116c1971d47: Received transport parameter TLS extension (98 bytes): eecc1116c1971d47: Extension list (98 bytes): eecc1116c1971d47: Extension type: 0 (ocid), length 8, eecc1116c1971d47 eecc1116c1971d47: Extension type: 2 (stateless_reset_token), length 16, a13047bdc9429c33d2d6c954e9b87820 eecc1116c1971d47: Extension type: 15 (hcid), length 8, 3eb3821f718154ea eecc1116c1971d47: Extension type: 1 (idle_timeout), length 4, 80007530 eecc1116c1971d47: Extension type: 3 (max_packet_size), length 2, 4800 eecc1116c1971d47: Extension type: 4 (initial_max_data), length 4, 8018fe70 eecc1116c1971d47: Extension type: 5 (max_stream_data_bidi_local), length 2, 7ffc eecc1116c1971d47: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80167e98 eecc1116c1971d47: Extension type: 7 (max_stream_data_uni), length 2, 7ffc eecc1116c1971d47: Extension type: 8 (max_streams_bidi), length 2, 4064 eecc1116c1971d47: Extension type: 9 (max_streams_uni), length 1, 03 eecc1116c1971d47: Extension type: 12 (disable_migration), length 0 eecc1116c1971d47: Extension type: 14 (active_connection_id_limit), length 1, 08 eecc1116c1971d47: Extension type: 17 (version_negotiation), length 16, 00000001ff00001d000000016b3343cf eecc1116c1971d47: The session was properly resumed! eecc1116c1971d47: Zero RTT data is accepted! eecc1116c1971d47: Negotiated ALPN: hq-interop eecc1116c1971d47: Sending packet type: 4 (handshake), S0, Q1, Version 1, eecc1116c1971d47: <3eb3821f718154ea>, , Seq: 0, pl: 80 eecc1116c1971d47: Prepared 60 bytes eecc1116c1971d47: ack (nb=0), 1 eecc1116c1971d47: crypto_hs, offset 0, length 52: 1400003084cc2e0c... eecc1116c1971d47: T= 0.286542, Lost packet type 5, number 0, size 593, DCID <3eb3821f718154ea>, reason: timer eecc1116c1971d47: Sending packet type: 6 (1rtt protected), S0, Q1, eecc1116c1971d47: <3eb3821f718154ea>, Seq: 2 (2), Phi: 0, eecc1116c1971d47: Prepared 285 bytes eecc1116c1971d47: new_connection_id[1]: 0xb6a3ed3590285a59, 72f0b56490b71910863f9fa1d9dcd5dc eecc1116c1971d47: new_connection_id[2]: 0xdb9f1c37832b5e26, e488c371954ffc046de4a529248f05ac eecc1116c1971d47: new_connection_id[3]: 0x1bf3881ad61cadd5, 1bdb24d3d61f23b2c56f1ff73082ef8a eecc1116c1971d47: new_connection_id[4]: 0xdff264fb8d36f0cf, 48fcbdbff9d180be0b775efd055175aa eecc1116c1971d47: new_connection_id[5]: 0x2fcc5ad4b0a6e5ea, 8a954545997379a6686f093ee2cfd9dd eecc1116c1971d47: new_connection_id[6]: 0x06f510c9abeba9fb, ef4282618c743c240d3ce59d53fd7ab8 eecc1116c1971d47: new_connection_id[7]: 0x7fcb66453f21e128, b83f4ac7f3349c44599df48be326c48f eecc1116c1971d47: stream 0, offset 0, length 29, fin = 1: 474554202f737572... eecc1116c1971d47: padding, 57 bytes eecc1116c1971d47: T= 0.286542, cwin: 16614,flight: 1025,nb_ret: 2,rtt_min: 34095,rtt: 34095,rtt_var: 17047,max_ack_delay: 0,state: 13 eecc1116c1971d47: Sending 416 bytes to 193.167.100.100:443 at T=0.286542 (1a23f335) eecc1116c1971d47: Connection established. Version = 1, I-CID: eecc1116c1971d47, verified: 1 eecc1116c1971d47: T= 0.371938, Lost packet type 4, number 0, size 89, DCID <3eb3821f718154ea>, reason: timer eecc1116c1971d47: Sending packet type: 4 (handshake), S0, Q1, Version 1, eecc1116c1971d47: <3eb3821f718154ea>, , Seq: 1, pl: 158 eecc1116c1971d47: Prepared 138 bytes eecc1116c1971d47: crypto_hs, offset 0, length 52: 1400003084cc2e0c... eecc1116c1971d47: ack (nb=0), 1 eecc1116c1971d47: padding, 77 bytes eecc1116c1971d47: T= 0.371938, cwin: 16614,flight: 1103,nb_ret: 3,rtt_min: 34095,rtt: 34095,rtt_var: 17047,max_ack_delay: 0,state: 13 eecc1116c1971d47: Sending 183 bytes to 193.167.100.100:443 at T=0.371938 (1a2540c9) eecc1116c1971d47: T= 0.457153, Lost packet type 5, number 1, size 593, DCID <3eb3821f718154ea>, reason: timer eecc1116c1971d47: T= 0.457153, Lost packet type 6, number 2, size 295, DCID <3eb3821f718154ea>, reason: timer eecc1116c1971d47: Sending packet type: 6 (1rtt protected), S0, Q1, eecc1116c1971d47: <3eb3821f718154ea>, Seq: 3 (3), Phi: 0, eecc1116c1971d47: Prepared 285 bytes eecc1116c1971d47: new_connection_id[1]: 0xb6a3ed3590285a59, 72f0b56490b71910863f9fa1d9dcd5dc eecc1116c1971d47: new_connection_id[2]: 0xdb9f1c37832b5e26, e488c371954ffc046de4a529248f05ac eecc1116c1971d47: new_connection_id[3]: 0x1bf3881ad61cadd5, 1bdb24d3d61f23b2c56f1ff73082ef8a eecc1116c1971d47: new_connection_id[4]: 0xdff264fb8d36f0cf, 48fcbdbff9d180be0b775efd055175aa eecc1116c1971d47: new_connection_id[5]: 0x2fcc5ad4b0a6e5ea, 8a954545997379a6686f093ee2cfd9dd eecc1116c1971d47: new_connection_id[6]: 0x06f510c9abeba9fb, ef4282618c743c240d3ce59d53fd7ab8 eecc1116c1971d47: new_connection_id[7]: 0x7fcb66453f21e128, b83f4ac7f3349c44599df48be326c48f eecc1116c1971d47: stream 0, offset 0, length 29, fin = 1: 474554202f737572... eecc1116c1971d47: padding, 57 bytes eecc1116c1971d47: T= 0.457153, cwin: 16614,flight: 494,nb_ret: 5,rtt_min: 34095,rtt: 34095,rtt_var: 17047,max_ack_delay: 0,state: 13 eecc1116c1971d47: Sending 311 bytes to 193.167.100.100:443 at T=0.457153 (1a268da8) eecc1116c1971d47: T= 0.542509, Lost packet type 4, number 1, size 167, DCID <3eb3821f718154ea>, reason: timer eecc1116c1971d47: Sending packet type: 4 (handshake), S0, Q1, Version 1, eecc1116c1971d47: <3eb3821f718154ea>, , Seq: 2, pl: 158 eecc1116c1971d47: Prepared 138 bytes eecc1116c1971d47: crypto_hs, offset 0, length 52: 1400003084cc2e0c... eecc1116c1971d47: ack (nb=0), 1 eecc1116c1971d47: padding, 75 bytes eecc1116c1971d47: T= 0.542509, cwin: 16614,flight: 494,nb_ret: 6,rtt_min: 34095,rtt: 34095,rtt_var: 17047,max_ack_delay: 0,state: 13 eecc1116c1971d47: Sending 183 bytes to 193.167.100.100:443 at T=0.542509 (1a27db14) eecc1116c1971d47: Receiving 349 bytes from 193.167.100.100:443 at T=0.575151 (1a285a96) eecc1116c1971d47: Receiving packet type: 4 (handshake), S0, Q1, Version 1, eecc1116c1971d47: , <3eb3821f718154ea>, Seq: 2, pl: 22 eecc1116c1971d47: Decrypted 5 bytes eecc1116c1971d47: ack (nb=0), 2 eecc1116c1971d47: Receiving packet type: 6 (1rtt protected), S0, Q1, eecc1116c1971d47: , Seq: 0 (0), Phi: 0, eecc1116c1971d47: Decrypted 277 bytes eecc1116c1971d47: crypto_hs, offset 0, length 273: 0400010d00001c20... eecc1116c1971d47: T= 0.575151, cwin: 16781,flight: 311,nb_ret: 6,rtt_min: 32642,rtt: 33913,rtt_var: 13148,max_ack_delay: 0,state: 13 eecc1116c1971d47: T= 0.575259, Lost packet type 6, number 3, size 295, DCID <3eb3821f718154ea>, reason: timer eecc1116c1971d47: Sending packet type: 6 (1rtt protected), S1, Q1, eecc1116c1971d47: <3eb3821f718154ea>, Seq: 4 (4), Phi: 0, eecc1116c1971d47: Prepared 285 bytes eecc1116c1971d47: new_connection_id[1]: 0xb6a3ed3590285a59, 72f0b56490b71910863f9fa1d9dcd5dc eecc1116c1971d47: new_connection_id[2]: 0xdb9f1c37832b5e26, e488c371954ffc046de4a529248f05ac eecc1116c1971d47: new_connection_id[3]: 0x1bf3881ad61cadd5, 1bdb24d3d61f23b2c56f1ff73082ef8a eecc1116c1971d47: new_connection_id[4]: 0xdff264fb8d36f0cf, 48fcbdbff9d180be0b775efd055175aa eecc1116c1971d47: new_connection_id[5]: 0x2fcc5ad4b0a6e5ea, 8a954545997379a6686f093ee2cfd9dd eecc1116c1971d47: new_connection_id[6]: 0x06f510c9abeba9fb, ef4282618c743c240d3ce59d53fd7ab8 eecc1116c1971d47: new_connection_id[7]: 0x7fcb66453f21e128, b83f4ac7f3349c44599df48be326c48f eecc1116c1971d47: ack (nb=0), 0 eecc1116c1971d47: stream 0, offset 0, length 29, fin = 1: 474554202f737572... eecc1116c1971d47: padding, 52 bytes eecc1116c1971d47: T= 0.575259, cwin: 16781,flight: 311,nb_ret: 7,rtt_min: 32642,rtt: 33913,rtt_var: 13148,max_ack_delay: 0,state: 13 eecc1116c1971d47: Sending 311 bytes to 193.167.100.100:443 at T=0.575259 (1a285b02) eecc1116c1971d47: Receiving 158 bytes from 193.167.100.100:443 at T=0.576551 (1a28600e) eecc1116c1971d47: Receiving packet type: 6 (1rtt protected), S0, Q1, eecc1116c1971d47: , Seq: 1 (1), Phi: 0, eecc1116c1971d47: Decrypted 132 bytes eecc1116c1971d47: ack (nb=1), 3, 0-1 eecc1116c1971d47: handshake_done eecc1116c1971d47: new_token[37]: 0xb7aa9344b6a981bd5167967e22d46453... eecc1116c1971d47: new_connection_id[1]: 0xd17ab9be76e6adc5, f6590a77fdb01df661e80a1179b29580 eecc1116c1971d47: new_connection_id[2]: 0xfabbdd936ad108a9, 3fa1e546df9a6d7b60c668f0f0784bc7 eecc1116c1971d47: new_connection_id[3]: 0x6d189af3ed027f00, 8d46c5afade8595553b0ad20598f83f1 eecc1116c1971d47: T= 0.576551, cwin: 1563,flight: 311,nb_ret: 7,rtt_min: 32642,rtt: 43348,rtt_var: 28732,max_ack_delay: 0,state: 14 eecc1116c1971d47: Sending packet type: 6 (1rtt protected), S1, Q1, eecc1116c1971d47: <3eb3821f718154ea>, Seq: 5 (5), Phi: 0, eecc1116c1971d47: Prepared 29 bytes eecc1116c1971d47: ack (nb=0), 0-1 eecc1116c1971d47: padding, 23 bytes eecc1116c1971d47: T= 0.605790, cwin: 1563,flight: 366,nb_ret: 7,rtt_min: 32642,rtt: 43348,rtt_var: 28732,max_ack_delay: 0,state: 14 eecc1116c1971d47: Sending 55 bytes to 193.167.100.100:443 at T=0.605790 (1a28d245) eecc1116c1971d47: Receiving 34 bytes from 193.167.100.100:443 at T=0.628371 (1a292a7a) eecc1116c1971d47: Receiving packet type: 6 (1rtt protected), S1, Q1, eecc1116c1971d47: , Seq: 3 (3), Phi: 0, eecc1116c1971d47: Decrypted 8 bytes eecc1116c1971d47: ack (nb=1), 3-4, 0-1 eecc1116c1971d47: T= 0.628371, cwin: 1563,flight: 55,nb_ret: 7,rtt_min: 32642,rtt: 43318,rtt_var: 21608,max_ack_delay: 0,state: 14 eecc1116c1971d47: Receiving 1054 bytes from 193.167.100.100:443 at T=3.157992 (1a4fc3cf) eecc1116c1971d47: Receiving packet type: 6 (1rtt protected), S1, Q1, eecc1116c1971d47: , Seq: 6 (6), Phi: 0, eecc1116c1971d47: Decrypted 1028 bytes eecc1116c1971d47: stream 0, offset 0, length 1024, fin = 1: 443d5ba1590557dc... eecc1116c1971d47: T= 3.157992, cwin: 1307,flight: 0,nb_ret: 7,rtt_min: 32642,rtt: 43318,rtt_var: 21608,max_ack_delay: 0,state: 14 eecc1116c1971d47: All done, Closing the connection. eecc1116c1971d47: Sending packet type: 6 (1rtt protected), S0, Q1, eecc1116c1971d47: <3eb3821f718154ea>, Seq: 6 (6), Phi: 0, eecc1116c1971d47: Prepared 12 bytes eecc1116c1971d47: ack (nb=2), 6, 3, 1 eecc1116c1971d47: application_close, Error 0x0000, Reason length 0 eecc1116c1971d47: Sending 38 bytes to 193.167.100.100:443 at T=3.158239 (1a4fc4c6) eecc1116c1971d47: Receiving 1054 bytes from 193.167.100.100:443 at T=3.158754 (1a4fc6c9) eecc1116c1971d47: Receiving packet type: 6 (1rtt protected), S1, Q1, eecc1116c1971d47: , Seq: 7 (7), Phi: 0, eecc1116c1971d47: Decrypted 1028 bytes eecc1116c1971d47: stream 0, offset 0, length 1024, fin = 1: 443d5ba1590557dc... eecc1116c1971d47: Receiving 30 bytes from 193.167.100.100:443 at T=3.189881 (1a504060) eecc1116c1971d47: Receiving packet type: 6 (1rtt protected), S0, Q1, eecc1116c1971d47: , Seq: 8 (8), Phi: 0, eecc1116c1971d47: Decrypted 4 bytes eecc1116c1971d47: connection_close, Error 0x0000, Reason length 0 eecc1116c1971d47: Out of 2 zero RTT packets, 1 were acked by the server. eecc1116c1971d47: Received 1024 bytes in 3.190056 seconds, 0.002568 Mbps. eecc1116c1971d47: Sent 29 bytes in 3.190056 seconds, 0.000073 Mbps.